NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.

Forum Discussion

Thompa3642's avatar
May 18, 2017
Solved

Nighthawk R6700v2 losing connection to CM700 Modem

Hi there,

We are relatively new Comcast Xfinity custmers and decided to buy our own Modem (CM700) and Router (Nighthawk R6700v2).

Every morning we find that our computers are disconnected from the internet (DNS Server error), although the Comcast Home Security system is connected through our Modem... and I can access the Internet on my phone when the computers show they are disconnected, however.

Each morning, I have manually reset the modem. Today, however, I reset the router instead and the system came back up... which suggests the problem is with the router.

I have been told Comcast send updates around midnight every day... and thought this might be causing the modem/routers issues...

Can anyone advise on how I would investigate the issue with the router?

 

Thanks in anticipation,

Allan

 

  • Hi there,

    Wanted to update this thread....

    Since I downloaded and installed the latest firmware for the R6700 to V1.2.0.12_1.0.1, 4 days ago, my disconnection issues in the mornings has evaporated!

    I know it is early days... but the update seems to have worked!

    Thank you for doing this!

    Made our lives much easier!

    Regards,

    Allan Thompson

15 Replies

  • I am having the same issues.  The only difference is that we have a motorola surfboard modem.  Would love some help too.

  • JamesGL's avatar
    JamesGL
    NETGEAR Employee Retired

    Hi All,

     

    If the router has no connection, bypass the router and check if the modem has internet without rebooting it.

    • JamesGL's avatar
      JamesGL
      NETGEAR Employee Retired

      Hi All,

       

      We’d greatly appreciate hearing your feedback letting us know if you need further assistance.

    • Thompa3642's avatar
      Thompa3642
      Tutor

      Hi there,

      Thanks for replying - we are away from home at the moment..

      Yes, bypassing the router and using just the modem, gives us access to the internet

       Hoping this helps!

      regards,

      Allan

    • Thompa3642's avatar
      Thompa3642
      Tutor

      Hi Again,

      Sadly after being away for a few months we returned home to our home and found we are still experiencing the same issues... each morning I have to reset the system to reconnect to the internet..

       

      I immediately checked to see whether there were any firmware updates... to make sure I was running the latest.

      I have investigated and am bemused by what I found...

      Some wireless and wired devices are disconnected from the imrenet... but some remain connected.

      My phone remains connected and I can happily browse the internet, read emails etc. but my wife's Chromebook is disconnected.

      I rebooted the modem (CM700) and this had no effect on the connected devices.

      Had to reboot the R6700v2 and this reconnected us to the Internet.

      Checking the log on the R6700v2:

      [DoS attack: ACK Scan] from source: 31.13.67.11:443 Sunday, December 10,2017 11:12:53        
      [DHCP IP: (192.168.1.15)] to MAC address 44:61:32:08:40:37 Sunday, December 10,2017 11:12:38   (Thermostat)  
      [DoS attack: ACK Scan] from source: 192.241.185.248:443 Sunday, December 10,2017 11:12:25        
      [DoS attack: ACK Scan] from source: 104.154.164.197:443 Sunday, December 10,2017 11:12:05        
      [admin login] from source 192.168.1.10 Sunday, December 10,2017 11:11:50        
      [DHCP IP: (192.168.1.15)] to MAC address 44:61:32:08:40:37 Sunday, December 10,2017 11:11:38        (Thermostat)
      [DoS attack: ACK Scan] from source: 52.39.177.168:443 Sunday, December 10,2017 11:11:09        
      [DHCP IP: (192.168.1.15)] to MAC address 44:61:32:08:40:37 Sunday, December 10,2017 11:10:37        (Thermostat)
      [DoS attack: ACK Scan] from source: 192.241.185.248:443 Sunday, December 10,2017 11:10:25        
      [DoS attack: ACK Scan] from source: 104.154.164.197:443 Sunday, December 10,2017 11:10:04        
      [DoS attack: ACK Scan] from source: 34.228.163.174:443 Sunday, December 10,2017 11:09:43        
      [UPnP set event:AddPortMapping] from source 192.168.1.36 Sunday, December 10,2017 11:09:39        
      [DHCP IP: (192.168.1.4)] to MAC address 48:D2:24:1F:B8:49 Sunday, December 10,2017 11:09:38        (Windows laptop)
      [DHCP IP: (192.168.1.15)] to MAC address 44:61:32:08:40:37 Sunday, December 10,2017 11:09:36        (Thermostat)
      [DoS attack: ACK Scan] from source: 62.254.26.207:993 Sunday, December 10,2017 11:09:29        
      [DoS attack: ACK Scan] from source: 52.39.177.168:443 Sunday, December 10,2017 11:09:08        
      [DoS attack: ACK Scan] from source: 74.125.139.188:5228 Sunday, December 10,2017 11:08:46        
      [DHCP IP: (192.168.1.21)] to MAC address E0:46:9A:44:42:31 Sunday, December 10,2017 11:08:34        (xfinity Security modem)
      [DHCP IP: (192.168.1.15)] to MAC address 44:61:32:08:40:37 Sunday, December 10,2017 11:08:34        (Thermostat)
      [DoS attack: ACK Scan] from source: 62.254.26.207:993 Sunday, December 10,2017 11:08:21        
      [DHCP IP: (192.168.1.15)] to MAC address 44:61:32:08:40:37 Sunday, December 10,2017 11:07:34        (Thermostat)
      [DoS attack: ACK Scan] from source: 62.254.26.207:993 Sunday, December 10,2017 11:07:21        
      [DoS attack: ACK Scan] from source: 13.115.29.218:5223 Sunday, December 10,2017 11:07:01        
      [DoS attack: ACK Scan] from source: 62.254.26.207:993 Sunday, December 10,2017 11:06:40        
      [DHCP IP: (192.168.1.15)] to MAC address 44:61:32:08:40:37 Sunday, December 10,2017 11:06:33        (Thermostat)
      [DoS attack: ACK Scan] from source: 65.52.108.219:443 Sunday, December 10,2017 11:06:18        
      [DHCP IP: (192.168.1.19)] to MAC address F4:B7:E2:28:BC:11 Sunday, December 10,2017 11:05:59        (Printer)
      [DoS attack: ACK Scan] from source: 62.254.26.207:993 Sunday, December 10,2017 11:05:57        
      [DHCP IP: (192.168.1.18)] to MAC address 02:0F:B5:07:37:40 Sunday, December 10,2017 11:05:49        
      [DHCP IP: (192.168.1.17)] to MAC address D0:76:58:07:A4:66 Sunday, December 10,2017 11:05:45        
      [DoS attack: ACK Scan] from source: 62.254.26.207:993 Sunday, December 10,2017 11:05:37        
      [UPnP set event:AddPortMapping] from source 192.168.1.4 Sunday, December 10,2017 11:05:37        
      [DoS attack: ACK Scan] from source: 62.254.26.207:993 Sunday, December 10,2017 11:05:34        
      [UPnP set event:AddPortMapping] from source 192.168.1.10 Sunday, December 10,2017 11:05:33        
      [DoS attack: ACK Scan] from source: 54.198.88.45:3478 Sunday, December 10,2017 11:05:32        
      [DHCP IP: (192.168.1.15)] to MAC address 44:61:32:08:40:37 Sunday, December 10,2017 11:05:32        (Thermostat)
      [DHCP IP: (192.168.1.11)] to MAC address 00:1F:1F:22:8C:B4 Sunday, December 10,2017 11:05:28        
      [DHCP IP: (192.168.1.16)] to MAC address 2C:3A:E8:26:89:86 Sunday, December 10,2017 11:05:15        
      [DoS attack: ACK Scan] from source: 65.52.108.212:443 Sunday, December 10,2017 11:05:10        
      [DHCP IP: (192.168.1.19)] to MAC address F4:B7:E2:28:BC:11 Sunday, December 10,2017 11:04:58        
      [DHCP IP: (192.168.1.7)] to MAC address 6C:33:A9:2E:B8:71 Sunday, December 10,2017 11:04:56        
      [DHCP IP: (192.168.1.7)] to MAC address 6C:33:A9:2E:B8:71 Sunday, December 10,2017 11:04:56        
      [DHCP IP: (192.168.1.7)] to MAC address 6C:33:A9:2E:B8:71 Sunday, December 10,2017 11:04:56        
      [DHCP IP: (192.168.1.7)] to MAC address 6C:33:A9:2E:B8:71 Sunday, December 10,2017 11:04:56        
      [DHCP IP: (192.168.1.7)] to MAC address 6C:33:A9:2E:B8:71 Sunday, December 10,2017 11:04:56        
      [DoS attack: ACK Scan] from source: 172.217.8.78:443 Sunday, December 10,2017 11:04:50        
      [admin login] from source 192.168.1.10 Sunday, December 10,2017 11:04:44        
      [UPnP set event:AddPortMapping] from source 192.168.1.9 Sunday, December 10,2017 11:04:39        
      [DoS attack: ACK Scan] from source: 65.52.108.226:443 Sunday, December 10,2017 11:04:38        
      [UPnP set event:AddPortMapping] from source 192.168.1.8 Sunday, December 10,2017 11:04:37        
      [UPnP set event:AddPortMapping] from source 192.168.1.8 Sunday, December 10,2017 11:04:37        
      [UPnP set event:AddPortMapping] from source 192.168.1.8 Sunday, December 10,2017 11:04:37        
      [UPnP set event:AddPortMapping] from source 192.168.1.8 Sunday, December 10,2017 11:04:37        
      [UPnP set event:AddPortMapping] from source 192.168.1.8 Sunday, December 10,2017 11:04:37        
      [DHCP IP: (192.168.1.15)] to MAC address 44:61:32:08:40:37 Sunday, December 10,2017 11:04:32        
      [DHCP IP: (192.168.1.15)] to MAC address 44:61:32:08:40:37 Sunday, December 10,2017 11:04:32        
      [DHCP IP: (192.168.1.15)] to MAC address 44:61:32:08:40:37 Sunday, December 10,2017 11:04:32        
      [DHCP IP: (192.168.1.15)] to MAC address 44:61:32:08:40:37 Sunday, December 10,2017 11:04:32        
      [DHCP IP: (192.168.1.15)] to MAC address 44:61:32:08:40:37 Sunday, December 10,2017 11:04:32        
      [DoS attack: ACK Scan] from source: 62.254.26.223:993 Sunday, December 10,2017 11:04:29        
      [DHCP IP: (192.168.1.14)] to MAC address D0:E7:82:D6:0E:21 Sunday, December 10,2017 11:04:18        
      [DHCP IP: (192.168.1.12)] to MAC address EC:1A:59:EB:9F:D5 Sunday, December 10,2017 11:04:17        
      [DHCP IP: (192.168.1.6)] to MAC address 02:0F:B5:02:AF:57 Sunday, December 10,2017 11:04:15        
      [DHCP IP: (192.168.1.11)] to MAC address 00:1F:1F:22:8C:B4 Sunday, December 10,2017 11:04:14        
      [Time synchronized with NTP server time-a.netgear.com] Sunday, December 10,2017 11:04:13        
      [DHCP IP: (192.168.1.9)] to MAC address 02:0F:B5:AA:9F:FC Sunday, December 10,2017 11:04:12        
      [DoS attack: ACK Scan] from source: 192.241.185.248:443 Sunday, December 10,2017 11:04:09        
      [DHCP IP: (192.168.1.11)] to MAC address 00:1F:1F:22:8C:B4 Sunday, December 10,2017 11:04:09        
      [DHCP IP: (192.168.1.4)] to MAC address 48:D2:24:1F:B8:49 Sunday, December 10,2017 11:04:08        
      [DHCP IP: (192.168.1.5)] to MAC address 70:4F:57:B8:D2:49 Sunday, December 10,2017 11:04:06        
      [Internet connected] IP address: 73.55.27.178 Sunday, December 10,2017 11:04:06        
      [DHCP IP: (192.168.1.2)] to MAC address 10:A5:D0:85:37:F3 Sunday, December 10,2017 11:04:06        
      [DHCP IP: (192.168.1.20)] to MAC address A4:C4:94:79:4D:2A Sunday, December 10,2017 11:04:06        
      [DHCP IP: (192.168.1.5)] to MAC address 70:4F:57:B8:D2:49 Sunday, December 10,2017 11:04:06        
      [DHCP IP: (192.168.1.3)] to MAC address 00:23:A7:2B:B8:28 Sunday, December 10,2017 11:04:04       

       

      Can all of the reported DoS attacks be correct?

       

      Here's a grab from the CM700 just now... after I had another disconnection!

      Startup Procedure
      ProcedureStatusComment
      Acquire Downstream Channel753000000 HzLocked
      Connectivity StateOkOperational
      Boot StateOkOperational
      SecurityEnabledBPI+
      IP Provisioning ModeHonor MDDhonorMdd(4)

      Downstream Bonded Channels
      ChannelLock StatusModulationChannel IDFrequencyPowerSNRCorrectablesUnCorrectables
      1LockedQAM 2561591000000 Hz3.7 dBmV38.9 dB4612912
      2LockedQAM 2562597000000 Hz3.9 dBmV38.9 dB5112704
      3LockedQAM 2563603000000 Hz4.0 dBmV38.9 dB10812810
      4LockedQAM 2564609000000 Hz4.0 dBmV38.9 dB3861757
      5LockedQAM 2565615000000 Hz4.0 dBmV38.6 dB9252197
      6LockedQAM 2566621000000 Hz4.0 dBmV38.6 dB6061639
      7LockedQAM 2567627000000 Hz4.0 dBmV38.9 dB3201527
      8LockedQAM 2568633000000 Hz3.7 dBmV38.9 dB5022461
      9LockedQAM 2569639000000 Hz3.7 dBmV38.9 dB4902528
      10LockedQAM 25610645000000 Hz3.7 dBmV38.9 dB6981281
      11LockedQAM 25611651000000 Hz3.5 dBmV38.9 dB5731390
      12LockedQAM 25612657000000 Hz3.4 dBmV38.9 dB4122753
      13LockedQAM 25613663000000 Hz3.5 dBmV38.6 dB6161484
      14LockedQAM 25614669000000 Hz3.5 dBmV38.6 dB4781741
      15LockedQAM 25615675000000 Hz3.4 dBmV38.9 dB4351838
      16LockedQAM 25616681000000 Hz3.2 dBmV38.6 dB3101565
      17LockedQAM 25617687000000 Hz3.0 dBmV38.9 dB6292650
      18LockedQAM 25618693000000 Hz3.0 dBmV38.9 dB5681466
      19LockedQAM 25619699000000 Hz3.0 dBmV38.6 dB6751348
      20LockedQAM 25620705000000 Hz2.9 dBmV38.6 dB5042576
      21LockedQAM 25621711000000 Hz2.7 dBmV38.6 dB4632857
      22LockedQAM 25622717000000 Hz2.2 dBmV37.6 dB6812395
      23LockedQAM 25623723000000 Hz1.7 dBmV38.6 dB8212442
      24LockedQAM 25624729000000 Hz0.9 dBmV37.9 dB153705
      25LockedQAM 25625735000000 Hz0.2 dBmV37.6 dB276671
      26LockedQAM 25626741000000 Hz-0.2 dBmV37.3 dB303732
      27LockedQAM 25627747000000 Hz-1.0 dBmV36.9 dB351845
      28LockedQAM 25628753000000 Hz-1.7 dBmV36.6 dB7944698
      29Not LockedN/AN/A0 Hz0.0 dBmV0.0 dB00
      30Not LockedN/AN/A0 Hz0.0 dBmV0.0 dB00
      31Not LockedN/AN/A0 Hz0.0 dBmV0.0 dB00
      32Not LockedN/AN/A0 Hz0.0 dBmV0.0 dB00

      Upstream Bonded Channels
      ChannelLock StatusUS Channel TypeChannel IDSymbol RateFrequencyPower
      1LockedATDMA45120 Ksym/sec16600000 Hz43.0 dBmV
      2LockedATDMA35120 Ksym/sec23000000 Hz42.3 dBmV
      3LockedATDMA25120 Ksym/sec29400000 Hz41.5 dBmV
      4LockedATDMA15120 Ksym/sec35800000 Hz41.0 dBmV
      5Not LockedN/AUnknown0 Ksym/sec0 Hz0.0 dBmV
      6Not LockedN/AUnknown0 Ksym/sec0 Hz0.0 dBmV
      7Not LockedN/AUnknown0 Ksym/sec0 Hz0.0 dBmV
      8Not LockedN/AUnknown0 Ksym/sec0 Hz0.0 dBmV

       

      Hope someone can help us!

      Regards,

      Allan

      • Thompa3642's avatar
        Thompa3642
        Tutor

        Interesting thsi morning.... using my phone on the internet while my wife could not get an internet connection.... she was not happy... but that isn't the point!

        When I checked my phone wif connection. I was connected to the 5G signal and she was not. I changed my phone's wifi to connect to the 2.4Ghz signal and immediately was told there was no internet connection. Weird!

         

        Does this help anyone analyse why I still have to reset the R6700v2 every morning?

        Very desparate for a solution now... will be nuying another router in the January sales!

  • Hi there,

    Wanted to update this thread....

    Since I downloaded and installed the latest firmware for the R6700 to V1.2.0.12_1.0.1, 4 days ago, my disconnection issues in the mornings has evaporated!

    I know it is early days... but the update seems to have worked!

    Thank you for doing this!

    Made our lives much easier!

    Regards,

    Allan Thompson