NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
Mrbchambers
Mar 04, 2019Guide
[DoS Attack: IP Spoofing] from source: 192.168.1.1, port 57985, Monday, March 04, 2019 14:34:17 [DoS
I have just setup and started to use a Nighthawk XR500 (Previously using R1 with DumaOS installed), when I looked at the log all I could see was [DoS Attack: IP Spoofing] from source: 192.168.1.1, po...
- Mar 05, 2019
Ah, That explains it. Yes, having another router infront of the XR router would probably generate this condition. This would be a double NAT condition which isn't recommended.
What happens if you replace the TP=Link router with the XR router? I presume it would work well.
FYI, I tried the AC5400, nice and all. Not good for multiple game consoles playing same game at the same time and forum support is lacking. Also upgrading FW, you can revert back FW versions either. I sent mine back.
Mrbchambers wrote:
Sorry I should have told you this from the start, my current configuration is:- TP-Link N600 Model TD-W9980 in bridge mode, to supply a VDSL connection (Via PPOE) to a TP-Link AC5400 gaming router, and then onto the XR500.
I removed the XR from the main host routers DMZ as you suggested, and I couldn't see any reduction in generation of [DoS Attack: IP Spoofing] from source: 192.168.1.1messages. Also I have removed all wired access, and wireless access, and left the routers to do their own thing. On reconnection of this (imac) machine the log seems to have the same number of entries as it would have with everything connected.
Mrbchambers
Mar 05, 2019Guide
Sorry I should have told you this from the start, my current configuration is:- TP-Link N600 Model TD-W9980 in bridge mode, to supply a VDSL connection (Via PPOE) to a TP-Link AC5400 gaming router, and then onto the XR500.
I removed the XR from the main host routers DMZ as you suggested, and I couldn't see any reduction in generation of [DoS Attack: IP Spoofing] from source: 192.168.1.1messages. Also I have removed all wired access, and wireless access, and left the routers to do their own thing. On reconnection of this (imac) machine the log seems to have the same number of entries as it would have with everything connected.
FURRYe38
Mar 05, 2019Guru - Experienced User
Ah, That explains it. Yes, having another router infront of the XR router would probably generate this condition. This would be a double NAT condition which isn't recommended.
What happens if you replace the TP=Link router with the XR router? I presume it would work well.
FYI, I tried the AC5400, nice and all. Not good for multiple game consoles playing same game at the same time and forum support is lacking. Also upgrading FW, you can revert back FW versions either. I sent mine back.
Mrbchambers wrote:
Sorry I should have told you this from the start, my current configuration is:- TP-Link N600 Model TD-W9980 in bridge mode, to supply a VDSL connection (Via PPOE) to a TP-Link AC5400 gaming router, and then onto the XR500.
I removed the XR from the main host routers DMZ as you suggested, and I couldn't see any reduction in generation of [DoS Attack: IP Spoofing] from source: 192.168.1.1messages. Also I have removed all wired access, and wireless access, and left the routers to do their own thing. On reconnection of this (imac) machine the log seems to have the same number of entries as it would have with everything connected.
- MrbchambersMar 05, 2019Guide
FURRYe38 wrote:
Ah, That explains it. Yes, having another router infront of the XR router would probably generate this condition. This would be a double NAT condition which isn't recommended.
What happens if you replace the TP=Link router with the XR router? I presume it would work well.
FYI, I tried the AC5400, nice and all. Not good for multiple game consoles playing same game at the same time and forum support is lacking. Also upgrading FW, you can revert back FW versions either. I sent mine back.
Mrbchambers wrote:
Sorry I should have told you this from the start, my current configuration is:- TP-Link N600 Model TD-W9980 in bridge mode, to supply a VDSL connection (Via PPOE) to a TP-Link AC5400 gaming router, and then onto the XR500.
I removed the XR from the main host routers DMZ as you suggested, and I couldn't see any reduction in generation of [DoS Attack: IP Spoofing] from source: 192.168.1.1messages. Also I have removed all wired access, and wireless access, and left the routers to do their own thing. On reconnection of this (imac) machine the log seems to have the same number of entries as it would have with everything connected.
That worked, no more DoS Attack:IP Spoofing messages, well if I do get them at least I will be able to see them!
Thank you.
Re the TP-Link AC5400, I may just sell it.
Thank you againg really appreciate this.
- FURRYe38Mar 06, 2019Guru - Experienced User
Glad that worked. Ya, I think the 5400 is ok. Lacks a few things. I was not impressed by there forum support. Zero Reponses there to questions I posted. Nothing much from officials there. I returned mine.
Please mark your post as solved so others will know for future reference.
Enjoy the XR router. :smileywink:
Mrbchambers wrote:
FURRYe38 wrote:
Ah, That explains it. Yes, having another router infront of the XR router would probably generate this condition. This would be a double NAT condition which isn't recommended.
What happens if you replace the TP=Link router with the XR router? I presume it would work well.
FYI, I tried the AC5400, nice and all. Not good for multiple game consoles playing same game at the same time and forum support is lacking. Also upgrading FW, you can revert back FW versions either. I sent mine back.
Mrbchambers wrote:
Sorry I should have told you this from the start, my current configuration is:- TP-Link N600 Model TD-W9980 in bridge mode, to supply a VDSL connection (Via PPOE) to a TP-Link AC5400 gaming router, and then onto the XR500.
I removed the XR from the main host routers DMZ as you suggested, and I couldn't see any reduction in generation of [DoS Attack: IP Spoofing] from source: 192.168.1.1messages. Also I have removed all wired access, and wireless access, and left the routers to do their own thing. On reconnection of this (imac) machine the log seems to have the same number of entries as it would have with everything connected.
That worked, no more DoS Attack:IP Spoofing messages, well if I do get them at least I will be able to see them!
Thank you.
Re the TP-Link AC5400, I may just sell it.
Thank you againg really appreciate this.