I’ve been having issues with my internet running really slow. Whenever my internet goes to a crawl (about 1 - 0.2 Mbps, when its suppose to be going 6 Mbps download), I will look on the interfaces list in the router configuration and I see the gateway and pppoe-out interface TX rate going about 7 - 8 Mbps. Whenever I disable and enable the gateway interface the internet speed will go back to its normal speed. Sometimes this happens several times a week and other times it won’t happen for a couple of weeks.
I have updated the RouterOS version to 6.34, but the problem still persists. I have just upgraded it to 6.34.2, so I’ll see if that helps any. I have also unplugged the modem from the router and connected it directly into my computer when the internet is going slow and the speeds are at the normal speed after I do that. I don’t see any computers on my network that are using an excessive amount of bandwidth when I have this slow network issue. Is there any way I can see if any service is using lots of bandwidth on the router itself or any kind of log that shows detailed network usage stats?
Thanks for your response. I haven’t setup any firewall rules when I setup the router. It looks like it has just the default ones. The “Allow Remote Requests” are enabled under the DNS Settings. I have been meaning to lock down my router with firewall rules, but haven’t got to it yet.
This does sound like a DDOS attack that could be happening. What would I enter for adding a new firewall rule in order to block these potential DDOS attacks? Wouldn’t I also be able to limit the number of incoming connections or would I firewall rule be better for this?
You should by all means implement firewall filter rules to protect your router from internet.
Default configuration already implements a firewall ruleset that protects you, but if you’re using PPPoE you should make sure the PPPoE interface is the one the firewall rules refer to, not the ether port it is binded to.
type this on a New Terminal:
/export hide-sensitive
and post it here to check.
Default device configuration script, which contain the default firewall rules can be seen by issuing:
I also added a firewall to drop chain:input for the pppoe-out1 interface, but I'm not sure if that is setup correctly. I didn't seem to fix the issue of the DDOS attacks, so there must be something else that needs to be set.
felix: if you do that, you won’t have internal DNS service for your network; if you provide DNS service from a different server inside your LAN, then that’s the best approach.
Otherwise, with the default firewall config (check that you drop on the pppoe client interface) you will be protected.
hastrow: dropping all on pppoe-out1 should be enough.