Solved

Firewall Attack Help !!

Posted on 2004-10-12
5
198 Views
Last Modified: 2013-11-16
Help, my Firewall is detecting that IP Address 193.108.87.93:6184 has a target Destination of : 192.168.1.255:137 UDP.

There are no custom filters setup on my Firewall to point traffic to that address and I dont have PC with an address of 192.168.1.255.  When I ping 192.168.1.255 on my LAN I do get results returned.  But I definatley dont have a printer, device or anything else.

Whats going on !!!
0
Comment
Question by:Northumberland
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 71

Accepted Solution

by:
Chris Dent earned 500 total points
ID: 12285230

192.168.1.255 is the Broadcast address for a 24 bit subnet (192.168.1.0 255.255.255.0).

Port 137 is the NetBIOS Port, broadcasts are all sent to that 192.168.1.255 address - this port should be blocked on your firewall, there's no need for external devices to Broadcast in your subnet.

The Broadcast Address is seen by everything on your Subnet.
0
 
LVL 71

Expert Comment

by:Chris Dent
ID: 12285242

*edit* Should read: Broadcasts from the Subnet 192.168.1.0/24 are all sent to the 192.168.1.255 address.

For an external device trying to access that port it could be any of someone Port Scanning or perhaps a Virus (on the remote computer).
0
 

Author Comment

by:Northumberland
ID: 12285262
So Chris should I clode port 137 anyway ?
0
 
LVL 71

Expert Comment

by:Chris Dent
ID: 12285370

In my opinion no one will need to get to Port 137 Externally, equally Port 137 will not need to go outside of your network. So it should be closed. on the Firewall.
0
 

Author Comment

by:Northumberland
ID: 12302936
Thanks Chris
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
A 2007 NCSA Cyber Security survey revealed that a mere 4% of the population has a full understanding of firewalls. As business owner, you should be part of that 4% that has a full understanding.
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question