Prevent Port Scanners using PSD rule

Hello, I know this was discussed many times. I will be short.
The PSD rule to prevent Port Scanners via TCP : froward and input works ok as should.
But can I use PSD for UDP ???

I have made rules for UDP and have got strange behaviour as google DNS 8.8.8.8 and 8.8.4.4 and some other google belonging IP’s were listed and blocked by the drop rule.
I understand IP can be spoofed but to this happen straight after implementing the rule look like PSD traffic from Google senses as port scan.

Why I want to drop port scanners for UDP? : I want UDP ports 500, 1701, 4500 not to be visible for port scanners and to minimise numbers of dickheads for trying my VPN to be cracked. :slight_smile:

All comments appreciated.

Dont waste your time.
Allow needed traffic
Drop all else.
If you are using VPN, you are fine.