Hello Rob, Thanks for answering. The router in question is a 3C: Software Version 1.04-168 Hardware Version 02.01 3C Number 3CR860-95
And it looks like you're right on the 'overly aggressive attack pattern check', it's a model specific issue. For reference: http://www.dslreports.com/forum/remark,14974812 I'll try to trim the parameters here. Regards, Diego Rob Heittman wrote: > Anything you can share about the router model that is doing the > blacklisting (and its firmware version)? It sounds like an overly > aggressive attack pattern check on the router's part -- never seen > anything like this before and people abort their uploads to our Restlet > powered servers all the time. If I am fortunate enough to have the > appropriate hardware/firmware around I would be happy to snoop some > packets and check it out, but otherwise I think this is probably going > to be really, really tough to reproduce. > > On Sat, Nov 22, 2008 at 2:59 AM, Diego Ballve > <[EMAIL PROTECTED] > <mailto:[EMAIL PROTECTED]>> wrote: > > The behavior can be consistently reproduced with our setup and access to > remote server is temporarily blocked to entire office subnet. The client > application makes a GET and then a POST w/ a big file, so that I have > time to pull the plug, and that's it.