15 A 12.169.174.160:1794 xxx.69.35.6:135 tcp established 3d16h55m40s
16 A 12.169.186.137:4944 xxx.69.35.6:135 tcp established 3d19h14m15s
17 A 12.169.186.149:3881 xxx.69.35.6:135 tcp established 3d9h55m
18 A 12.169.186.149:4436 xxx.69.35.6:135 tcp established 3d9h16m46s
19 A 12.169.230.170:3578 xxx.69.35.6:1025 tcp established 3d10m19s
I have these entries in my 2.8.28 router. The xxx.69.35.6 IP is natted to a video camera on port 8000 with this rule.
ip firewall dst-nat> pr
Flags: X - disabled, I - invalid, D - dynamic
1 ;;; video server
in-interface=public dst-address=xxx.69.35.6/32 protocol=tcp action=nat
to-dst-address=192.168.0.41 to-dst-port=8000
If I’m limiting traffic to port 8000 why am I seeing port 135 traffic?
I disabled the public IP address and the entries are still there, how often does list of connections refresh? Is there a way to drop connections in 2.8.28?
My input and forward rules drop port 135 via a virus filter chain so I’m confused as to why I’m seeing these entries.