Hi
Those ports are related to Windows RPC and NetBIOS and they shouldn't be visible to the outside world at all. The big difference between 'stealth' and closed is that closed means they could be opened, and that is the concern I would have.
Are you using NAT, or do you have static IP addresses? If using NAT then this implies some software on a computer on your network has used UPnP to open those ports, it is unlikely the software has done that for good intentions. Have you a computer set in the DMZ under Network Settings - NAT, that would cause it.
You could add a Firewall rule to block it, often as good practice a rule is added for these common ports.
Just to add, on my VMG8924 those ports are 'stealth'.
To block this traffic try add a Firewall Rule:
From the Web UI, goto Security -> Firewall, then the Access Control tab, click Add New ACL Rule.
Filter name: NetBIOS (can be anything really)
Order is: 1
Select source device: No selection leave at Specific IP, you could select each entry in turn to find out the PC/Computer that is leaking this information.
Source IP Address: Leave blank so it means all
Destination: Leave blank
IP Type: IPv4
Select Service: Specific Service
Protocol: TCP/UDP
Custom source port: Leave empty
Custom Destination port: 135:139
Check boxes, leave all unchecked
Policy: DROP
Direction: WAN to LAN
Enable Rate Limit: unchecked
No schedule selection
Click Apply then test again.
Regards
Phil