Go Premium for a chance to win a PS4. Enter to Win


I've got a Fairpoint/Verison router

Posted on 2012-03-23
Medium Priority
Last Modified: 2012-03-27
The router works great, but one thing I have noticed and can't get a n answer from the vendor on is that ...in the port forwarding there are several dozen (give or take) UDP ports open that I did not setup.  My local expert thinks it might be the vendor access ports to monitor / update the router?  heres is an example:    svchost ( 63944 UDP - UDP Any -> 63944 Any

I've taken the time to delete these but they always come back
Question by:Eric_Where_am_I
  • 2
LVL 69

Accepted Solution

Callandor earned 2000 total points
ID: 37758306
Do you have any applications in the Rule Management?  Port forwarding is usually associated with one of these, if it's a common application.

Author Comment

ID: 37772890
Ok I am all set, first off the settings are entirely be default at set up.  The settings all for outgoing traffic to initiate inbound traffic on a seperate port.  In particualr games, but there are other uses....all of this is im "Port Triggering"

 L2TP Triggering - Layer Two Tunneling Protocol
 UDP Any -> 1701 UDP Any -> Same as Initiating  
 TFTP Triggering - Trivial File Transfer Protocol
 UDP 1024-65535 -> 69 UDP Any -> Same as Initiating

Author Closing Comment

ID: 37772896
Just cause you took the time to get involved.  Thanks

Featured Post

Identify and Prevent Potential Cyber-threats

Become the white hat who helps safeguard our interconnected world. Transform your career future by earning your MS in Cybersecurity. WGU’s MSCSIA degree program was designed in collaboration with national intelligence organizations and IT industry leaders.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…

972 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question