×

Introducing the Orbi 970 Series Mesh System with WiFi 7(BE) technology. For more information visit the NETGEAR Press Room.

Orbi WiFi 7 RBE973
Reply

RBR50 Direct Fibre into WAN issues

LeeTaylor
Tutor

RBR50 Direct Fibre into WAN issues

I have Hiper direct fibre into the house. The guys from Hiper showed me how to connect directly to the Orbi using vlan tagging setting the port to 101, all other parameters the same. The fibre routre runs a Cat 8 (I think) cable into the WAN port on the Orbi.

 

I also have Circle enabled.

 

Most of the time it works fine but occasionally the internet drops. The thing is, if I run a speed test it gives me results as if I am connected to the internet, eventhough the status in the Orbi app says offline.

 

As we are all working from home this is becoming a bit difficult.

 

I have 2 questions.

 

  1. If I use the gateway which came with the fibre system and connect to that through an ethernet port does that slow things down any?
  2. If I stick with the current config is there a way of determining where the problem is?

When it works its great, when it does not......

 

Speed tests are 600meg download and 900 upload load.

 

Thanks for any help you can give.

 

Lee,

Model: RBR50|Orbi AC3000 Tri-band WiFi Router
Message 1 of 9
LeeTaylor
Tutor

Re: RBR50 Direct Fibre into WAN issues

UPDATE

 

Having looked at the logs around the time we are offlibe we have "DoS Attack: ACK Scan" in the log. Could it be linked? what is it?

Model: RBR50|Orbi AC3000 Tri-band WiFi Router
Message 2 of 9
FURRYe38
Guru

Re: RBR50 Direct Fibre into WAN issues

What Firmware version is currently loaded?
What is the Mfr and model# of the ISP modem the NG router is connected too? If there is a built in router here, 
This would be a double NAT condition which isn't recommended. https://kb.netgear.com/30186/What-is-Double-NAT
https://kb.netgear.com/30187/How-to-fix-issues-with-Double-NAT
Couple of options,
1. Configure the modem for transparent bridge or modem only mode. Then use the Orbi router in router mode. You'll need to contact the ISP for help and information in regards to the modem being bridged correctly.
2. If you can't bridge the modem, disable ALL wifi radios on the modem, configure the modems DMZ/ExposedHost or IP Pass-Through for the IP address the Orbi router gets from the modem. Then you can use the Orbi router in Router mode.
3. Or disable all wifi radios on the modem and connect the Orbi router to the modem, configure AP mode on the Orbi router. https://kb.netgear.com/31218/How-do-I-configure-my-Orbi-router-to-act-as-an-access-point and https://www.youtube.com/watch?v=H7LOcJ8GdDo&app=desktop

 

Has a factory reset and setup from scratch been performed since last FW update?

 

I would disable Circle while troubleshooting first. 

Message 3 of 9
LeeTaylor
Tutor

Re: RBR50 Direct Fibre into WAN issues

Hi Thanks for responding

 

firmware V2.5.1.8

No Double nat connecting with a PMG1005 Zytel fibre router.

 

Interestly....

 

On the Orbi app on my iPhone the internet is offline but....

On the orbilogin.com internet is good

 

However, it drops for everybody for a few minutes and then comes baclk up and is stable for a few hours.

Model: RBR50|Orbi AC3000 Tri-band WiFi Router
Message 4 of 9
LeeTaylor
Tutor

Re: RBR50 Direct Fibre into WAN issues

Here is the log for today........

 

[DHCP IP: 192.168.1.15] to MAC address 4c:24:98:75:e5:98, Wednesday, March 25, 2020 15:13:48
[DHCP IP: 192.168.1.3] to MAC address 20:df:b9:19:bc:5b, Wednesday, March 25, 2020 15:12:27
[admin login] from source 192.168.1.8, Wednesday, March 25, 2020 15:11:26
[DHCP IP: 192.168.1.35] to MAC address 90:9a:77:15:d0:9d, Wednesday, March 25, 2020 15:11:18
[DHCP IP: 192.168.1.32] to MAC address 4c:24:98:0b:a1:1a, Wednesday, March 25, 2020 15:11:16
[DHCP IP: 192.168.1.35] to MAC address 90:9a:77:15:d0:9d, Wednesday, March 25, 2020 15:11:15
[DHCP IP: 192.168.1.32] to MAC address 4c:24:98:0b:a1:1a, Wednesday, March 25, 2020 15:11:11
[DHCP IP: 192.168.1.22] to MAC address a4:83:e7:55:ca:a0, Wednesday, March 25, 2020 15:08:12
[DoS Attack: Ascend Kill] from source: 8.8.4.4, port 53, Wednesday, March 25, 2020 15:00:49
[DoS Attack: Ascend Kill] from source: 8.8.8.8, port 53, Wednesday, March 25, 2020 15:00:49
[DHCP IP: 192.168.1.23] to MAC address f8:ff:c2:38:4a:2d, Wednesday, March 25, 2020 14:52:29
[DHCP IP: 192.168.1.16] to MAC address 90:e1:7b:47:49:7c, Wednesday, March 25, 2020 14:50:46
[DHCP IP: 192.168.1.3] to MAC address 20:df:b9:19:bc:5b, Wednesday, March 25, 2020 14:38:33
[DHCP IP: 192.168.1.24] to MAC address bc:fe:d9:7c:88:9c, Wednesday, March 25, 2020 14:19:59
[DHCP IP: 192.168.1.16] to MAC address 90:e1:7b:47:49:7c, Wednesday, March 25, 2020 14:19:48
[admin login] from source 192.168.1.8, Wednesday, March 25, 2020 14:10:58
[DHCP IP: 192.168.1.24] to MAC address bc:fe:d9:7c:88:9c, Wednesday, March 25, 2020 14:09:01
[DHCP IP: 192.168.1.23] to MAC address f8:ff:c2:38:4a:2d, Wednesday, March 25, 2020 14:04:54
[DHCP IP: 192.168.1.19] to MAC address b4:9c:df:86:fb:43, Wednesday, March 25, 2020 14:01:44
[DHCP IP: 192.168.1.24] to MAC address bc:fe:d9:7c:88:9c, Wednesday, March 25, 2020 14:01:35
[DHCP IP: 192.168.1.20] to MAC address 80:2b:f9:cb:61:2d, Wednesday, March 25, 2020 13:59:51
[DHCP IP: 192.168.1.22] to MAC address a4:83:e7:55:ca:a0, Wednesday, March 25, 2020 13:56:40
[DHCP IP: 192.168.1.10] to MAC address a4:83:e7:54:d1:75, Wednesday, March 25, 2020 13:53:42
[DHCP IP: 192.168.1.22] to MAC address a4:83:e7:55:ca:a0, Wednesday, March 25, 2020 13:52:57
[DoS Attack: ACK Scan] from source: 130.211.50.202, port 443, Wednesday, March 25, 2020 13:48:49
[DHCP IP: 192.168.1.34] to MAC address c8:34:8e:36:64:87, Wednesday, March 25, 2020 13:48:48
[DoS Attack: ACK Scan] from source: 130.211.50.202, port 443, Wednesday, March 25, 2020 13:48:28
[DoS Attack: RST Scan] from source: 104.28.12.186, port 443, Wednesday, March 25, 2020 13:48:22
[DoS Attack: ACK Scan] from source: 104.28.12.186, port 443, Wednesday, March 25, 2020 13:48:22
[DoS Attack: RST Scan] from source: 104.28.12.186, port 443, Wednesday, March 25, 2020 13:48:19
[DoS Attack: ACK Scan] from source: 104.28.12.186, port 443, Wednesday, March 25, 2020 13:48:19
[DoS Attack: ACK Scan] from source: 130.211.50.202, port 443, Wednesday, March 25, 2020 13:48:18
[DoS Attack: RST Scan] from source: 104.28.13.186, port 443, Wednesday, March 25, 2020 13:48:16
[DoS Attack: ACK Scan] from source: 104.28.13.186, port 443, Wednesday, March 25, 2020 13:48:16
[DHCP IP: 192.168.1.15] to MAC address 4c:24:98:75:e5:98, Wednesday, March 25, 2020 13:48:09
[DoS Attack: ACK Scan] from source: 130.211.50.202, port 443, Wednesday, March 25, 2020 13:48:00
[DHCP IP: 192.168.1.23] to MAC address f8:ff:c2:38:4a:2d, Wednesday, March 25, 2020 13:47:58
[DoS Attack: ACK Scan] from source: 130.211.50.202, port 443, Wednesday, March 25, 2020 13:47:55
[DoS Attack: RST Scan] from source: 216.58.213.238, port 443, Wednesday, March 25, 2020 13:47:51
[DoS Attack: ACK Scan] from source: 216.58.213.238, port 443, Wednesday, March 25, 2020 13:47:51
[DoS Attack: RST Scan] from source: 172.217.218.189, port 443, Wednesday, March 25, 2020 13:47:47
[DoS Attack: ACK Scan] from source: 172.217.218.189, port 443, Wednesday, March 25, 2020 13:47:47
[DHCP IP: 192.168.1.23] to MAC address f8:ff:c2:38:4a:2d, Wednesday, March 25, 2020 13:47:31
[DHCP IP: 192.168.1.22] to MAC address a4:83:e7:55:ca:a0, Wednesday, March 25, 2020 13:47:26
[DHCP IP: 192.168.1.19] to MAC address b4:9c:df:86:fb:43, Wednesday, March 25, 2020 13:47:11
[DHCP IP: 192.168.1.15] to MAC address 4c:24:98:75:e5:98, Wednesday, March 25, 2020 13:47:03
[DHCP IP: 192.168.1.24] to MAC address bc:fe:d9:7c:88:9c, Wednesday, March 25, 2020 13:46:57
[DHCP IP: 192.168.1.22] to MAC address a4:83:e7:55:ca:a0, Wednesday, March 25, 2020 13:46:20
[DHCP IP: 192.168.1.19] to MAC address b4:9c:df:86:fb:43, Wednesday, March 25, 2020 13:46:17
[DHCP IP: 192.168.1.22] to MAC address a4:83:e7:55:ca:a0, Wednesday, March 25, 2020 13:46:15
[DHCP IP: 192.168.1.35] to MAC address 90:9a:77:15:d0:9d, Wednesday, March 25, 2020 13:46:08
[DHCP IP: 192.168.1.10] to MAC address a4:83:e7:54:d1:75, Wednesday, March 25, 2020 13:46:03
[DHCP IP: 192.168.1.19] to MAC address b4:9c:df:86:fb:43, Wednesday, March 25, 2020 13:45:57
[DHCP IP: 192.168.1.22] to MAC address a4:83:e7:55:ca:a0, Wednesday, March 25, 2020 13:45:56
[DHCP IP: 192.168.1.19] to MAC address b4:9c:df:86:fb:43, Wednesday, March 25, 2020 13:45:55
[DHCP IP: 192.168.1.22] to MAC address a4:83:e7:55:ca:a0, Wednesday, March 25, 2020 13:45:51
[DHCP IP: 192.168.1.32] to MAC address 4c:24:98:0b:a1:1a, Wednesday, March 25, 2020 13:45:38
[DHCP IP: 192.168.1.16] to MAC address 90:e1:7b:47:49:7c, Wednesday, March 25, 2020 13:19:38
[DHCP IP: 192.168.1.22] to MAC address a4:83:e7:55:ca:a0, Wednesday, March 25, 2020 13:12:18
[DHCP IP: 192.168.1.16] to MAC address 90:e1:7b:47:49:7c, Wednesday, March 25, 2020 13:05:44
[DHCP IP: 192.168.1.10] to MAC address a4:83:e7:54:d1:75, Wednesday, March 25, 2020 12:52:59
[DoS Attack: ACK Scan] from source: 143.204.233.96, port 443, Wednesday, March 25, 2020 12:50:47
[DoS Attack: ACK Scan] from source: 185.151.204.9, port 443, Wednesday, March 25, 2020 12:50:45
[DoS Attack: ACK Scan] from source: 143.204.233.96, port 443, Wednesday, March 25, 2020 12:50:43
[DoS Attack: ACK Scan] from source: 185.151.204.9, port 443, Wednesday, March 25, 2020 12:50:41
[DoS Attack: ACK Scan] from source: 143.204.233.96, port 443, Wednesday, March 25, 2020 12:50:39
[DoS Attack: ACK Scan] from source: 185.151.204.9, port 443, Wednesday, March 25, 2020 12:50:33
[DHCP IP: 192.168.1.24] to MAC address bc:fe:d9:7c:88:9c, Wednesday, March 25, 2020 12:46:36
[DHCP IP: 192.168.1.22] to MAC address a4:83:e7:55:ca:a0, Wednesday, March 25, 2020 12:44:34
[DHCP IP: 192.168.1.15] to MAC address 4c:24:98:75:e5:98, Wednesday, March 25, 2020 12:40:59
[DoS Attack: RST Scan] from source: 172.217.19.78, port 443, Wednesday, March 25, 2020 12:40:17
[DoS Attack: ACK Scan] from source: 172.217.19.78, port 443, Wednesday, March 25, 2020 12:40:13
[DoS Attack: ACK Scan] from source: 172.217.218.189, port 443, Wednesday, March 25, 2020 12:39:54
[DHCP IP: 192.168.1.35] to MAC address 90:9a:77:15:d0:9d, Wednesday, March 25, 2020 12:29:31
[DHCP IP: 192.168.1.15] to MAC address 4c:24:98:75:e5:98, Wednesday, March 25, 2020 12:15:25
[DHCP IP: 192.168.1.11] to MAC address b4:9c:df:86:9f:40, Wednesday, March 25, 2020 12:14:19
[DHCP IP: 192.168.1.32] to MAC address 4c:24:98:0b:a1:1a, Wednesday, March 25, 2020 12:14:03
[DHCP IP: 192.168.1.15] to MAC address 4c:24:98:75:e5:98, Wednesday, March 25, 2020 12:11:56
[DHCP IP: 192.168.1.32] to MAC address 4c:24:98:0b:a1:1a, Wednesday, March 25, 2020 12:11:35
[DHCP IP: 192.168.1.10] to MAC address a4:83:e7:54:d1:75, Wednesday, March 25, 2020 12:11:33
[DHCP IP: 192.168.1.33] to MAC address 90:9a:77:15:d0:9d, Wednesday, March 25, 2020 12:10:54
[DHCP IP: 192.168.1.23] to MAC address f8:ff:c2:38:4a:2d, Wednesday, March 25, 2020 12:09:47
[DHCP IP: 192.168.1.22] to MAC address a4:83:e7:55:ca:a0, Wednesday, March 25, 2020 11:45:18
[DHCP IP: 192.168.1.20] to MAC address 80:2b:f9:cb:61:2d, Wednesday, March 25, 2020 11:31:18
[DoS Attack: ACK Scan] from source: 17.248.147.208, port 443, Wednesday, March 25, 2020 11:26:48
[DHCP IP: 192.168.1.22] to MAC address a4:83:e7:55:ca:a0, Wednesday, March 25, 2020 11:24:10
[DHCP IP: 192.168.1.22] to MAC address a4:83:e7:55:ca:a0, Wednesday, March 25, 2020 11:09:39
[DHCP IP: 192.168.1.22] to MAC address a4:83:e7:55:ca:a0, Wednesday, March 25, 2020 11:05:38
[DHCP IP: 192.168.1.34] to MAC address c8:34:8e:36:64:87, Wednesday, March 25, 2020 11:05:01
[DHCP IP: 192.168.1.22] to MAC address a4:83:e7:55:ca:a0, Wednesday, March 25, 2020 11:03:35
[DHCP IP: 192.168.1.22] to MAC address a4:83:e7:55:ca:a0, Wednesday, March 25, 2020 11:01:30
[DoS Attack: ACK Scan] from source: 54.243.200.195, port 443, Wednesday, March 25, 2020 10:55:54
[DoS Attack: Ascend Kill] from source: 8.8.4.4, port 53, Wednesday, March 25, 2020 10:49:25
[DoS Attack: Ascend Kill] from source: 8.8.8.8, port 53, Wednesday, March 25, 2020 10:49:25
[DHCP IP: 192.168.1.22] to MAC address a4:83:e7:55:ca:a0, Wednesday, March 25, 2020 10:48:05
[DHCP IP: 192.168.1.10] to MAC address a4:83:e7:54:d1:75, Wednesday, March 25, 2020 10:47:28
[DHCP IP: 192.168.1.10] to MAC address a4:83:e7:54:d1:75, Wednesday, March 25, 2020 10:46:08
[DoS Attack: RST Scan] from source: 2.17.0.98, port 443, Wednesday, March 25, 2020 10:44:40
[DoS Attack: ACK Scan] from source: 2.17.0.98, port 443, Wednesday, March 25, 2020 10:44:40
[DoS Attack: RST Scan] from source: 143.204.233.39, port 443, Wednesday, March 25, 2020 10:44:13
[DoS Attack: ACK Scan] from source: 143.204.233.39, port 443, Wednesday, March 25, 2020 10:44:13
[DoS Attack: RST Scan] from source: 143.204.233.69, port 443, Wednesday, March 25, 2020 10:44:12
[DoS Attack: ACK Scan] from source: 143.204.233.69, port 443, Wednesday, March 25, 2020 10:44:12
[DHCP IP: 192.168.1.22] to MAC address a4:83:e7:55:ca:a0, Wednesday, March 25, 2020 10:38:36
[DHCP IP: 192.168.1.2] to MAC address 00:17:88:2e:9a:33, Wednesday, March 25, 2020 10:34:18
[DHCP IP: 192.168.1.20] to MAC address 80:2b:f9:cb:61:2d, Wednesday, March 25, 2020 10:32:58
[DHCP IP: 192.168.1.22] to MAC address a4:83:e7:55:ca:a0, Wednesday, March 25, 2020 10:24:48
[DHCP IP: 192.168.1.7] to MAC address f0:ef:86:74:7b:3b, Wednesday, March 25, 2020 10:23:53
[DHCP IP: 192.168.1.22] to MAC address a4:83:e7:55:ca:a0, Wednesday, March 25, 2020 10:10:19
[DoS Attack: TCP/UDP Echo] from source: 8.8.4.4, port 53, Wednesday, March 25, 2020 10:09:03
[DoS Attack: TCP/UDP Echo] from source: 8.8.8.8, port 53, Wednesday, March 25, 2020 10:09:03
[DHCP IP: 192.168.1.20] to MAC address 80:2b:f9:cb:61:2d, Wednesday, March 25, 2020 09:54:42
[DHCP IP: 192.168.1.13] to MAC address f8:6f:c1:62:14:90, Wednesday, March 25, 2020 09:54:05
[WLAN access allowed] from MAC : C8:34:8E:36:64:87, Wednesday, March 25, 2020 09:53:17
[Access Control] Device WIN-00447240 with MAC address C8:34:8E:36:64:87 is allowed to access, Wednesday, March 25, 2020 09:53:17
[DHCP IP: 192.168.1.34] to MAC address c8:34:8e:36:64:87, Wednesday, March 25, 2020 09:53:16
[DHCP IP: 192.168.1.22] to MAC address a4:83:e7:55:ca:a0, Wednesday, March 25, 2020 09:45:54
[DHCP IP: 192.168.1.20] to MAC address 80:2b:f9:cb:61:2d, Wednesday, March 25, 2020 09:40:04
[DHCP IP: 192.168.1.28] to MAC address e8:36:17:02:b6:ea, Wednesday, March 25, 2020 09:38:14
[DHCP IP: 192.168.1.23] to MAC address f8:ff:c2:38:4a:2d, Wednesday, March 25, 2020 09:34:16
[DHCP IP: 192.168.1.22] to MAC address a4:83:e7:55:ca:a0, Wednesday, March 25, 2020 09:32:54
[DHCP IP: 192.168.1.15] to MAC address 4c:24:98:75:e5:98, Wednesday, March 25, 2020 09:32:29
[DHCP IP: 192.168.1.23] to MAC address f8:ff:c2:38:4a:2d, Wednesday, March 25, 2020 09:30:01
[DHCP IP: 192.168.1.32] to MAC address 4c:24:98:0b:a1:1a, Wednesday, March 25, 2020 09:29:43
[DHCP IP: 192.168.1.15] to MAC address 4c:24:98:75:e5:98, Wednesday, March 25, 2020 09:29:15
[DHCP IP: 192.168.1.33] to MAC address 90:9a:77:15:d0:9d, Wednesday, March 25, 2020 09:28:34
[DHCP IP: 192.168.1.32] to MAC address 4c:24:98:0b:a1:1a, Wednesday, March 25, 2020 09:28:19
[DHCP IP: 192.168.1.15] to MAC address 4c:24:98:75:e5:98, Wednesday, March 25, 2020 09:27:06
[DHCP IP: 192.168.1.22] to MAC address a4:83:e7:55:ca:a0, Wednesday, March 25, 2020 09:26:50
[DHCP IP: 192.168.1.6] to MAC address 90:9a:77:15:d0:9d, Wednesday, March 25, 2020 09:26:12
[DHCP IP: 192.168.1.16] to MAC address 90:e1:7b:47:49:7c, Wednesday, March 25, 2020 09:26:10
[DHCP IP: 192.168.1.6] to MAC address 90:9a:77:15:d0:9d, Wednesday, March 25, 2020 09:26:07
[DHCP IP: 192.168.1.22] to MAC address a4:83:e7:55:ca:a0, Wednesday, March 25, 2020 09:26:00
[DHCP IP: 192.168.1.15] to MAC address 4c:24:98:75:e5:98, Wednesday, March 25, 2020 09:25:59
[DHCP IP: 192.168.1.22] to MAC address a4:83:e7:55:ca:a0, Wednesday, March 25, 2020 09:25:56
[DHCP IP: 192.168.1.5] to MAC address 4c:24:98:0b:a1:1a, Wednesday, March 25, 2020 09:25:51
[DHCP IP: 192.168.1.16] to MAC address 90:e1:7b:47:49:7c, Wednesday, March 25, 2020 09:07:13
[DHCP IP: 192.168.1.22] to MAC address a4:83:e7:55:ca:a0, Wednesday, March 25, 2020 09:01:59
[DoS Attack: TCP/UDP Echo] from source: 8.8.4.4, port 53, Wednesday, March 25, 2020 08:58:17
[DoS Attack: TCP/UDP Echo] from source: 8.8.8.8, port 53, Wednesday, March 25, 2020 08:58:17
[DHCP IP: 192.168.1.27] to MAC address c8:69:cd:a5:7f:1e, Wednesday, March 25, 2020 08:52:05
[DHCP IP: 192.168.1.10] to MAC address a4:83:e7:54:d1:75, Wednesday, March 25, 2020 08:51:36
[DHCP IP: 192.168.1.23] to MAC address f8:ff:c2:38:4a:2d, Wednesday, March 25, 2020 08:48:21
[DHCP IP: 192.168.1.20] to MAC address 80:2b:f9:cb:61:2d, Wednesday, March 25, 2020 08:47:12
[DHCP IP: 192.168.1.10] to MAC address a4:83:e7:54:d1:75, Wednesday, March 25, 2020 08:40:19
[DHCP IP: 192.168.1.29] to MAC address dc:a4:ca:b0:aa:6f, Wednesday, March 25, 2020 08:08:29
[DHCP IP: 192.168.1.20] to MAC address 80:2b:f9:cb:61:2d, Wednesday, March 25, 2020 07:51:33
[DHCP IP: 192.168.1.15] to MAC address 4c:24:98:75:e5:98, Wednesday, March 25, 2020 07:40:13
[DoS Attack: ACK Scan] from source: 151.101.193.111, port 443, Wednesday, March 25, 2020 07:39:50
[DHCP IP: 192.168.1.15] to MAC address 4c:24:98:75:e5:98, Wednesday, March 25, 2020 07:39:00
[DHCP IP: 192.168.1.6] to MAC address 90:9a:77:15:d0:9d, Wednesday, March 25, 2020 07:38:19
[DHCP IP: 192.168.1.5] to MAC address 4c:24:98:0b:a1:1a, Wednesday, March 25, 2020 07:38:16
[DHCP IP: 192.168.1.6] to MAC address 90:9a:77:15:d0:9d, Wednesday, March 25, 2020 07:38:16
[DHCP IP: 192.168.1.5] to MAC address 4c:24:98:0b:a1:1a, Wednesday, March 25, 2020 07:38:14
[DHCP IP: 192.168.1.23] to MAC address f8:ff:c2:38:4a:2d, Wednesday, March 25, 2020 07:15:11
[DHCP IP: 192.168.1.9] to MAC address 9c:3d:cf:f5:a8:ee, Wednesday, March 25, 2020 07:10:21
[DHCP IP: 192.168.1.28] to MAC address e8:36:17:02:b6:ea, Wednesday, March 25, 2020 07:08:31
[DHCP IP: 192.168.1.8] to MAC address 24:f6:77:05:cd:3c, Wednesday, March 25, 2020 07:08:30
[DHCP IP: 192.168.1.28] to MAC address e8:36:17:02:b6:ea, Wednesday, March 25, 2020 07:08:30
[DHCP IP: 192.168.1.15] to MAC address 4c:24:98:75:e5:98, Wednesday, March 25, 2020 07:08:26
[DHCP IP: 192.168.1.17] to MAC address c8:d0:83:ae:c2:b8, Wednesday, March 25, 2020 07:08:25
[DHCP IP: 192.168.1.24] to MAC address bc:fe:d9:7c:88:9c, Wednesday, March 25, 2020 07:08:20
[DHCP IP: 192.168.1.18] to MAC address b0:ca:68:73:14:89, Wednesday, March 25, 2020 07:08:18
[DHCP IP: 192.168.1.5] to MAC address 4c:24:98:0b:a1:1a, Wednesday, March 25, 2020 07:05:57
[DHCP IP: 192.168.1.6] to MAC address 90:9a:77:15:d0:9d, Wednesday, March 25, 2020 07:05:53
[DHCP IP: 192.168.1.15] to MAC address 4c:24:98:75:e5:98, Wednesday, March 25, 2020 07:01:40
[DHCP IP: 192.168.1.6] to MAC address 90:9a:77:15:d0:9d, Wednesday, March 25, 2020 07:01:09
[DHCP IP: 192.168.1.5] to MAC address 4c:24:98:0b:a1:1a, Wednesday, March 25, 2020 07:01:04
[DHCP IP: 192.168.1.24] to MAC address bc:fe:d9:7c:88:9c, Wednesday, March 25, 2020 06:44:29
[DHCP IP: 192.168.1.20] to MAC address 80:2b:f9:cb:61:2d, Wednesday, March 25, 2020 06:39:00
[DHCP IP: 192.168.1.16] to MAC address 90:e1:7b:47:49:7c, Wednesday, March 25, 2020 06:34:56
[DHCP IP: 192.168.1.19] to MAC address b4:9c:df:86:fb:43, Wednesday, March 25, 2020 06:32:39

Model: RBR50|Orbi AC3000 Tri-band WiFi Router
Message 5 of 9
FURRYe38
Guru

Re: RBR50 Direct Fibre into WAN issues

Have you factory reset the RBR and setup from scratch after powering OFF the ISP ONT for 30 seconds then back on? 

Are you configuring custome DNS or letting the RBR auto detect DNS from the ISP? Try setting a custom DNS, i.e. 1.1.1.1 and 9.9.9.9 and see. 

 

 

Message 6 of 9
LeeTaylor
Tutor

Re: RBR50 Direct Fibre into WAN issues

OK.

I have disabled parental controls and it is fine. It has not dropped the internet all day.

Why would parental controls cause the internet to drop for the house?

Lee
Model: RBR50|Orbi AC3000 Tri-band WiFi Router
Message 7 of 9
FURRYe38
Guru

Re: RBR50 Direct Fibre into WAN issues

Sounds like it...

 

Message 8 of 9

Re: RBR50 Direct Fibre into WAN issues


@LeeTaylor wrote:

Why would parental controls cause the internet to drop for the house?


We don't know that it is parental controls. Your logs also show lots of [DoS Attack: RST Scan].

 

That could be the cause.

 

Netgear's firmware is great at creating false reports of DoS attacks. Many of them are no such thing.

 

Search - NETGEAR Communities – DoS attacks

 

Use Whois.net to see who is behind some of them and you may find that they are from places like Facebook, Google, even your ISP.

 

Here is a useful tool for that task:

 

IPNetInfo: Retrieve IP Address Information from WHOIS servers

 

If these events are slowing down your router, that may be because it is using up processor time as it writes the events to your logs. Anything that uses processor power – event logging, QoS management, traffic metering – may cause slowdowns. Disable logging of DoS attacks and see if that reduces the problem. This does not prevent the router from protecting you from the outside world.

Message 9 of 9
Top Contributors
Discussion stats
  • 8 replies
  • 998 views
  • 0 kudos
  • 3 in conversation
Announcements

Orbi WiFi 7