Model of desktop: Custom desktop
Make and model of router: Belkin N300 (up to date firmware)
Make and model of modem: Cisco DPQ3212
PC Specifications: CPU i5-4690K stock clocks
GPU: Sapphire R9 290 BF4 Edition
Mobo: EVGA Z87 FTW 141-HW-E877-RX
PSU: EVGA SuperNOVA NEX750G 120-PG-0750-GR
OS & Driver version: Windows 10 Build 9926
Model of USB wifi adapter: Alpha AWUS036H
ISP & connection type: Cox communications, WIFI and ethernet
Number of connections: 3-7 at any given time, 2 desktops, 2 laptops, and 3 smart phones.
I'm having this problem with both my wifi and Ethernet connections where my internet just cuts out across all devices for several minutes or until I reboot my router. The router is brand new replacement for an old netgear router that fried and the new router started having problems within days. I've called my ISP and they insist theres nothing wrong with the modem they provided. When the internet cuts out I get no icon or any sort of prompt indicating that the internet is out or having problems on my desktop/laptop, however I do get a "this page cannot be displayed" and if someone is streaming their streaming connection cuts out.
I notice it happening most often when browsing webpages before it kicks everyone offline. If people in the house are only streaming or gaming the connection is fine. My router appears to absolutely hate webpages.
Here is a recent firewall security log, the log coincides with the disconnects. The log is usually clear when nobody has used the internet, it's only when we're home that the problem occurs. I've read somewhere that the firewall senses an x number of connections before flagging them as a DDoS? Is that what I'm seeing here?
06/08/2015 17:28:07 **UDP Flood to Host** xx.x.xxx.xxx, 44552->> xx.xxx.xx.xx, 53 (from WAN Outbound)
06/08/2015 17:28:07 **UDP Flood to Host** xx.x.xxx.xxx, 44552->> xx.xxx.xx.xx, 53 (from WAN Outbound)
06/08/2015 14:00:10 **UDP Flood to Host** xx.x.xxx.xxx, 44808->> xx.xxx.xx.xx, 53 (from WAN Outbound)
06/08/2015 14:00:10 **UDP Flood to Host** xx.x.xxx.xxx, 44808->> xx.xxx.xx.xx, 53 (from WAN Outbound)
06/08/2015 13:45:35 **UDP Flood to Host** xx.x.xxx.xxx, 45064->> xx.xxx.xx.xx, 53 (from WAN Outbound)
06/08/2015 13:45:35 **UDP Flood to Host** xx.x.xxx.xxx, 45064->> xx.xxx.xx.xx, 53 (from WAN Outbound)
06/08/2015 13:29:29 **UDP Flood to Host** xx.x.xxx.xxx, 45320->> xx.xxx.xx.xx, 53 (from WAN Outbound)
06/08/2015 13:29:29 **UDP Flood to Host** xx.x.xxx.xxx, 45320->> xx.xxx.xx.xx, 53 (from WAN Outbound)
Make and model of router: Belkin N300 (up to date firmware)
Make and model of modem: Cisco DPQ3212
PC Specifications: CPU i5-4690K stock clocks
GPU: Sapphire R9 290 BF4 Edition
Mobo: EVGA Z87 FTW 141-HW-E877-RX
PSU: EVGA SuperNOVA NEX750G 120-PG-0750-GR
OS & Driver version: Windows 10 Build 9926
Model of USB wifi adapter: Alpha AWUS036H
ISP & connection type: Cox communications, WIFI and ethernet
Number of connections: 3-7 at any given time, 2 desktops, 2 laptops, and 3 smart phones.
I'm having this problem with both my wifi and Ethernet connections where my internet just cuts out across all devices for several minutes or until I reboot my router. The router is brand new replacement for an old netgear router that fried and the new router started having problems within days. I've called my ISP and they insist theres nothing wrong with the modem they provided. When the internet cuts out I get no icon or any sort of prompt indicating that the internet is out or having problems on my desktop/laptop, however I do get a "this page cannot be displayed" and if someone is streaming their streaming connection cuts out.
I notice it happening most often when browsing webpages before it kicks everyone offline. If people in the house are only streaming or gaming the connection is fine. My router appears to absolutely hate webpages.
Here is a recent firewall security log, the log coincides with the disconnects. The log is usually clear when nobody has used the internet, it's only when we're home that the problem occurs. I've read somewhere that the firewall senses an x number of connections before flagging them as a DDoS? Is that what I'm seeing here?
06/08/2015 17:28:07 **UDP Flood to Host** xx.x.xxx.xxx, 44552->> xx.xxx.xx.xx, 53 (from WAN Outbound)
06/08/2015 17:28:07 **UDP Flood to Host** xx.x.xxx.xxx, 44552->> xx.xxx.xx.xx, 53 (from WAN Outbound)
06/08/2015 14:00:10 **UDP Flood to Host** xx.x.xxx.xxx, 44808->> xx.xxx.xx.xx, 53 (from WAN Outbound)
06/08/2015 14:00:10 **UDP Flood to Host** xx.x.xxx.xxx, 44808->> xx.xxx.xx.xx, 53 (from WAN Outbound)
06/08/2015 13:45:35 **UDP Flood to Host** xx.x.xxx.xxx, 45064->> xx.xxx.xx.xx, 53 (from WAN Outbound)
06/08/2015 13:45:35 **UDP Flood to Host** xx.x.xxx.xxx, 45064->> xx.xxx.xx.xx, 53 (from WAN Outbound)
06/08/2015 13:29:29 **UDP Flood to Host** xx.x.xxx.xxx, 45320->> xx.xxx.xx.xx, 53 (from WAN Outbound)
06/08/2015 13:29:29 **UDP Flood to Host** xx.x.xxx.xxx, 45320->> xx.xxx.xx.xx, 53 (from WAN Outbound)