Download the diagnostics (Status>Device) for engineering before rebooting the SOHO if you open a ticket.
You probably didn’t get deauth’d maliciously - stuff just glitches out all the time. The problem is the net result is basically the same and unless you are running Kismet, a sys log server, wireshark or other security monitoring tools its hard to know what happened.
Reconnecting multiple difficult to access Wi-Fi cameras is a huge PITA compared to just punching in a new password on a spoofed iPhone so I apologize in advance that this happened to you. That’s why I strongly recommended hardwiring them - to avoid this headache - every time it happens.
I do not mean to be rude but there is a reason why those 2.4 Ghz wifi cameras are always “on sale” and cost $20USD each: it’s because they run 10 year old recycled firmware written by students for other products (usually toys) on ancient insecure Linux distros and get hacked all the time or crash all the time exposing your network and data. Even mid range cameras suffer from this. Google the camera model name and the terms “security issues” and see what you find. Most inexpensive foreign made DVR’s and Wi-Fi cameras are backdoored or easy to hack. There are whole websites dedicated to showing hacked Wi-Fi camera feeds. Are you running these cameras on the same VLAN as you do your banking on? If so stop - isolate them on their own VLAN. Sorry to be the bearer of bad news but “reconnecting” them might be the least of your worries. I suffer heavily from pronoia - so I try to avoid these products like the plague.
When I got evil twinned and deauth’d I had no idea - an average home user has no way to know. The Wi-Fi would just stop working, or I had to reboot it, or that didn’t work and I had to hard reset the router and redo the set up. Momentary deauths are barely noticeable. I did that for years before I finally bought a SOHO.
Evil twin attacks are different. The client device would not reconnect nor would rebooting get it to reconnect. The attacks are a great way to drive someone crazy - I opted instead to install Kismet, up my game, get a SOHO and catch them. No more attacks - for now.
After a successful evil twin attack I had to rename the AP and make a new password - easy to do on the SOHO. Then enter that info on the affected client device. I had a bad neighbor deauth me and break into my network for years before they got caught. On most consumer grade routers its literally child’s play at this point. Guess your lucky and live in a good neighborhood?
Why did I make 16 SSIDs / VLANS? Because if I put all my devices on the same network - then I would have to redo all of them every time I got hacked. That’s when I figured out how to compartmentalize everything onto their own SSID / VLAN. Spoof one of my networks and it only affects one of my devices - not 20. Plus now they know I am watching so they stopped.
The SOHO is solid in my experience and has safe guarded my network and data repeatedly against attacks - something the consumer grade stuff completely failed to do. The SOHO MK3 is literally worth its weight in gold in my opinion. And on top of that 16 SSIDs / 16 VLANs = 16 routers for $200USD
I wouldn’t go with any other router in this neighborhood. Some people here actually turn off their Wi-Fi when they are not using it - I have never seen that before - that’s how bad this neighborhood is for hacking. No router can fully prevent these types of DOS attacks at this time - but no one has been able to break into the SOHO. As per the documentation and links I sent you, detecting them and capturing evidence is labour intensive / PITA.
Most enterprise grade equipment is 10 times more expensive than a SOHO and then you have to buy expensive intrusion detection software on top of that that dwarfs the cost of the router. But then again the average home user isn’t going to spend ~$5000USD on their networking equipment.
I got hacked, stalked and harassed for over 5 years before I bought a SOHO, (and multiple malicious hackers got caught eventually). Multiple. That’s why I chose the name happysurfer. Just a silly name right?
Thanks for protecting me guys! Thank-you routersecurity.org.