Solved

Unknown taredo in port range forwarding

Posted on 2010-11-20
3
523 Views
Last Modified: 2013-12-27
Hello, my wireless internet connection started disconnecting frequently while I noticed that the cable computers hooked to the router didn't disconnect. I went into the router and noticed in the port forwarding section unknown information about taredo application and a series of start end port range all the way to the bottom. My question is it possible someone did this getting into the router and then to pc 192.168.1.100.

Please see the screen attached, I unchecked 192.168.1.100

Thanks
0
Comment
Question by:suply
  • 2
3 Comments
 

Author Comment

by:suply
ID: 34181163
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 34181169
this sounds like ipv6 for me:

http://en.wikipedia.org/wiki/Teredo_tunneling

You could disable ipv6 on your computer.
0
 
LVL 27

Accepted Solution

by:
Tolomir earned 500 total points
ID: 34181176
Teredo alleviates this problem by encapsulating IPv6 packets within UDP/IPv4 datagrams, which most NATs can forward properly. Thus, IPv6-aware hosts behind NATs can be used as Teredo tunnel endpoints even when they don't have a dedicated public IPv4 address. In effect, a host implementing Teredo can gain IPv6 connectivity with no cooperation from the local network environment.

that seems to be the reason for all these udp ports.
--

Do a malware scan if something is masking as ipv6. You could give the free scanner from www.prevx.com a try.
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now