NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
Edivas
Aug 24, 2016Aspirant
xt_TCPMSS: bad length (160 bytes) meaning
Hi, anyone has an idea what does this error mean: Tue Aug 23 18:23:58 2016((GMT)) [SRX5308][Kernel][KERNEL] printk: 104130 messages suppressed.
Tue Aug 23 18:23:58 2016((GMT)) [SRX5308][Kernel][KERN...
- Aug 26, 2016
Ok, found an answer what was the cause of it. In my case this was a ddos attack on our servers. I quess it overfilled the firewall with packets or connections. I enabled session limitting then and logs showed connetions from different adreses. That didn't help of course... still got locked out. Only checked the logs when it stopped.
Thanks
JohnRo
Aug 25, 2016NETGEAR Employee Retired
Hello Edivas,
Welcome to the community!
I'm not familiar with the error message you are getting, doing a search online shows different causes on why the error shows up. What changes have you made to the firewall/network before you got this error? How old is the router?
Thanks,
Edivas
Aug 26, 2016Aspirant
Ok, found an answer what was the cause of it. In my case this was a ddos attack on our servers. I quess it overfilled the firewall with packets or connections. I enabled session limitting then and logs showed connetions from different adreses. That didn't help of course... still got locked out. Only checked the logs when it stopped.
Thanks
- JohnRoAug 26, 2016NETGEAR Employee Retired
Hi Edivas,
I see. Try enabling "Block TCP flood", you can find this settin in Security>Firewall>Attack checks. See if this will help.
Thanks,
- EdivasAug 26, 2016Aspirant
"Block TCP flood" was enabled and set up at 40 packets per second, but it didn't help. Unless i need to set it to even lower value?
Related Content
NETGEAR Academy

Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology!
Join Us!