Send CathInfo's owner Matthew a gift from his Amazon wish list:
https://www.amazon.com/hz/wishlist/ls/25M2B8RERL1UO

Author Topic: NOTICE - CathInfo possible outage  (Read 281 times)

0 Members and 1 Guest are viewing this topic.

Re: NOTICE - CathInfo possible outage
« Reply #5 on: Today at 02:17:00 PM »
Working fine, and quick access, from here in the UK.

Offline Matthew

  • Mod
Re: NOTICE - CathInfo possible outage
« Reply #6 on: Today at 02:17:25 PM »
Ok, I think I found it. 

The new Router's "Firewall" is apparently useless. Having the "firewall" enabled, plus another setting, was causing 80% of traffic to be blocked.

I KNEW IT!

Anyhow, sorry about the 3 hour outage -- we should be good now.

This router is much better -- not just raw capacity (CPU, RAM) but the software is at least 1-2 levels more advanced than the old router. Many more tools and ways to monitor. All in all, I think this whole adventure was worth it.


Offline Ladislaus

  • Supporter
Re: NOTICE - CathInfo possible outage
« Reply #7 on: Today at 05:26:31 PM »
Having the "firewall" enabled, plus another setting, was causing 80% of traffic to be blocked

Your ISP doesn't offer firewall by default?, and then you could pair it up with a server-based firewall.

Between the first line of defense, the ISP blocking nearly all indbound traffic except 443, and then the white- / black- listing firewalls on the server for fine-grained control ... you should have most of it covered.  ISP firewall should be able to detect and block DDoS and other malicious attacks before they get to your server.

Offline Matthew

  • Mod
Re: NOTICE - CathInfo possible outage
« Reply #8 on: Today at 05:30:21 PM »
Your ISP doesn't offer firewall by default?, and then you could pair it up with a server-based firewall.

Between the first line of defense, the ISP blocking nearly all indbound traffic except 443, and then the white- / black- listing firewalls on the server for fine-grained control ... you should have most of it covered.  ISP firewall should be able to detect and block DDoS and other malicious attacks before they get to your server.


The thing is, unless I forward a given piece of traffic to my server, it gets blocked at the router anyhow.
I have zero control over what this "built in firewall" does, and so I don't need it. The last router obviously didn't have it -- because I only saw 80% of my traffic blocked after I enabled this feature on the new router.

My server has a professional, industry-standard software firewall, and it works well.

I might play around with it later. There were two settings, one for "firewall on/off" and one for "dos protection". I don't know which one was the culprit.

But this router is WAY better for looking at active connections, traffic, etc. I can get a list of IPs and what they're doing -- in real time. I feed that into a python script (that I just wrote with the help of AI) and it tells me which blocks have more than 10 connections. It's great. I just have to copy/paste from a certain screen on the router interface, and it's almost automated after that. I might be able to streamline the process even more in the future.

This router isn't technically "pro", but it's only 1/2 step below it. It's the fanciest gamer/consumer router I've ever seen. And it wasn't cheap. $630. Never bought that much router before.

Offline Ladislaus

  • Supporter
Re: NOTICE - CathInfo possible outage
« Reply #9 on: Today at 05:34:23 PM »
So, I would think that something like a DDoS got through to your server, it would have its intended effect anyway by overwhelming the server's resources.  At least for that level of threat deflection it might be good have the ISP catch and block it before it even gets to your router, much less your server.