NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
Christian_R
Aug 25, 2020NETGEAR Employee Retired
MR60 / MS60 - Firmware Update v1.0.6.102
Hello Nighthawk Mesh Community,
There is a new firmware available for the MR60/MS60 to help address connectivity issues. We recommend updating to firmware version 1.0.6.102 if you are experienc...
knightz01
Aug 25, 2020Apprentice
Hi Christian,
Thanks for asking and here is my feedback, I'm afraid I am still stuck on Firmware Version 1.0.4.98 (MK63) with 20WiFi + 12 wired devices, this is fairly stable(not perfect), I have tried the below firmwares more than once but keep going back as like many others I am working from home and need stability, I have had to disable auto updates, my speeds are good.
I have also suffered from the port forward bug https://community.netgear.com/t5/Nighthawk-Mesh-System/Nighthawk-MK62-Port-forward-list-empty/td-p/1946565/jump-to/first-unread-message, but found a work around not a fix.
1) Firmware Version 1.0.5.102(Many disconnects) of both the satellites & wifi clients after completing a factory default & new setup.
2) Firmware Version 1.0.6.102(Many disconnects) of both the satellites & wifi clients after completing a factory default & new setup.
Kev in the UK
- Retired_MemberAug 25, 2020
Hi!
Im only using the router (without the satellite) with Firmware v1.0.6.102.
Im having the same issues as 2 previous firmwares ago:[WLAN access rejected: incorrect security] from MAC address xx:xx:xx:xx:xx:xx
I only have 7 wireless devices (laptop, tablet, phones, tv).
I dont have any single issue with other devices.Waiting for support for their answers regarding debug logs that i already sent.
PS: i found another issue, In Advanced - Logs: i had more than 500 lines of logs and tried to filter the "known DoS attacks and Port Scans", i was unable to do this because the web browser session to the router was reset all the time that i applied this filter. The work around was to clear the logs and then remove this "known DoS attacks and Port Scans" from the list.I believe that the community will do a lot better if you give us the Telnet access to this thing.