12-19-2024 01:16 PM
I have an ASUS RT-AX88U. Lately my network has been attacked with brute force attempts to gain access through RPD (remote desktop). My Norton antivirus has stopped the attack at the machine level, but I listed all malicious IP's on the router's routing page (LAN/ROUTE/) with a "Metric" of 2 in order to stop them before they pass through the router. This successfully stops the attacks at the router, but I have already listed 16 Malicious IP's (out of a limit of 32). The IP's come from only four distinct IP branches. One such branch of IP's is 45.141.87.xxx.
So, in the "Network/Host IP" box on the Route tab, I want to signify a range of IP's instead. I have tried 45.141.87.* (the asterisk signifying a wildcard), but the ASUS router does not accept the * at all. Then I tried the CIDR notation (like this: 45.141.87.0/24), but the "Network/Host IP" field won't accept the / either.
Is there any way to use notation to signify a range of IP's? Apparently, ASUS routers use CIDR and "*", but it doesn't work in this field. Help please.
12-22-2024 04:52 PM
Maybe ask your ISP to change your WAN IP address.
12-23-2024 06:10 AM
Thanks but I assume the attacker s probing all addresses assigned by my ISP. I need to be able to block a range of originating addresses.
12-23-2024 06:54 PM
Hi @brossyg ,
To help us better troubleshoot the issue, we would like you to confirm the following:
If the problem still persists after performing the above steps, we recommend that you immediately use the system's feedback function to report the relevant information to us when the problem occurs.
You can submit a feedback form Web GUI (http://www.asusrouter.com).
Then provide the product serial number, the time of submitting the issue report, the email used for filling out the issue report, and the time when the issue occurred via private message to me.
Thank you.
12-23-2024 07:15 PM
the router’s firmware is always up to date. The attacks started about 10 days ago. Norton antivirus stops them at the machine level. The router’s Routing page will allow only 21 IP’s listed (supposed to be 32 but isn’t) with a Metric of “2” which does block incoming traffic from that IP. This page will not accept “*” for a wildcard, nor CIDR notation to specify a range of IP’s. This is what is needed because the attacks are coming from five distinct Russian and Ukrainian IP branches. That is 256 possible addresses per branch. So, if the Route page would accept “*” or CIDR notation, then it could easily block all IP’s that the attacks are originating from.