NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
Edivas
Aug 24, 2016Aspirant
xt_TCPMSS: bad length (160 bytes) meaning
Hi, anyone has an idea what does this error mean: Tue Aug 23 18:23:58 2016((GMT)) [SRX5308][Kernel][KERNEL] printk: 104130 messages suppressed.
Tue Aug 23 18:23:58 2016((GMT)) [SRX5308][Kernel][KERN...
- Aug 26, 2016
Ok, found an answer what was the cause of it. In my case this was a ddos attack on our servers. I quess it overfilled the firewall with packets or connections. I enabled session limitting then and logs showed connetions from different adreses. That didn't help of course... still got locked out. Only checked the logs when it stopped.
Thanks
Edivas
Aug 26, 2016Aspirant
Ok, found an answer what was the cause of it. In my case this was a ddos attack on our servers. I quess it overfilled the firewall with packets or connections. I enabled session limitting then and logs showed connetions from different adreses. That didn't help of course... still got locked out. Only checked the logs when it stopped.
Thanks
JohnRo
Aug 26, 2016NETGEAR Employee Retired
Hi Edivas,
I see. Try enabling "Block TCP flood", you can find this settin in Security>Firewall>Attack checks. See if this will help.
Thanks,
- EdivasAug 26, 2016Aspirant
"Block TCP flood" was enabled and set up at 40 packets per second, but it didn't help. Unless i need to set it to even lower value?
- DaneAAug 30, 2016NETGEAR Employee Retired
Hi Edivas,
Were you able to open an online case with NETGEAR Support for further assistance? If yes, keep us posted about the progress of your online case.
Regards,
DaneA
NETGEAR Community Team
Related Content
NETGEAR Academy
Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology!
Join Us!