Filtered is also a common response when scanning for UDP.
Scanning for UDP presents a number of challenges and the nmap documentation has a detailed discussion on UDP and the filtered status.
Reminder: by default, nmap scans only for TCP against the 1000 most 'popular' ports.
In the past I have used Unicornscan for this specific purpose because nmap has limitations, but there may be other tools that will perform adequately.
I would suggest that you try again with a UDP scan and see what you get. Perhaps add some flags like -sV
to get nmap to dig further.
Ports 139 and 445 normally use tcp while ports 137, 138 use udp.
# iptables -A INPUT -d 10.1.1.1 -p udp --dport 137 -j DROP
# iptables -A INPUT -d 10.1.1.1 -p udp --dport 138 -j DROP
# iptables -A INPUT -d 10.1.1.1 -p tcp --dport 139 -j DROP
# iptables -A INPUT -d 10.1.1.1 -p tcp --dport 445 -j DROP
Source: Firewalling Samba