Netgear Network Storage is blocked!

I added its ip to the trusted zone and it still cannot connect. Can anyone help me?

Welcome databoy478.

Are you seeing any events in the cfp event logs, that suggest a block?

I see a lot of blocks but they are for fake udp packets and fragmented packets.

What you need to do, is open you log file in CFP, right click anywhere in the log window and select clear all logs. Then, try to connect to your storage server. Open logs again, righ click, select Export HTML. Save the log and post it as an attachment here.

Toggie

Edit: I cleaned the post. Toggie

Date/Time :2007-05-31 18:50:12
Severity :High
Reporter :Network Monitor
Description: Blocked by Protocol Analysis (Fragmented IP Packet)
Direction: IP Incoming Source: 192.168.0.196
Destination: 192.168.0.191
Protocol : UDP
Reason: Fragmented IP packets are not allowed

Date/Time :2007-05-31 18:50:12
Severity :High
Reporter :Network Monitor
Description: Blocked by Protocol Analysis (Fake or Malformed UDP Packet)Direction: UDP Incoming Source: 192.168.0.196:20001
Destination: 192.168.0.191:1028
Reason: UDP packet length and the size on the wire(2084 bytes) do not match

Date/Time :2007-05-31 18:50:06Severity :High
Reporter :Network Monitor
Description: Blocked by Protocol Analysis (Fragmented IP Packet)
Direction: IP Incoming Source: 192.168.0.196
Destination: 192.168.0.191 Protocol : UDP
Reason: Fragmented IP packets are not allowed

Date/Time :2007-05-31 18:50:06
Severity :High
Reporter :Network Monitor
Description: Blocked by Protocol Analysis (Fake or Malformed UDP Packet)Direction: UDP Incoming Source: 192.168.0.196:20001
Destination: 192.168.0.191:1028
Reason: UDP packet length and the size on the wire(2084 bytes) do not match

Date/Time :2007-05-31 18:49:31
Severity :High
Reporter :Network Monitor
Description: Blocked by Protocol Analysis (Fake or Malformed UDP Packet)Direction: UDP Incoming Source: 192.168.0.196:20001
Destination: 192.168.0.191:1028
Reason: UDP packet length and the size on the wire(2084 bytes) do not match

Date/Time :2007-05-31 18:49:31
Severity :High
Reporter :Network Monitor
Description: DDOS Attack (UDP Flood) Duration: 28 seconds # of packets: 743 # of attackers: 4 Attacker(s): 192.168.0.196, 192.168.0.198, 192.168.0.110, 192.168.0.198The firewall has switched to EMERGENCY mode

G’day,

If you open CFP and click SECURITY - ADVANCED - ADVNACED ATTACK DETECTION AND PREVENTION - MISCELLANEOUS, you can try turning off “Block fragmented IP datagrams”. You may also need to disable “Do protocol analysis”, but I’d start with just disabling the check for fragmented packets and see whether you can connect.

Cheers,
Ewen :slight_smile: