Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Unknown taredo in port range forwarding

Posted on 2010-11-20
3
Medium Priority
?
551 Views
Last Modified: 2013-12-27
Hello, my wireless internet connection started disconnecting frequently while I noticed that the cable computers hooked to the router didn't disconnect. I went into the router and noticed in the port forwarding section unknown information about taredo application and a series of start end port range all the way to the bottom. My question is it possible someone did this getting into the router and then to pc 192.168.1.100.

Please see the screen attached, I unchecked 192.168.1.100

Thanks
0
Comment
Question by:suply
  • 2
3 Comments
 

Author Comment

by:suply
ID: 34181163
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 34181169
this sounds like ipv6 for me:

http://en.wikipedia.org/wiki/Teredo_tunneling

You could disable ipv6 on your computer.
0
 
LVL 27

Accepted Solution

by:
Tolomir earned 2000 total points
ID: 34181176
Teredo alleviates this problem by encapsulating IPv6 packets within UDP/IPv4 datagrams, which most NATs can forward properly. Thus, IPv6-aware hosts behind NATs can be used as Teredo tunnel endpoints even when they don't have a dedicated public IPv4 address. In effect, a host implementing Teredo can gain IPv6 connectivity with no cooperation from the local network environment.

that seems to be the reason for all these udp ports.
--

Do a malware scan if something is masking as ipv6. You could give the free scanner from www.prevx.com a try.
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
The recent Petya-like ransomware attack served a big blow to hundreds of banks, corporations and government offices The Acronis blog takes a closer look at this damaging worm to see what’s behind it – and offers up tips on how you can safeguard your…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

971 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question