- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
Orbi Satellites constantly dropping. Have to hard reset
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Orbi Satellites constantly dropping. Have to hard reset
I have an RBR40 and 2x RBS40 satellites (main router in the center of the house, each satellite on opposite sides of the house). I am getting constant satellite drops every day, multiple times. I have pasted my logs (from 12:00 PM today to present). I am using the most current firmware. I could really use some help because this is a daily thing and is driving me crazy. My whole family streams, (4 PCs, 1 Nvidia Shield, PS4 and about 4 phones). I have Xfinity 150 Mbps speed. I have tried factory resets, changing settings (daisy chain on/off, etc.) without any luck. Only thing that works is a hard reset each time. I have reset probably at least 8 times just today. It normally happens at night when everyone is one. Makes me think it has to do with the amount of downloading. Example: I was downloading a game today from my PC (Hardwired to Sattelite 25 ft from main router) and after only 2mins the internet dropped. I restarted satellite and same thing. I decided not to download game. It just seems to always happen when a lot of people are streaming. I thought the Orbi could handle this amount of traffic?
Any help would be appreciated.
------------------------------------------------------------------------
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 19:36:24
[admin login] from source 192.168.1.17, Saturday, February 10, 2018 19:36:14
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 19:24:36
[DHCP IP: 192.168.1.4] to MAC address 00:04:4b:5e:7d:4b, Saturday, February 10, 2018 19:14:57
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 19:14:27
[DHCP IP: 192.168.1.17] to MAC address d0:50:99:53:0e:23, Saturday, February 10, 2018 19:13:07
[DHCP IP: 192.168.1.3] to MAC address 08:02:8e:a0:aa:5a, Saturday, February 10, 2018 19:12:52
[DHCP IP: 192.168.1.9] to MAC address 00:04:4b:5e:7d:49, Saturday, February 10, 2018 19:10:52
[DoS Attack: SYN/ACK Scan] from source: 81.161.59.85, port 80, Saturday, February 10, 2018 19:09:33
[DoS Attack: SYN/ACK Scan] from source: 81.161.59.90, port 80, Saturday, February 10, 2018 19:09:25
[DoS Attack: SYN/ACK Scan] from source: 81.161.59.85, port 80, Saturday, February 10, 2018 19:09:17
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 19:04:13
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 18:56:30
[DHCP IP: 192.168.1.10] to MAC address 78:f8:82:ca:2f:79, Saturday, February 10, 2018 18:56:25
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 18:56:15
[DHCP IP: 192.168.1.4] to MAC address 00:04:4b:5e:7d:4b, Saturday, February 10, 2018 18:50:39
[DHCP IP: 192.168.1.17] to MAC address d0:50:99:53:0e:23, Saturday, February 10, 2018 18:48:45
[DHCP IP: 192.168.1.3] to MAC address 08:02:8e:a0:aa:5a, Saturday, February 10, 2018 18:48:32
[DHCP IP: 192.168.1.9] to MAC address 00:04:4b:5e:7d:49, Saturday, February 10, 2018 18:46:41
[DoS Attack: ACK Scan] from source: 52.85.38.12, port 443, Saturday, February 10, 2018 18:44:50
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 18:44:24
[DoS Attack: ACK Scan] from source: 52.85.38.12, port 443, Saturday, February 10, 2018 18:44:19
[DoS Attack: TCP/UDP Echo] from source: 192.241.168.39, port 48928, Saturday, February 10, 2018 18:38:15
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 18:36:22
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 18:26:15
[DHCP IP: 192.168.1.20] to MAC address a0:02:dc:39:d6:76, Saturday, February 10, 2018 18:25:38
[DHCP IP: 192.168.1.7] to MAC address 78:e1:03:e8:a5:44, Saturday, February 10, 2018 18:25:25
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 18:14:21
[UPnP set event: del_nat_rule] from source 192.168.1.27, Saturday, February 10, 2018 18:11:40
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 18:06:10
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 17:35:50
[DHCP IP: 192.168.1.16] to MAC address 20:68:9d:75:17:a8, Saturday, February 10, 2018 17:35:39
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 17:24:13
[UPnP set event: add_nat_rule] from source 192.168.1.27, Saturday, February 10, 2018 17:18:27
[UPnP set event: del_nat_rule] from source 192.168.1.27, Saturday, February 10, 2018 17:18:05
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 17:05:58
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 17:04:06
[DHCP IP: 192.168.1.16] to MAC address 20:68:9d:75:17:a8, Saturday, February 10, 2018 16:56:37
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 16:54:04
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 16:35:49
[UPnP set event: add_nat_rule] from source 192.168.1.27, Saturday, February 10, 2018 16:35:18
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 16:25:48
[DHCP IP: 192.168.1.8] to MAC address 78:f8:82:cb:c4:3e, Saturday, February 10, 2018 16:25:22
[DHCP IP: 192.168.1.6] to MAC address d0:13:fd:2e:64:03, Saturday, February 10, 2018 16:24:43
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 16:24:43
[DHCP IP: 192.168.1.6] to MAC address d0:13:fd:2e:64:03, Saturday, February 10, 2018 16:22:52
[DHCP IP: 192.168.1.5] to MAC address d8:50:e6:e5:a1:0a, Saturday, February 10, 2018 16:21:10
[DHCP IP: 192.168.1.2] to MAC address 08:02:8e:a0:ab:18, Saturday, February 10, 2018 16:20:39
[DHCP IP: 192.168.1.8] to MAC address 78:f8:82:cb:c4:3e, Saturday, February 10, 2018 16:17:08
[DoS Attack: ACK Scan] from source: 184.84.244.82, port 80, Saturday, February 10, 2018 16:10:35
[DoS Attack: ACK Scan] from source: 184.84.244.10, port 80, Saturday, February 10, 2018 16:10:35
[DoS Attack: ACK Scan] from source: 184.84.244.82, port 80, Saturday, February 10, 2018 16:09:53
[DoS Attack: ACK Scan] from source: 184.84.244.10, port 80, Saturday, February 10, 2018 16:09:52
[DoS Attack: ACK Scan] from source: 184.84.244.82, port 80, Saturday, February 10, 2018 16:09:32
[DoS Attack: ACK Scan] from source: 184.84.244.10, port 80, Saturday, February 10, 2018 16:09:30
[DHCP IP: 192.168.1.4] to MAC address 00:04:4b:5e:7d:4b, Saturday, February 10, 2018 16:09:29
[UPnP set event: del_nat_rule] from source 192.168.1.17, Saturday, February 10, 2018 16:08:21
[UPnP set event: add_nat_rule] from source 192.168.1.17, Saturday, February 10, 2018 16:08:11
[UPnP set event: del_nat_rule] from source 192.168.1.17, Saturday, February 10, 2018 16:08:08
[UPnP set event: add_nat_rule] from source 192.168.1.17, Saturday, February 10, 2018 16:08:07
[UPnP set event: del_nat_rule] from source 192.168.1.17, Saturday, February 10, 2018 16:08:06
[DHCP IP: 192.168.1.17] to MAC address d0:50:99:53:0e:23, Saturday, February 10, 2018 16:08:03
[DHCP IP: 192.168.1.3] to MAC address 08:02:8e:a0:aa:5a, Saturday, February 10, 2018 16:07:27
[DHCP IP: 192.168.1.12] to MAC address 00:d9:d1:c8:0e:24, Saturday, February 10, 2018 16:04:46
[DHCP IP: 192.168.1.27] to MAC address 20:16:d8:af:87:71, Saturday, February 10, 2018 15:56:48
[UPnP set event: add_nat_rule] from source 192.168.1.17, Saturday, February 10, 2018 15:18:47
[UPnP set event: del_nat_rule] from source 192.168.1.17, Saturday, February 10, 2018 15:18:47
[DHCP IP: 192.168.1.13] to MAC address 7c:04:d0:18:ff:e1, Saturday, February 10, 2018 15:16:57
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 15:09:01
[UPnP set event: add_nat_rule] from source 192.168.1.17, Saturday, February 10, 2018 15:07:29
[UPnP set event: del_nat_rule] from source 192.168.1.17, Saturday, February 10, 2018 15:07:29
[UPnP set event: add_nat_rule] from source 192.168.1.17, Saturday, February 10, 2018 15:07:26
[UPnP set event: del_nat_rule] from source 192.168.1.17, Saturday, February 10, 2018 15:07:26
[DHCP IP: 192.168.1.17] to MAC address d0:50:99:53:0e:23, Saturday, February 10, 2018 15:07:25
[UPnP set event: del_nat_rule] from source 192.168.1.17, Saturday, February 10, 2018 15:07:25
[DHCP IP: 192.168.1.4] to MAC address 00:04:4b:5e:7d:4b, Saturday, February 10, 2018 15:07:16
[DHCP IP: 192.168.1.3] to MAC address 08:02:8e:a0:aa:5a, Saturday, February 10, 2018 15:06:46
[DHCP IP: 192.168.1.12] to MAC address 00:d9:d1:c8:0e:24, Saturday, February 10, 2018 15:05:00
[DoS Attack: SYN/ACK Scan] from source: 77.150.61.144, port 6881, Saturday, February 10, 2018 15:03:05
[DoS Attack: ACK Scan] from source: 188.40.118.135, port 6962, Saturday, February 10, 2018 15:00:24
[DoS Attack: ACK Scan] from source: 5.9.12.197, port 6935, Saturday, February 10, 2018 15:00:21
[DoS Attack: ACK Scan] from source: 188.40.118.135, port 6962, Saturday, February 10, 2018 14:59:37
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 14:58:54
[DoS Attack: ACK Scan] from source: 188.40.118.135, port 6962, Saturday, February 10, 2018 14:58:54
[DoS Attack: ACK Scan] from source: 5.9.12.197, port 6935, Saturday, February 10, 2018 14:58:53
[DoS Attack: ACK Scan] from source: 188.40.118.135, port 6962, Saturday, February 10, 2018 14:58:09
[DoS Attack: ACK Scan] from source: 5.9.12.197, port 6935, Saturday, February 10, 2018 14:58:08
[DoS Attack: ACK Scan] from source: 185.59.223.16, port 80, Saturday, February 10, 2018 14:58:08
[DoS Attack: ACK Scan] from source: 188.40.118.135, port 6962, Saturday, February 10, 2018 14:57:45
[DoS Attack: ACK Scan] from source: 5.9.12.197, port 6935, Saturday, February 10, 2018 14:57:45
[DoS Attack: ACK Scan] from source: 185.59.223.16, port 80, Saturday, February 10, 2018 14:56:49
[UPnP set event: add_nat_rule] from source 192.168.1.17, Saturday, February 10, 2018 14:56:24
[UPnP set event: del_nat_rule] from source 192.168.1.17, Saturday, February 10, 2018 14:56:24
[UPnP set event: add_nat_rule] from source 192.168.1.17, Saturday, February 10, 2018 14:56:24
[UPnP set event: del_nat_rule] from source 192.168.1.17, Saturday, February 10, 2018 14:56:23
[DHCP IP: 192.168.1.17] to MAC address d0:50:99:53:0e:23, Saturday, February 10, 2018 14:56:20
[DHCP IP: 192.168.1.4] to MAC address 00:04:4b:5e:7d:4b, Saturday, February 10, 2018 14:56:08
[DHCP IP: 192.168.1.3] to MAC address 08:02:8e:a0:aa:5a, Saturday, February 10, 2018 14:55:51
[DHCP IP: 192.168.1.13] to MAC address 7c:04:d0:18:ff:e1, Saturday, February 10, 2018 14:55:33
[DoS Attack: SYN/ACK Scan] from source: 81.161.59.146, port 80, Saturday, February 10, 2018 14:52:53
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 14:49:06
[UPnP set event: add_nat_rule] from source 192.168.1.17, Saturday, February 10, 2018 14:48:44
[UPnP set event: del_nat_rule] from source 192.168.1.17, Saturday, February 10, 2018 14:48:44
[DoS Attack: ACK Scan] from source: 85.25.43.136, port 6968, Saturday, February 10, 2018 14:45:18
[DoS Attack: ACK Scan] from source: 5.9.12.197, port 6935, Saturday, February 10, 2018 14:45:16
[DoS Attack: ACK Scan] from source: 185.59.223.28, port 80, Saturday, February 10, 2018 14:44:43
[DoS Attack: ACK Scan] from source: 85.25.43.136, port 6968, Saturday, February 10, 2018 14:44:33
[DoS Attack: ACK Scan] from source: 5.9.12.197, port 6935, Saturday, February 10, 2018 14:44:31
[DoS Attack: ACK Scan] from source: 185.59.223.28, port 80, Saturday, February 10, 2018 14:44:15
[DoS Attack: ACK Scan] from source: 85.25.43.136, port 6968, Saturday, February 10, 2018 14:44:08
[DoS Attack: ACK Scan] from source: 5.9.12.197, port 6935, Saturday, February 10, 2018 14:44:08
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 14:43:03
[DoS Attack: SYN/ACK Scan] from source: 13.229.178.193, port 7777, Saturday, February 10, 2018 14:42:11
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 14:38:55
[DHCP IP: 192.168.1.13] to MAC address 7c:04:d0:18:ff:e1, Saturday, February 10, 2018 14:38:39
[DoS Attack: SYN/ACK Scan] from source: 77.150.61.144, port 6881, Saturday, February 10, 2018 14:34:19
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 14:32:57
[DoS Attack: ACK Scan] from source: 144.76.97.139, port 6908, Saturday, February 10, 2018 14:31:27
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 14:29:01
[UPnP set event: add_nat_rule] from source 192.168.1.17, Saturday, February 10, 2018 14:24:12
[DHCP IP: 192.168.1.13] to MAC address 7c:04:d0:18:ff:e1, Saturday, February 10, 2018 14:23:16
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 14:12:53
[DoS Attack: ACK Scan] from source: 8.254.247.26, port 443, Saturday, February 10, 2018 14:09:19
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 14:09:02
[DoS Attack: ACK Scan] from source: 8.254.247.26, port 443, Saturday, February 10, 2018 14:08:48
[DoS Attack: ACK Scan] from source: 86.105.196.22, port 5818, Saturday, February 10, 2018 14:05:05
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 13:48:51
[UPnP set event: add_nat_rule] from source 192.168.1.17, Saturday, February 10, 2018 13:48:51
[UPnP set event: del_nat_rule] from source 192.168.1.17, Saturday, February 10, 2018 13:48:50
[DHCP IP: 192.168.1.13] to MAC address 7c:04:d0:18:ff:e1, Saturday, February 10, 2018 13:45:55
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 13:39:06
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 13:28:56
[DHCP IP: 192.168.1.4] to MAC address 00:04:4b:5e:7d:4b, Saturday, February 10, 2018 13:27:59
[DHCP IP: 192.168.1.17] to MAC address d0:50:99:53:0e:23, Saturday, February 10, 2018 13:26:02
[DHCP IP: 192.168.1.3] to MAC address 08:02:8e:a0:aa:5a, Saturday, February 10, 2018 13:25:47
[DHCP IP: 192.168.1.13] to MAC address 7c:04:d0:18:ff:e1, Saturday, February 10, 2018 13:23:19
[DoS Attack: ACK Scan] from source: 34.193.117.77, port 5223, Saturday, February 10, 2018 13:22:33
[DHCP IP: 192.168.1.14] to MAC address b0:c0:90:21:a5:6e, Saturday, February 10, 2018 13:22:24
[DHCP IP: 192.168.1.13] to MAC address 7c:04:d0:18:ff:e1, Saturday, February 10, 2018 13:18:51
[DoS Attack: TCP/UDP Chargen] from source: 212.237.34.171, port 50458, Saturday, February 10, 2018 13:15:38
[DHCP IP: 192.168.1.13] to MAC address 7c:04:d0:18:ff:e1, Saturday, February 10, 2018 13:05:50
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 12:43:36
[DHCP IP: 192.168.1.13] to MAC address 7c:04:d0:18:ff:e1, Saturday, February 10, 2018 12:41:18
[DHCP IP: 192.168.1.8] to MAC address 78:f8:82:cb:c4:3e, Saturday, February 10, 2018 12:41:10
[DHCP IP: 192.168.1.5] to MAC address d8:50:e6:e5:a1:0a, Saturday, February 10, 2018 12:41:01
[DHCP IP: 192.168.1.2] to MAC address 08:02:8e:a0:ab:18, Saturday, February 10, 2018 12:40:50
[DHCP IP: 192.168.1.13] to MAC address 7c:04:d0:18:ff:e1, Saturday, February 10, 2018 12:36:54
[DHCP IP: 192.168.1.8] to MAC address 78:f8:82:cb:c4:3e, Saturday, February 10, 2018 12:36:23
[DHCP IP: 192.168.1.6] to MAC address d0:13:fd:2e:64:03, Saturday, February 10, 2018 12:36:18
[DHCP IP: 192.168.1.14] to MAC address b0:c0:90:21:a5:6e, Saturday, February 10, 2018 12:36:09
[DHCP IP: 192.168.1.16] to MAC address 20:68:9d:75:17:a8, Saturday, February 10, 2018 12:36:07
[DHCP IP: 192.168.1.14] to MAC address b0:c0:90:21:a5:6e, Saturday, February 10, 2018 12:32:44
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 12:11:55
[DHCP IP: 192.168.1.13] to MAC address 7c:04:d0:18:ff:e1, Saturday, February 10, 2018 12:03:52
[DoS Attack: RST Scan] from source: 24.105.29.21, port 80, Saturday, February 10, 2018 12:01:52
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: Orbi Satellites constantly dropping. Have to hard reset
I have good news and bad news. The good news is that you aren't missing anything and you don't have anything misconfigured. The bad news is that you're running into the same issue as the rest of us.
The short version of the situation is that the Orbi's have significant backhaul bugs, specifically around layer 2 traffic, and have had them for many many months (at least 10, probably more). Restarting any satellite will temporarly resolve the issues, as you've discovered.
If you're interested in, here's my post about about the issue, that goes into in a bit more depth.
It seems like you already found that posting to the refund thread is the most vocal thing you can do right now. Sadly, that's it at this point. There's nothing else to do.
The only "help" I can offer is this: Stop wasting your time troubleshooting, it's the netgear firmware and there's nothing you can do about it. And, please, don't donate your time to Netgear playing QA with their support. Many of us already have, and it's a cruel waste of time. They definitely know about the issues and have no intention of acknowledging or fixing them.
• Introducing NETGEAR WiFi 7 Orbi 770 Series and Nighthawk RS300
• What is the difference between WiFi 6 and WiFi 7?
• Yes! WiFi 7 is backwards compatible with other Wifi devices? Learn more