Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Unknown taredo in port range forwarding

Posted on 2010-11-20
3
Medium Priority
?
544 Views
Last Modified: 2013-12-27
Hello, my wireless internet connection started disconnecting frequently while I noticed that the cable computers hooked to the router didn't disconnect. I went into the router and noticed in the port forwarding section unknown information about taredo application and a series of start end port range all the way to the bottom. My question is it possible someone did this getting into the router and then to pc 192.168.1.100.

Please see the screen attached, I unchecked 192.168.1.100

Thanks
0
Comment
Question by:suply
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 

Author Comment

by:suply
ID: 34181163
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 34181169
this sounds like ipv6 for me:

http://en.wikipedia.org/wiki/Teredo_tunneling

You could disable ipv6 on your computer.
0
 
LVL 27

Accepted Solution

by:
Tolomir earned 2000 total points
ID: 34181176
Teredo alleviates this problem by encapsulating IPv6 packets within UDP/IPv4 datagrams, which most NATs can forward properly. Thus, IPv6-aware hosts behind NATs can be used as Teredo tunnel endpoints even when they don't have a dedicated public IPv4 address. In effect, a host implementing Teredo can gain IPv6 connectivity with no cooperation from the local network environment.

that seems to be the reason for all these udp ports.
--

Do a malware scan if something is masking as ipv6. You could give the free scanner from www.prevx.com a try.
0

Featured Post

Turn your laptop into a mobile console!

The CV211 Laptop USB Console Adapter provides a direct Laptop-to-Computer connection for fast and easy remote desktop access with no software to install.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article investigates the question of whether a computer can really be cleaned once it has been infected, and what the best ways of cleaning a computer might be (in this author's opinion).
The Cyber News Rundown brings you the latest happenings in cyber news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst, and a guy with a passion for all things security. Any more questions? Just ask.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

722 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question