SpeedThree
Regular Contributor
Hope some kind soul is having a quiet moment and can take a shot at providing some advice.
Yesterday, on my Synology RT2600AC router, I installed the Threat Prevention Package.
Today, I received this alert:
The following suspicious network event was dropped:
Event Type: Attempted User Privilege Gain
Signature: ET INFO Session Traversal Utilities for NAT (STUN Binding Request)
Severity: HIGH
Source IP: 192.168.1.5
Destination IP: 52.23.111.175
Opening the Synology SRM, I see that the Severity is listed as High and the Status is Drop and this info was also provided.
alert udp $HOME_NET any -> $EXTERNAL_NET 3478 (msg:"ET INFO Session Traversal Utilities for NAT (STUN Binding Request)";
content:"|00 01|";
depth:2; content:"|21 12 a4 42|";
distance:2;
within:4;
reference:url,tools.ietf.org/html/rfc5389;
classtype:attempted-user; sid:2016149;
rev:2; metadata:created_at 2013_01_04, updated_at 2013_01_04
Is the wisest thing to do click on the Add Policy button at the top of that Synology page and click OK???
Many thanks.
Yesterday, on my Synology RT2600AC router, I installed the Threat Prevention Package.
Today, I received this alert:
The following suspicious network event was dropped:
Event Type: Attempted User Privilege Gain
Signature: ET INFO Session Traversal Utilities for NAT (STUN Binding Request)
Severity: HIGH
Source IP: 192.168.1.5
Destination IP: 52.23.111.175
Opening the Synology SRM, I see that the Severity is listed as High and the Status is Drop and this info was also provided.
alert udp $HOME_NET any -> $EXTERNAL_NET 3478 (msg:"ET INFO Session Traversal Utilities for NAT (STUN Binding Request)";
content:"|00 01|";
depth:2; content:"|21 12 a4 42|";
distance:2;
within:4;
reference:url,tools.ietf.org/html/rfc5389;
classtype:attempted-user; sid:2016149;
rev:2; metadata:created_at 2013_01_04, updated_at 2013_01_04

Is the wisest thing to do click on the Add Policy button at the top of that Synology page and click OK???
Many thanks.