Solved

I've got a Fairpoint/Verison router

Posted on 2012-03-23
3
711 Views
Last Modified: 2012-03-27
The router works great, but one thing I have noticed and can't get a n answer from the vendor on is that ...in the port forwarding there are several dozen (give or take) UDP ports open that I did not setup.  My local expert thinks it might be the vendor access ports to monitor / update the router?  heres is an example:

192.168.5.7   192.168.5.7    svchost (192.168.5.7:3414) 63944 UDP - UDP Any -> 63944 Any

I've taken the time to delete these but they always come back
0
Comment
Question by:Eric_Where_am_I
  • 2
3 Comments
 
LVL 69

Accepted Solution

by:
Callandor earned 500 total points
ID: 37758306
Do you have any applications in the Rule Management?  Port forwarding is usually associated with one of these, if it's a common application.
0
 
LVL 1

Author Comment

by:Eric_Where_am_I
ID: 37772890
Ok I am all set, first off the settings are entirely be default at set up.  The settings all for outgoing traffic to initiate inbound traffic on a seperate port.  In particualr games, but there are other uses....all of this is im "Port Triggering"

 L2TP Triggering - Layer Two Tunneling Protocol
 UDP Any -> 1701 UDP Any -> Same as Initiating  
 
 TFTP Triggering - Trivial File Transfer Protocol
 UDP 1024-65535 -> 69 UDP Any -> Same as Initiating
0
 
LVL 1

Author Closing Comment

by:Eric_Where_am_I
ID: 37772896
Just cause you took the time to get involved.  Thanks
0

Featured Post

New! My Passport Wireless Pro Wi-Fi Mobile Storage

Portable wireless storage to offload, edit, and stream anywhere.

High-capacity, wireless mobile storage designed to accompany professional photographers and videographers in the field to easily offload, edit and stream captured photos and high-definition videos.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now