|
Post by dbridges on Jan 22, 2007 6:02:29 GMT 7
In the time that i've had the n2100 connected to the web i've had the router firewall blocking some of it's outbound activity as "hacker attacks" The latest this morning was occurred while trying to access it from a MAC needless to say that the mac's session did not continue. Time: 01/22/2007, 08:39:54 Message: Vecna Scan Source: 192.168.1.5, 443 Destination:61.95.119.194, 31945 (from PPPoE1 Outbound)
Previously i got a lot of these Time: 01/10/2007, 20:07:37 Message: TCP FIN Scan Source: 192.168.1.6, 1080 Destination:203.217.79.37, 36984 (from PPPoE1 Outbound) Plus there have been a lot of others. All of them appear to be Apache related. Naturally i'm not going to turn off the firewall on the router. It would be nice if the n2100 could behave itself and play nice on the network. If anyone has any ideas i'd love to hear them. I want to put a case together before i throw it at thecus support.
|
|
|
Post by dbridges on Jan 22, 2007 17:31:11 GMT 7
Some more investigation. The following was generated after accessing the n2100 from firefox on the MAC. Firefox and IE on the PC dont cause a problem and Safari on the MAC doesn't cause a problem. 01/22/2007 20:16:09 **Vecna Scan** 192.168.1.5, 443->> 203.214.142.24, 49363 (from PPPoE1 Outbound) 01/22/2007 20:16:09 **TCP FIN Scan** 192.168.1.5, 443->> 203.214.142.24, 49361 (from PPPoE1 Outbound) 01/22/2007 20:16:08 **TCP FIN Scan** 192.168.1.5, 443->> 203.214.142.24, 49349 (from PPPoE1 Outbound) 01/22/2007 20:16:06 **Vecna Scan** 192.168.1.5, 443->> 203.214.142.24, 49363 (from PPPoE1 Outbound) 01/22/2007 20:16:06 **TCP FIN Scan** 192.168.1.5, 443->> 203.214.142.24, 49351 (from PPPoE1 Outbound) 01/22/2007 20:16:05 **Vecna Scan** 192.168.1.5, 443->> 203.214.142.24, 49330 (from PPPoE1 Outbound) 01/22/2007 20:16:05 **TCP FIN Scan** 192.168.1.5, 443->> 203.214.142.24, 49354 (from PPPoE1 Outbound) 01/22/2007 20:16:03 **TCP FIN Scan** 192.168.1.5, 443->> 203.214.142.24, 49361 (from PPPoE1 Outbound) 01/22/2007 20:16:02 **TCP FIN Scan** 192.168.1.5, 443->> 203.214.142.24, 49354 (from PPPoE1 Outbound) 01/22/2007 20:16:01 **TCP FIN Scan** 192.168.1.5, 443->> 203.214.142.24, 49351 (from PPPoE1 Outbound) 01/22/2007 20:15:59 **TCP FIN Scan** 192.168.1.5, 443->> 203.214.142.24, 49351 (from PPPoE1 Outbound) 01/22/2007 20:15:58 **Vecna Scan** 192.168.1.5, 443->> 203.214.142.24, 49330 (from PPPoE1 Outbound) 01/22/2007 20:15:57 **TCP FIN Scan** 192.168.1.5, 443->> 203.214.142.24, 49349 (from PPPoE1 Outbound) 01/22/2007 20:15:56 **TCP FIN Scan** 192.168.1.5, 443->> 203.214.142.24, 49349 (from PPPoE1 Outbound) 01/22/2007 20:15:55 **Vecna Scan** 192.168.1.5, 443->> 203.214.142.24, 49330 (from PPPoE1 Outbound) 01/22/2007 20:15:54 **TCP FIN Scan** 192.168.1.5, 443->> 203.214.142.24, 49349 (from PPPoE1 Outbound)
|
|