Outline ·
[ Standard ] ·
Linear+
D-Link Malaysia Official Thread
|
SilentVampire
|
Oct 17 2017, 11:55 AM
|
|
QUOTE(sonypshomer @ Oct 17 2017, 10:41 AM) D-LinkI disconnect the network cable from  and connect to  The cable attached to unifi modem. Call TM to provide the unifi id & password to set up PPOE to set up the latter. Problem is no internet, call Unifi, reset port, reboot modem, reboot router, change lan port, call unifi, repeat 10 X yet still no internet. Connect the old router, got internet. HELP! Did you checked the VLAN tag to see if you have it tagged correctly? In other words, did you set it up with TM specific settings in mind?
|
|
|
|
|
|
SilentVampire
|
Jan 13 2018, 02:00 PM
|
|
QUOTE(island @ Jan 13 2018, 01:24 PM) any update for DSL-2750E–V1 for WPA3? Not likely. It is a very new standard and you will have to wait a while, plus there might be a possibility that you will need to buy a new router for that.
|
|
|
|
|
|
SilentVampire
|
Jan 14 2018, 02:36 PM
|
|
QUOTE(vergas @ Jan 14 2018, 10:00 AM) My internet connection keeps on disappearing and then ok again. Can anyone give more ideas based on the log. Is it the router or the modem? » Click to show Spoiler - click again to hide... « Jan 14 09:55:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:55:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:55:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:52:31 DHCP lease IP 192.168.0.101 to Romies-iPhone c4-84-66-e2-2e-47<br> Jan 14 09:52:31 Authentication Success c4-84-66-e2-2e-47<br> Jan 14 09:52:31 Authenticating...... c4-84-66-e2-2e-47<br> Jan 14 09:50:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:50:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:50:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:49:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:49:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:49:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:48:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:48:04 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 14 09:48:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:48:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:48:04 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 14 09:47:58 DHCP lease IP 192.168.0.101 to Romies-iPhone c4-84-66-e2-2e-47<br> Jan 14 09:47:56 Authentication Success c4-84-66-e2-2e-47<br> Jan 14 09:47:56 Authenticating...... c4-84-66-e2-2e-47<br> Jan 14 09:45:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:45:04 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 14 09:45:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:45:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:45:04 Whole System ICMP Flood Attack from WAN Rule:Default deny<br> Jan 14 09:45:04 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 14 09:43:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:43:04 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 14 09:43:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:43:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:43:04 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 14 09:42:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:42:04 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 14 09:42:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:42:04 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 14 09:41:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:41:04 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 14 09:41:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:41:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:41:04 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 14 09:40:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:40:04 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 14 09:40:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:40:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:40:04 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 14 09:39:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:39:04 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 14 09:39:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:39:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:39:04 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 14 09:38:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:38:04 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 14 09:38:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:38:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:38:04 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 14 09:37:33 DHCP lease IP 192.168.0.101 to Romies-iPhone c4-84-66-e2-2e-47<br> Jan 14 09:37:31 Authentication Success c4-84-66-e2-2e-47<br> Jan 14 09:37:31 Authenticating...... c4-84-66-e2-2e-47<br> Jan 14 09:37:05 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:37:05 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 14 09:37:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:37:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:37:04 Whole System ICMP Flood Attack from WAN Rule:Default deny<br> Jan 14 09:37:04 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 14 09:35:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:35:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:35:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:34:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:34:04 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 14 09:34:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:34:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:34:04 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 14 09:33:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:33:04 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 14 09:33:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:33:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:33:04 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 14 09:32:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:32:04 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 14 09:32:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:32:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:32:04 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 14 09:31:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:31:04 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 14 09:31:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:31:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:31:04 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 14 09:30:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:30:04 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 14 09:30:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:30:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:30:04 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 14 09:29:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:29:04 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 14 09:29:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:29:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:29:04 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 14 09:28:05 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:28:04 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 14 09:28:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:28:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:28:04 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 14 09:27:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:27:04 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 14 09:27:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:27:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:27:04 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 14 09:26:40 DHCP lease IP 192.168.0.101 to Romies-iPhone c4-84-66-e2-2e-47<br> Jan 14 09:26:40 Authentication Success c4-84-66-e2-2e-47<br> Jan 14 09:26:39 Authenticating...... c4-84-66-e2-2e-47<br> Jan 14 09:26:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:26:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:26:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:26:04 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 14 09:25:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:25:04 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 14 09:25:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:25:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:25:04 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 14 09:23:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:23:04 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 14 09:23:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:23:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:23:04 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 14 09:22:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:22:04 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 14 09:22:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:22:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:22:04 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 14 09:21:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:21:04 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 14 09:21:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:21:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:21:04 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 14 09:20:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:20:04 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 14 09:20:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:20:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:20:04 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 14 09:18:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:18:04 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 14 09:18:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:18:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:18:04 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 14 09:16:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:16:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:16:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:16:04 Whole System ICMP Flood Attack from WAN Rule:Default deny<br> Jan 14 09:13:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:13:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:13:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:12:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:12:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:12:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:10:05 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 14 09:10:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:10:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:10:04 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 14 09:09:58 DHCP lease IP 192.168.0.106 to MIPAD-MiPad 74-51-ba-3f-b2-3a<br> Jan 14 09:09:58 Authentication Success 74-51-ba-3f-b2-3a<br> Jan 14 09:09:58 Authenticating...... 74-51-ba-3f-b2-3a<br> Jan 14 09:09:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:09:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:09:04 Whole System ICMP Flood Attack from WAN Rule:Default deny<br> Jan 14 09:08:50 DHCP lease IP 192.168.0.100 to DESKTOP-EDVLDI4 40-9b-cd-99-00-ee<br> Jan 14 09:08:50 DHCP lease IP 192.168.0.100 to DESKTOP-EDVLDI4 40-9b-cd-99-00-ee<br> Jan 14 09:08:50 DHCP lease IP 192.168.0.100 to DESKTOP-EDVLDI4 40-9b-cd-99-00-ee<br> Jan 14 09:08:49 Authentication Success 40-9b-cd-99-00-ee<br> Jan 14 09:08:48 Authenticating...... 40-9b-cd-99-00-ee<br> Jan 14 09:08:26 DHCP lease IP 192.168.0.105 to android-9c2482bb19580dd3 54-a0-50-a0-f9-a5<br> Jan 14 09:08:25 Authentication Success 54-a0-50-a0-f9-a5<br> Jan 14 09:08:25 Authenticating...... 54-a0-50-a0-f9-a5<br> Jan 14 09:08:09 DHCP lease IP 192.168.0.101 to Romies-iPhone c4-84-66-e2-2e-47<br> Jan 14 09:08:08 Authentication Success c4-84-66-e2-2e-47<br> Jan 14 09:08:08 Authenticating...... c4-84-66-e2-2e-47<br> Jan 14 09:08:07 DHCP lease IP 192.168.0.104 to android-cbb810fa72847bbd e4-f8-ef-5d-dd-17<br> Jan 14 09:08:06 Authentication Success e4-f8-ef-5d-dd-17<br> Jan 14 09:08:06 Authenticating...... e4-f8-ef-5d-dd-17<br> Jan 14 09:08:05 DHCP lease IP 192.168.0.102 to RedmiNote4-Redmi c4-0b-cb-35-04-c1<br> Jan 14 09:08:05 Authentication Success c4-0b-cb-35-04-c1<br> Jan 14 09:08:05 Authenticating...... c4-0b-cb-35-04-c1<br> Jan 14 09:08:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:08:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:08:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:08:03 Authentication Success 5c-96-56-67-e0-ed<br> Jan 14 09:08:01 Authenticating...... 5c-96-56-67-e0-ed<br> Jan 14 09:06:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:06:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:06:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:04:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 09:04:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 09:04:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 09:04:04 Whole System ICMP Flood Attack from WAN Rule:Default deny<br> Jan 14 08:55:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 08:55:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 08:55:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 14 08:55:04 Whole System ICMP Flood Attack from WAN Rule:Default deny<br> Jan 14 08:53:04 Port Scan Attack Detect Packet Dropped<br> Jan 14 08:53:04 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 14 08:53:04 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 14 08:53:04 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
 Looks like a router issue. Your router is misinterpreting your device trying to connect as a packet flood attack. Disable your packet flood protection settings in your router and try again.
|
|
|
|
|
|
SilentVampire
|
Jan 14 2018, 03:43 PM
|
|
QUOTE(NickGr @ Jan 14 2018, 03:01 PM) Hi. Can you recommend a router pls. I want to replace my maxis router because of bad wifi range. I need one with good wifi range and rj11 port to connect the phone. Thanks Here bro: http://www.lazada.com.my/d-link-ac1200-2x9...85196.html?mp=1
|
|
|
|
|
|
SilentVampire
|
Jan 14 2018, 11:43 PM
|
|
QUOTE(NickGr @ Jan 14 2018, 11:27 PM) Can that router be used are repeater? Can cover a 900sf house? The router wont be in the middle of the house. With maxis router from office room to bedroom i get 1 line or nothing. Hey bro, try to use a power line if possible, and if your house is on single phase power. Much better if you use a powerline.
|
|
|
|
|
|
SilentVampire
|
Jan 15 2018, 12:15 AM
|
|
QUOTE(vergas @ Jan 15 2018, 12:00 AM) Can you point me to where the settings is? What router are you using? I will need to check the user manual and point you to the right direction.
|
|
|
|
|
|
SilentVampire
|
Jan 15 2018, 12:18 AM
|
|
QUOTE(vergas @ Jan 15 2018, 12:00 AM) Can you point me to where the settings is? Try switching off your router and getting a new IP address as it looks like your IP address is getting packet flood attacks.
|
|
|
|
|
|
SilentVampire
|
Jan 15 2018, 09:42 PM
|
|
QUOTE(vergas @ Jan 15 2018, 09:28 PM) Done switching off and on both modem and router. Updated log » Click to show Spoiler - click again to hide... « Jan 15 21:25:06 Port Scan Attack Detect Packet Dropped<br> Jan 15 21:25:06 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 15 21:25:06 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 15 21:25:06 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 15 21:25:06 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 15 21:24:06 Port Scan Attack Detect Packet Dropped<br> Jan 15 21:24:06 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 15 21:24:06 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 15 21:24:06 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 15 21:24:06 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 15 21:24:06 Whole System SYN Flood Attack from WAN Rule:Default deny<br> Jan 15 21:23:18 DHCP lease IP 192.168.0.104 to DESKTOP-EDVLDI4 40-9b-cd-99-00-ee<br> Jan 15 21:23:15 Authentication Success 40-9b-cd-99-00-ee<br> Jan 15 21:23:15 Authenticating...... 40-9b-cd-99-00-ee<br> Jan 15 21:23:06 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 15 21:23:06 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 15 21:23:06 Whole System SYN Flood Attack from WAN Rule:Default deny<br> Jan 15 21:22:06 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 15 21:22:06 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 15 21:22:06 Whole System SYN Flood Attack from WAN Rule:Default deny<br> Jan 15 21:21:06 Port Scan Attack Detect Packet Dropped<br> Jan 15 21:21:06 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 15 21:21:06 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 15 21:21:06 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 15 21:20:06 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 15 21:20:06 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 15 21:20:06 Whole System SYN Flood Attack from WAN Rule:Default deny<br> Jan 15 21:19:06 Port Scan Attack Detect Packet Dropped<br> Jan 15 21:19:06 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 15 21:19:06 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 15 21:19:06 Whole System SYN Flood Attack from WAN Rule:Default deny<br> Jan 15 21:18:06 Port Scan Attack Detect Packet Dropped<br> Jan 15 21:18:06 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 15 21:18:06 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 15 21:17:06 Port Scan Attack Detect Packet Dropped<br> Jan 15 21:17:06 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 15 21:17:06 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 15 21:17:06 Whole System SYN Flood Attack from WAN Rule:Default deny<br> Jan 15 21:16:06 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 15 21:15:06 Port Scan Attack Detect Packet Dropped<br> Jan 15 21:15:06 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 15 21:15:06 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 15 21:15:06 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 15 21:15:06 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 15 21:14:06 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 15 21:14:06 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 15 21:14:06 Whole System SYN Flood Attack from WAN Rule:Default deny<br> Jan 15 21:13:06 Port Scan Attack Detect Packet Dropped<br> Jan 15 21:13:06 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 15 21:13:06 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 15 21:13:06 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 15 21:13:06 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 15 21:13:06 Whole System SYN Flood Attack from WAN Rule:Default deny<br> Jan 15 21:12:06 Port Scan Attack Detect Packet Dropped<br> Jan 15 21:12:06 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 15 21:12:06 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 15 21:12:06 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 15 21:12:06 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 15 21:12:06 Whole System SYN Flood Attack from WAN Rule:Default deny<br> Jan 15 21:11:06 Port Scan Attack Detect Packet Dropped<br> Jan 15 21:11:06 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 15 21:11:06 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 15 21:11:06 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 15 21:11:06 Whole System SYN Flood Attack from WAN Rule:Default deny<br> Jan 15 21:10:06 Port Scan Attack Detect Packet Dropped<br> Jan 15 21:10:06 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 15 21:10:06 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 15 21:10:06 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 15 21:10:06 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 15 21:10:06 Whole System SYN Flood Attack from WAN Rule:Default deny<br> Jan 15 21:09:06 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 15 21:09:06 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 15 21:09:06 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 15 21:09:06 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 15 21:09:06 Whole System SYN Flood Attack from WAN Rule:Default deny<br> Jan 15 21:08:06 Port Scan Attack Detect Packet Dropped<br> Jan 15 21:08:06 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 15 21:08:06 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 15 21:08:06 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 15 21:08:06 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 15 21:08:06 Whole System SYN Flood Attack from WAN Rule:Default deny<br> Jan 15 21:07:06 Port Scan Attack Detect Packet Dropped<br> Jan 15 21:07:06 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 15 21:07:06 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 15 21:07:06 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 15 21:07:06 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 15 21:06:06 Port Scan Attack Detect Packet Dropped<br> Jan 15 21:06:06 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 15 21:06:06 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 15 21:06:06 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 15 21:06:06 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 15 21:06:06 Whole System SYN Flood Attack from WAN Rule:Default deny<br> Jan 15 21:05:06 Port Scan Attack Detect Packet Dropped<br> Jan 15 21:05:06 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 15 21:05:06 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 15 21:05:06 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 15 21:05:06 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 15 21:05:06 Whole System SYN Flood Attack from WAN Rule:Default deny<br> Jan 15 21:04:06 Port Scan Attack Detect Packet Dropped<br> Jan 15 21:04:06 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 15 21:04:06 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 15 21:04:06 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 15 21:04:06 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 15 21:03:06 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 15 21:03:06 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 15 21:03:06 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 15 21:03:06 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 15 21:02:06 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 15 21:02:06 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 15 21:02:06 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 15 21:02:06 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 15 21:01:06 Per-source UDP Flood Attack Detect Packet Dropped<br> Jan 15 21:01:06 Whole System UDP Flood Attack from WAN Rule:Default deny<br> Jan 15 21:01:06 Whole System SYN Flood Attack from WAN Rule:Default deny<br> Jan 15 21:00:06 Per-source ACK Flood Attack Detect Packet Dropped<br> Jan 15 21:00:06 Whole System ACK Flood Attack from WAN Rule:Default deny<br> Jan 15 12:59:58 Remote management is disabled. <br> Jan 15 12:59:58 Anti-spoofing enabled. <br> Jan 15 12:59:58 Block WAN PING enabled. <br> Jan 15 12:59:57 URL Blocking disabled. <br> Jan 15 12:59:57 RTSP ALG enabled. <br> Jan 15 12:59:57 VPN (IPsec) Pass-Through enabled. <br> Jan 15 12:59:57 VPN (PPTP) Pass-Through enabled. <br> Jan 15 12:59:57 VPN (L2TP) Pass-Through enabled. <br> Aug 13 02:49:54 PPPoE line connected <br> Aug 13 02:49:54 IPCP: secondary DNS address (1.9.1.9) <br> Aug 13 02:49:54 IPCP: primary DNS address (202.188.18.188) <br> Aug 13 02:49:54 IPCP: remote IP address (10.233.33.34) <br> Aug 13 02:49:54 IPCP: local IP address (60.53.215.167) <br> Aug 13 02:49:52 PAP authentication succeeded <br> Aug 13 02:49:49 PPPoE: Receive PADS <br> Aug 13 02:49:49 PPPoE: Sending PADR <br> Aug 13 02:49:48 WAN Dialup Try to establish PPPoE line<br> Aug 13 02:49:48 PPPoE: Sending PADI <br> Aug 13 02:49:37 WAN Dialup Try to establish PPPoE line<br> Aug 13 02:49:37 PPPoE: Sending PADI <br> Aug 13 02:49:32 WAN Dialup Try to establish PPPoE line<br> Aug 13 02:49:32 PPPoE: Sending PADI <br> Aug 13 02:49:30 DHCP lease IP 192.168.0.100 to Mi4i-MiPhone 14-f6-5a-67-2b-8d<br> Aug 13 02:49:29 Authentication Success 14-f6-5a-67-2b-8d<br> Aug 13 02:49:29 Authenticating...... 14-f6-5a-67-2b-8d<br> Aug 13 02:49:12 DHCP lease IP 192.168.0.103 to Galaxy-J5-2016 c8-38-70-74-f3-d8<br> Aug 13 02:49:10 Authentication Success c8-38-70-74-f3-d8<br> Aug 13 02:49:10 Authenticating...... c8-38-70-74-f3-d8<br> Aug 13 02:48:37 WAN Dialup Try to establish PPPoE line<br> Aug 13 02:48:37 PPPoE: Sending PADI <br> Aug 13 02:48:27 WAN Dialup Try to establish PPPoE line<br> Aug 13 02:48:27 PPPoE: Sending PADI <br> Aug 13 02:48:22 WAN Dialup Try to establish PPPoE line<br> Aug 13 02:48:22 PPPoE: Sending PADI <br> Aug 13 02:47:52 DHCP lease IP 192.168.0.102 to RedmiNote4-Redmi c4-0b-cb-35-04-c1<br> Aug 13 02:47:50 Authentication Success c4-0b-cb-35-04-c1<br> Aug 13 02:47:49 Authenticating...... c4-0b-cb-35-04-c1<br> Aug 13 02:47:47 DHCP lease IP 192.168.0.101 to Romies-iPhone c4-84-66-e2-2e-47<br> Aug 13 02:47:42 Authentication Success c4-84-66-e2-2e-47<br> Aug 13 02:47:42 Authenticating...... c4-84-66-e2-2e-47<br> Aug 13 02:47:27 WAN Dialup Try to establish PPPoE line<br> Aug 13 02:47:27 PPPoE: Sending PADI <br> Aug 13 02:47:20 DHCP lease IP 192.168.0.100 to Mi4i-MiPhone 14-f6-5a-67-2b-8d<br> Aug 13 02:47:17 WAN Dialup Try to establish PPPoE line<br> Aug 13 02:47:17 PPPoE: Sending PADI <br> Aug 13 02:47:16 Authentication Success 14-f6-5a-67-2b-8d<br> Aug 13 02:47:16 Authenticating...... 14-f6-5a-67-2b-8d<br> Aug 13 02:47:14 System started <br> Aug 13 02:47:12 AP 2.4GHz mode Ready. Channel : 1 TxRate : best SSID : Sakura <br> Aug 13 02:47:12 Access Point: Sakura started at channel 1 <br> Aug 13 02:47:12 WAN Dialup Try to establish PPPoE line<br> Aug 13 02:47:12 PPPoE: Sending PADI <br>
I am using DIR-619L. At least your IP has changed and you stop getting attacked.
|
|
|
|
|
|
SilentVampire
|
Mar 11 2018, 10:49 PM
|
|
QUOTE(hafiz_control @ Mar 11 2018, 10:45 PM) hi and greetings, can you help me to configure my new dlink router modem - am replacing the crappy netis modem from TM. using unifi copper here. tried but somehow am not able to connect on the vdsl part. thanks See my reply to you on the other thread.
|
|
|
|
|
|
SilentVampire
|
May 6 2018, 01:09 PM
|
|
QUOTE(memini @ May 6 2018, 12:20 PM) Hi. Firstly thanks for setting up this thread. FYI I just bought myslef a 882. Reviews on this are great. However I got a problem where all connection to this lag big time. For example if connected to 882 my phone will take forever to connect or change website in browser. However such problems will cease to exist when using my other router of different brand. I am using unifi. Appreciate your help. Disable IPv6 first and change DNS.
|
|
|
|
|
|
SilentVampire
|
May 12 2018, 10:34 AM
|
|
QUOTE(memini @ May 12 2018, 12:17 AM) 1. disabled IPv6. Done 2. dns already pointed to google dns. 3. restarted. Done. 4. still same. lagging in wired and wireless mode. SAD Send in for RMA. You should still be under warranty.
|
|
|
|
|
|
SilentVampire
|
May 14 2018, 02:16 PM
|
|
QUOTE(GC 2014 @ May 14 2018, 01:55 PM) I am interested to get one too, wonder what is the price range and when will this launched ? Lol bro, it has been out for some time: https://www.lazada.com.my/products/d-link-a...s113335550.htmlBut, the 4G firmware is not out yet.
|
|
|
|
|
|
SilentVampire
|
May 14 2018, 03:07 PM
|
|
QUOTE(GC 2014 @ May 14 2018, 02:56 PM) Thanks for your recommendation. any model which can support Streamyx & Unifiy as well as broadband ? ( Maxis / CELCOM / DIGI / Unify Mobile) ? My area unify port full, while waiting for them to add port, plan to subscribe broadband first. Heard Unify mobile (formally WEBE) planning to have a new package launching soon..wonder anybody know ? None so far bro. If you want only mobile router, I recommend either one if thus models: 1) https://www.lazada.com.my/products/tp-link-...rzTYYT&search=12) https://www.lazada.com.my/products/tp-link-...rzTYYT&search=1Or you can find something cheaper yourself.
|
|
|
|
|
|
SilentVampire
|
May 14 2018, 09:36 PM
|
|
QUOTE(GC 2014 @ May 14 2018, 05:50 PM) How to see which router have stronger wifi capability via the spec ? Hard to say without using but mobile routers are not known for its wireless coverage.
|
|
|
|
|
|
SilentVampire
|
Sep 23 2018, 09:57 PM
|
|
QUOTE(syncomp @ Sep 23 2018, 05:37 PM) Hi D Link, My DIR 850L is not functioning. I tried to scan for SSID, both 5 Ghz & 2.4 Ghz was not available. I tried to configure the modem via LAN, but my LAN port doest not detect any connection from this router. The only light that is ON is the POWER light. But sometimes after I turn it off, the globe icon blinking with orange colour Hard reset it. If still not working, get your own one. See the link on my sig for list of compatible routers.
|
|
|
|
|
|
SilentVampire
|
Sep 24 2018, 01:27 PM
|
|
QUOTE(syncomp @ Sep 24 2018, 12:59 PM) After a day of struggle, that's what I thought too My LAN Port Cant even detect LAN connection from all 4 of the router port. So, I guess I still not configure anything. My BTU got no problem. Right now, I am using Archer C5 router for my house. I tried to use my brother D Link 850L Router and I ended up asking you guys whether you guys ever experience like this. Thanks for the link, I've read it, I think this router faulty. Because the router would've shown the SSID signal in the first place, whether or not you configure it right? Yes, it is gone. Time to change router to something else better.
|
|
|
|
|
|
SilentVampire
|
Sep 27 2018, 08:08 PM
|
|
QUOTE(shahie @ Sep 27 2018, 07:23 PM) Hi i’m on 300mbps. i have Dir-842 (for first floor) and Dir-882 (ground floor room, connected to BTU) currently. plan to get another Dir-878 for my living room at ground floor. all the router connected via the cat 5e LAN currently. the question here, any huge different in performance between 878 and 882? Nope, no difference.
|
|
|
|
|
|
SilentVampire
|
Oct 4 2018, 03:25 PM
|
|
QUOTE(darkwalker @ Oct 4 2018, 03:16 PM) TM have tune down the Dlink DIR-842 features tremendously. I cannot perform MAC filtering on the my new router. Need help to unlock the hidden menu. No surprises there. That is why it is better to buy your own router, as you can do whatever you want with it.
|
|
|
|
|
|
SilentVampire
|
Oct 4 2018, 05:02 PM
|
|
QUOTE(greyshadow @ Oct 4 2018, 04:22 PM) yeah, planning to replace it beside hardcoded the @unifi into your wifi ID  it's just too dumb! lots of features supposed to be there one but wasn't available. change one simple setting at it took a minute or so to update  and lastly, did I mention it gets tremendously hot when I stack it on top of my Unifi modem? till the point both hanged? Just change your router to something else. Refer to the link in my signature and choose a decent router for your speed. By the way, you should not stack it on top of your modem. That will cause both unit to overheat, which you can see happened when you do that.
|
|
|
|
|
|
SilentVampire
|
Oct 5 2018, 08:18 AM
|
|
QUOTE(greyshadow @ Oct 5 2018, 08:15 AM) never encountered any heat issues with my previous streamyx modem and mi router when I stacked them together, so I thought this 2 should be OK also, manatau that's not the case thinking to change to Tenda AC18, anyone use it before? how's the stability? See here: https://forum.lowyat.net/topic/4504268
|
|
|
|
|