To view the dynamic port range on your computer for ipv4, use the following command :
netsh int ipv4 show dynamicport tcp
To set the dynamic port range for TCP, use for example :
netsh int ipv4 set dynamicport tcp start=1024 num=30000
More commands are described in the above article.
EDIT : Please note that the Windows firewall may be intelligent enough to open a dynamic port specified in the PASV response, even if this port doesn't fall within its default range for dynamic ports. But it may be that it is still not intelligent enough to understand the response without the parentheses. It may pay to have a look at the possibility of extending the default range for dynamic ports.
To open custom port in Windows Firewall, you can do the following:
In your Windows Firewall in Control Panel, click on the
Advanced Settings option on the left.
In the Windows Firewall with Advanced Security window that
opens, click on the Inbound Rules on the left.
Click on the New Rule on the right side of the window.
Select Port on the list of options.
Select TCP (or UDP if that is what you require) and Specific local ports, and then write your
ports in the text box to the right of Specific local ports (i.e.
1234).
Select Allow the connection in the next window.
Select the options which you need from Domain, Private, Public
(private and public are the network types that you select when you
connect to the new network, and windows asks you to select the
network type, and domain is obviously your domain).
Finally, write a Name and Description in the window that
shows next. Click FINISH.
Your port should be now allowed through the Windows Firewall.
Best Answer
I can tell you 100% that Avast for example blocks not only websockets, but from what I see from my Socket.IO app also xhr-polling and other stuff.
This is unacceptable, I've even tested on port 80 and it doesn't work. What an awful piece of software.
Edit:
this is a list of blocked ports by antiviruses(Dead 2017-07-20)