Hello air360 Nothing is in the works regarding this at the present time. When/if it does become a reality it will appear here, you can subscribe to the thread. When updates and release notes are published you will be notified via an email message: https://community.norton.com/en/forums/norton-core-firmware-update-release-notes
Hi air360, So the CORE does not stealth ports. You can verify this here at Gibson Research's site "Shields Up!" https://www.grc.com/x/ne.dll?rh1dkyd2
Why is it like this? Well its likely that way because Norton is not thinking about customers privacy compleatly and is making our ports intentionally report as "closed" instead of "stealth" so that they can use us to see who or whats scanning our ports. Its unacceptable, I know... Even the most basic firewall that is included in commercial routers (i.e. ASUS 86U and 3100 etc.) are set to stealth ALL ports automatically as I verified my AC3100 ASUS router does on GRC's site above.
Anyways, what you can do in the meantime as a work around which works for me is daisy chain another router of your choice to your core and activate that second routers firewall. This should stealth all ports and by pass CORE allowing malicious sites from scanning your ports. See my post here where Ive tested it personally and its worked for me: Thoughts on the CORE Cloud DNS fail and using a second router to "Daisy-Chain" CORE to another router Just remember to connect to the COREs SSID for WIFI and you should receive the protections the CORE offers.
Good luck! Im sure others will comment in favor of CORE, but in reality CORE is still in the beta testing mode with us consumers.
Se você tem algum problema que requer ajuda urgente, por favor visite a nossa área de suporte ao consumidor: