I noticed this when setting up my new UNMS server for AirMax monitoring. After some Torch analysis I say that a lot of the random ports listed in the other post were to do with DNS but there were also a couple of SSH entries.
All the traffic is coming from the management subnets default gateway, namely the CCR1009. There’s no port forwarding rules going to any nanostations, and there is a block rule for intervlan chatter as well as as rule to block vlan traffic from the management subnet.
Can anyone identify what is going on here? Happy to post extra info at your request.
I think it is an infected radio attempting to spread the worm to others.
I don’t know how you can repair that, info should be on the UBNT forums.
(I only read about this problem and the many attempts UBNT have made to secure their radios, every time still not fixing it completely)
Thanks, I’ve asked on the other UBNT thread what they think.
The latest news I can see of a UBNT worm was early last year, and these points were installed well after that so hopefully it’s not a worm. I’m not ruling anything out though.