Archer C2300 HW version 2.0: false DDoS attack problems

This thread has been locked for further replies. You can start a new thread to share your ideas or ask questions.

Archer C2300 HW version 2.0: false DDoS attack problems

This thread has been locked for further replies. You can start a new thread to share your ideas or ask questions.
Archer C2300 HW version 2.0: false DDoS attack problems
Archer C2300 HW version 2.0: false DDoS attack problems
2021-02-25 17:45:31
Model: Archer C2300  
Hardware Version: V2
Firmware Version: 1.1.1 Build 20200918 rel. 67850(4555)

Hi!

 

I have some problems lately with the router: suddenly my main workstation computer gets disconnected, other clients on the network are not affected.

 

Last time this happened was today during a zoom-meeting that had some connection problems, it tried to reconnect. First time it reconnected successfully, the second time I lost Internet connection from this computer.

 

Logging in to the router from another computer (with full Internet access), I had a look at what was going on. The problem is indicated only in the System log, as a "ICMP-FLOOD Attack", apparently my main workstation was pointed out and the router shut it down from the network.

 

These problems have occurred more often lately, the only solution seems to be a re-booting of the router which is very inconvenient.

 

In the firmware verison I'm using now (the latest according to the router: 1.1.1 Build 20200918 rel. 67850(4555)), there are only three on-off swithes in the Advanced-Security-Antivirus section: for "Malicious content filter", "Intrusion prevention system", "Infected device quarantine". The treshold settings described in the C2300 manual for different DDoS attacks are not available in this firmware version, only these three switches.

 

Moreover, there is no way to see what clients that have been captured in these DDoS-filter, it does not show up in the history in the Anitivirus section - only in the system log as I said above.

 

In the original firmware version it was easy to lower the sensitivity for DDoS attacks, also easy to pull a client out of the blacklist/quarantine.

 

What do you suggest as solution to this? Should I wait for a new firmware version or is it possible to revert back to the earlier, "non-TrendMicro" firmware version that the unit was shipped with?

 

Many thanks!

  0      
  0      
#1
Options
2 Reply
Re:Archer C2300 HW version 2.0: false DDoS attack problems
2021-02-25 22:10:52 - last edited 2021-02-26 00:00:57

@Gonzo666 

 

Sorry for bumping this thread but I am eager to find a solution.

 

Here are some additional information if it could help the great minds around here to come up with suggestions of possible solutions:

 

- The workstation I'm talking about is connected via wifi 5GHz, protocol is 802.11n. It is an old MacBook pro from 2013.

- Max wifi connection speed is "365" according to systems information data from the computer, I assume this is in Mbit/s. At this physical location - approx 10 meters from the router and at the floor below the router through the floor and some walls in between - I get approx 250/250 Mbit/s. So it is a quite fast connection considering the old equipment and physical circumstances.

- The router is connected to WAN via fiber 500/500 Mbps in current subscription.

- At the same physical location I get approx 450/450 Mbps with an iPad @ 5GHz 802.11ac, here I have experienced no problems of the device being disconnected because of DoS flooding attacks. Of course, it could be that the applications I'm running on the iPad are easier to handle for the router when it comes to actual network traffic.

 

What I have done today is to switch off two of the three switches in the Antivirus section in the router: "Intrusion prevention system", and "Infected device quarantine".

 

Maybe that will solve the problem for now but I get a feeling that these "TrendMicro" AV functions live a life on their own, uncoordinated with what shows up in the System log.

 

As I said, I am eagerly awaiting insightful ideas here as I am not comfortable with turning off what I presume to be essential security measures - which was part of the reasons I chose this router to begin with.

  0  
  0  
#2
Options
Re:Archer C2300 HW version 2.0: false DDoS attack problems
2021-03-03 03:16:30

@Gonzo666 

 

Hello, I'm afraid the current workaround would be reset the C2300 to factory default and the DoS Protection will be disabled by default. Please give it a go, and get back if the issue will be resolved.

  0  
  0  
#3
Options