Solved

I've got a Fairpoint/Verison router

Posted on 2012-03-23
3
717 Views
Last Modified: 2012-03-27
The router works great, but one thing I have noticed and can't get a n answer from the vendor on is that ...in the port forwarding there are several dozen (give or take) UDP ports open that I did not setup.  My local expert thinks it might be the vendor access ports to monitor / update the router?  heres is an example:

192.168.5.7   192.168.5.7    svchost (192.168.5.7:3414) 63944 UDP - UDP Any -> 63944 Any

I've taken the time to delete these but they always come back
0
Comment
Question by:Eric_Where_am_I
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 69

Accepted Solution

by:
Callandor earned 500 total points
ID: 37758306
Do you have any applications in the Rule Management?  Port forwarding is usually associated with one of these, if it's a common application.
0
 
LVL 1

Author Comment

by:Eric_Where_am_I
ID: 37772890
Ok I am all set, first off the settings are entirely be default at set up.  The settings all for outgoing traffic to initiate inbound traffic on a seperate port.  In particualr games, but there are other uses....all of this is im "Port Triggering"

 L2TP Triggering - Layer Two Tunneling Protocol
 UDP Any -> 1701 UDP Any -> Same as Initiating  
 
 TFTP Triggering - Trivial File Transfer Protocol
 UDP 1024-65535 -> 69 UDP Any -> Same as Initiating
0
 
LVL 1

Author Closing Comment

by:Eric_Where_am_I
ID: 37772896
Just cause you took the time to get involved.  Thanks
0

Featured Post

Create the perfect environment for any meeting

You might have a modern environment with all sorts of high-tech equipment, but what makes it worthwhile is how you seamlessly bring together the presentation with audio, video and lighting. The ATEN Control System provides integrated control and system automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

630 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question