USGflex200 Suspicious Activity?

chuckpr
chuckpr Posts: 2  Freshman Member

My firewall just went down this morning, after i restarted the device to get it back online i noticed somebody connected to the device and uploaded a bunch of Zyxel certificates and flushed the firewall rules. Dont know if this action was taken by Zyxel or not, so if somebody from Zyxel is reading this please let me know.

Accepted Solution

  • Zyxel_Kay
    Zyxel_Kay Posts: 1,262  Zyxel Employee
    Zyxel Certified Network Engineer Level 2 - Nebula Zyxel Certified Network Engineer Level 2 - WLAN Zyxel Certified Network Engineer Level 2 - Switch Zyxel Certified Network Engineer Level 2 - Security
    Answer ✓

    Hi @chuckpr

    To ensure your network is fully protected, we recommend keeping your firewall updated with the latest firmware. Please upgrade your USG FLEX 200 to the latest firmware version, 5.39(ABUI.0)C0, for enhanced security.

    Additionally, could you provide more details on the firewall rules that were flushed? Have there been any recent configuration changes? If you need further assistance in investigating the suspicious activity, kindly send us the following information via private message:

    1. A diagnostic file from your device.
    2. A screenshot of the relevant log entries.

    We're here to help!

    Kay

All Replies

  • Zyxel_Kay
    Zyxel_Kay Posts: 1,262  Zyxel Employee
    Zyxel Certified Network Engineer Level 2 - Nebula Zyxel Certified Network Engineer Level 2 - WLAN Zyxel Certified Network Engineer Level 2 - Switch Zyxel Certified Network Engineer Level 2 - Security
    Answer ✓

    Hi @chuckpr

    To ensure your network is fully protected, we recommend keeping your firewall updated with the latest firmware. Please upgrade your USG FLEX 200 to the latest firmware version, 5.39(ABUI.0)C0, for enhanced security.

    Additionally, could you provide more details on the firewall rules that were flushed? Have there been any recent configuration changes? If you need further assistance in investigating the suspicious activity, kindly send us the following information via private message:

    1. A diagnostic file from your device.
    2. A screenshot of the relevant log entries.

    We're here to help!

    Kay