Linux Firewall: possible exploit ?

Cause I am a newbie I like when I have time to study a little bit virtualmin looking around where I do not understand well what it means.
today I was checking the area: Webmin/Network/Linux Firewall
Rules file /etc/sysconfig/iptables

I have found a string not so clear to me:
into the section: Chain RH-Firewall-1-INPUT
I have found that:
Accept if protocol is UDP and destination is 224.0.0.251 and destination port is 5353

what this ip address jump up from ? It's not related to my static ip address or something i know.
I have issued a technical problem 2 days ago and provided a secure login to virtualmin staff.
Is that an automatically created link to your servers or is that something I have to worry about ?
Seems it's from US, California
"OrgName: Internet Assigned Numbers Authority
OrgId: IANA
Address: 4676 Admiralty Way, Suite 330
City: Marina del Rey
StateProv: CA
PostalCode: 90292-6695
Country: US"

Status: 
Closed (fixed)

Comments

Howdy -- those aren't added by Virtualmin, though they're not cause for concern.

UDP port 5353 is for multicast DNS, and that IP address is a multicast address.

It looks like RedHat/CentOS based systems add a rule for that by default... while I'm not overly familiar with that, I dug up this posting on the Fedora list last year that explains it:

http://forums.fedoraforum.org/showthread.php?t=213803

wow ... nice forum thread :) so that's an "old dirty code" left there by default redhat based installations just in case ... thank you Andrew after 2 reinstallation of CentOS 4, and 2 of CentOS 5, after being hacked I am a lil bit over... something you can immagine don't want to leave anything unwatched ...

thank you very much for support.

Glad to help... let us know if you have any other questions!

Automatically closed -- issue fixed for 2 weeks with no activity.