You can blocklist it with aegisI realize that the following is not related to 86SF. I posted heer because most of the really smart guys will be monitoring this thread.
Since 7-01-2021 1:55am PT, my 7800 has been bombarded with a probe on port 80 from the same source or slight variants on the ip address.
[DoS Attack: SYN/ACK Scan] from source: 212.133.164.75, port 80, Thursday, July 01, 2021 01:55:19
[DoS Attack: SYN/ACK Scan] from source: 212.133.164.75, port 80, Thursday, July 01, 2021 02:02:42
.
.
.
[DoS Attack: SYN/ACK Scan] from source: 212.133.164.83, port 80, Monday, July 05, 2021 08:03:29
[DoS Attack: SYN/ACK Scan] from source: 212.133.164.113, port 80, Monday, July 05, 2021 08:04:00
I ran Speedtest in the 7800 QOS page and their constant probing doesn't seem to be affecting my router speed. I'm just getting more log reports emailed to me by the 7800 since their constant probes keep filling the log buffer more quickly than usual.
I suppose I can uncheck Known "DoS attacks and Port Scans" to alleviate the logging but their constant probing has got my attention so I want to leave it checked.
Thoughts?
View attachment 34807
Alrighty I'm back again. Are any of you using the device in AP mode or just router mode? In AP this thing seems to crash for no rhyme or reason, need to set up logging on it. The only Factory firmware I remember working in AP mode was around 68. Anyone else having ap mode issues with this device
Might just be time for a network overhaul.
Alrighty I'm back again. Are any of you using the device in AP mode or just router mode? In AP this thing seems to crash for no rhyme or reason, need to set up logging on it. The only Factory firmware I remember working in AP mode was around 68. Anyone else having ap mode issues with this device
Might just be time for a network overhaul.
Thanks! I wasn't familiar with Aegis until you referred me to it. Need to come up to speed on it and implement it on my 7800.You can blocklist it with aegis
Unfortunately tried this. It is working fine right now after a crash last night. I ordered a ubiquiti AP to just get this thing stable before the gf kills me while trying to do her MS program lolBoth my R7800s are running .86SF as APs, no issues whatsoever.
I would recommend flashing to NG .82 stock, doing a factory reset, then flashing back to .86SF and doing a factory reset again and then configuring it from scratch.
the R7800 has a firewall that mostly only blocks inbound traffic, but blocks no outbound traffic. I.e. all devices on your network can connect to any destination on internet.Just so I understand better... the 7800 implements it's own firewall. Aegis is another firewall virtually in front of the 7800?
Like @R. Gerrits said, it is using the existing built-in firewall and adds its own rules, using iptables and ipset. It uses lists (remote and local) to block all traffic from and to undesired IPs or IP ranges.Thanks! I wasn't familiar with Aegis until you referred me to it. Need to come up to speed on it and implement it on my 7800.
Just so I understand better... the 7800 implements it's own firewall. Aegis is another firewall virtually in front of the 7800?
I'm starting to look at the Aegis 1.7.x thread and I saw Aegis on GitHub.
@HELLO_wORLDthe R7800 has a firewall that mostly only blocks inbound traffic, but blocks no outbound traffic. I.e. all devices on your network can connect to any destination on internet.
Aegis adds a rules to that firewall so that also a lot of outbound traffic is blocked, to addresses that are considered dangerous.
(so that your devices on your network for instance are less likely to download malware.)
Soo even more interesting, the device only crashes when I spin up the gf's MacBook Pro. I'll have to see what the packet captures/logs say. I've already ordered a ubiquiti AP as I was tired of troubleshootingUnfortunately tried this. It is working fine right now after a crash last night. I ordered a ubiquiti AP to just get this thing stable before the gf kills me while trying to do her MS program lol
Yes, aegis is blocking after the routing process, so the router’s log still catches the external probe. Also, aegis has its own log and stats as well.@HELLO_wORLD
Shields Up port test confirms that inbound probes are not being responded to. My 7800 ports are in stealth mode. The 7800 sees the port probe and logs it (but doesn't respond).
Will the 7800 still see and log the external port probes if I use Aegis to blacklist the external ip addresses that are firing off the port probes?
I realize that the following is not related to 86SF. I posted here because most of the really smart guys will be monitoring this thread.
Since 7-01-2021 1:55am PT, my 7800 has been bombarded with a probe on port 80 from the same source or slight variants on the ip address.
[DoS Attack: SYN/ACK Scan] from source: 212.133.164.75, port 80, Thursday, July 01, 2021 01:55:19
[DoS Attack: SYN/ACK Scan] from source: 212.133.164.75, port 80, Thursday, July 01, 2021 02:02:42
.
.
.
[DoS Attack: SYN/ACK Scan] from source: 212.133.164.83, port 80, Monday, July 05, 2021 08:03:29
[DoS Attack: SYN/ACK Scan] from source: 212.133.164.113, port 80, Monday, July 05, 2021 08:04:00
I ran Speedtest in the 7800 QOS page and their constant probing doesn't seem to be affecting my router speed. I'm just getting more log reports emailed to me by the 7800 since their constant probes keep filling the log buffer more quickly than usual.
I suppose I can uncheck Known "DoS attacks and Port Scans" to alleviate the logging but their constant probing has got my attention so I want to leave it checked.
Thoughts?
[DoS Attack: SYN/ACK Scan] from source: 212.133.164.217, port 80, Wednesday, July 07, 2021 20:36:52
[DoS Attack: SYN/ACK Scan] from source: 212.133.164.81, port 80, Wednesday, July 07, 2021 20:32:24
[admin login] from source 192.168.87.8, Wednesday, July 07, 2021 20:32:01
[DoS Attack: SYN/ACK Scan] from source: 212.133.164.96, port 80, Wednesday, July 07, 2021 20:31:33
And the probe from 212.133.164.xxx is always to port 80. Consistent, persistent, and annoying.After reading your post, I checked my log and surprisingly I have them from that IP range.
Code:[DoS Attack: SYN/ACK Scan] from source: 212.133.164.217, port 80, Wednesday, July 07, 2021 20:36:52 [DoS Attack: SYN/ACK Scan] from source: 212.133.164.81, port 80, Wednesday, July 07, 2021 20:32:24 [admin login] from source 192.168.87.8, Wednesday, July 07, 2021 20:32:01 [DoS Attack: SYN/ACK Scan] from source: 212.133.164.96, port 80, Wednesday, July 07, 2021 20:31:33
I am still on .85, not sure if other people have the same problem.
In aegis, just add 212.133.164.0/24 in the custom global block list, and voilàAnd the probe from 212.133.164.xxx is always to port 80. Consistent, persistent, and annoying.
I just signed up for the forum and am a little confused. I've been running dd-wrt but wanted to try Voxel's firmware to see if the wireless was better. I thought I got the newest version V1.02.86SF installed but noticed there was nothing showing (Voxel) on the main screen like I'd seen in pictures so kept thinking I did something wrong.
I reverted to an older version 1.0.1... of the Netgear stock firmware then upgraded to 1.0.2.59S version of Voxel and it did show (Voxel) next to the version on the router screen. Finally I upgraded to the newest version of Voxel, 86SF, again and the name is gone. Did he remove his name next to the Version at some point?
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!