Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations Chris Miller on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

UDP Hacking port 53

Status
Not open for further replies.

Impersonator

Technical User
Feb 10, 2016
1
US
We have a Sonicwall TZ600 and have noticed that someone on the WAN is using port 53 UDP to access our LAN.
I have verified the we have rules built to DENY anything for IPV4 and 6 from WAN to LAN and WAN to WAN but doesn't seem to deter the problem.
I have also made sure that the Comprehensive Gateway and Security services are enabled.
Any ideas?
 
Make sure that you have the latest firmware installed. There is a new releas.
We have had on-going issues since 2015 and still have issues with this problem.
What I noticed is that in the Dadhboard you can view the logs, up, services, etc. I've noticed a lot of UNKNOWN connections which means that ssh is being used by someone to console into the Sonicwall.
Check your computers and look into the temp folders and see if logmein or logmein rescue is in the temp folder. If so, then a reverse connection is being allowed and this allows some in the wan to bypass the Sonicwall.
Even with the application control turned in under firewall the Sonicwall fails to block these connections.
Open s case with Sonicwall and let me know your findings.
I can tell you that the person(s) are relentless and very sophisticated because they continue to change their tactics.
Good luck.
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top