NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.

Forum Discussion

Serranopr's avatar
Feb 03, 2024

IoT, Guest, Primary best practice network security RB850

I have an RB853 router with wired and WiFi and presently just a primary network and a Guest Network.  I have extensive IoT devices and home automation and would like to get suggestions on best practices for better isolating the IoT devices while not creating problems in controlling them from iPhones that would be on the Primary Network.  We appreciate WiFi cameras, security system with the base connected via hard-wired Ethernet, automated lighting and window shades along with other typical Alexa/Google smart speakers and Apple TVs.  Which devices inside my home that are on the primary network should be pushed over to either the Guest network, or configured to run on a VLAN / Bridge?  Also, I'm aware from Orbi that multiple times per week a particular laptop is getting outside connection attempts blocked from IP addresses outside the US (Netherlands, Belize....).  The laptop is on the primary home network, and connected via WiFi.  Should this laptop that appears to be subject to hack attempts be segmented onto a VLAN?  (I have some network experience from sales engineering with a large router company, but that's getting rusty.)  Before I go making changes would appreciate hearing from those more experienced on how to best configure the network to support various devices without creating problems.

 

Last, I've tried to get Comcast to release and renew my IP by power off for a while, and power back on.  But the IP does not change.  I thought that would be a basic good idea to change my IP from what the hackers were daily attempting.  However my "dynamic IP" does not change on booting back up.

 

Comcast ISP with Motorola owned modem & GigE speed

5 Replies

  • Like beauty, security practices are "in the eye of the beholder".  What one person considers "best" others may think of as "meh".

     

    Random comments:

     

    IoT Network. Your observation is correct.  Devices connected to the IoT network are in the same IP subnet as everything except Guest devices.  The IoT network was created to address a specific customer complaint: that the primary 2.4G and 5G WiFi network has only one SSID.  The 2.4G and 5G WiFi networks cannot be given different names, which was a common feature on earlier WiFi routers.  Some IoT devices have poorly written smart phone apps and setup struggles when the phone is connected at 5G.  Netgear "held the line" for years and finally offered a solution: create a different WiFi network where the 5G signal could be turned off.  (There were numerous other solutions Netgear could have implemented, but that's the one they chose.  If a particular user finds that all IoT devices are "no problem" to set up, there is no reason to enable the IoT network.

     

    Guest Network.  With the guest network being "separate", it is not possible to access devices on the guest network from the primary network.  For the vast majority of IoT devices, this is not a problem because the app managing them goes "through the cloud".  If the app will turn on a light bulb from Starbucks or when driving around in a car, being on the guest WiFi network is not a problem.  In one sense, therefore, putting IoT devices on the guest WiFi is "more secure" because if some evil person "takes over" the IoT device, there is not much damage they can do.  But......really? Are we worried about Dr. Evil commandeering our smart plugs?

     

    Can you please explain how attempts to connect to a laptop on the Orbi LAN are detected?  The laptop is 'hidden' behind Network Address Translation (NAT).  It does not have a public IP address.  Are ports being forwarded through the router to this laptop?

    • Serranopr's avatar
      Serranopr
      Tutor

      Hi CrimpOn, thanks for your comments.  WRT the IoT devices my main concern was having them on the primary network would allow them to potentially be a way to sniff into our network in case one of the devices had a known vulnerability (i.e. Purple Air Sensor, weather station, sprinkler system....).  I've seen reports of burglaries in the Bay Area with bad guys carrying WiFi jammers and disrupting home security cameras.  I'm assuming at some point bad guys that were also "smart" might learn how to gain access to your network and disable security systems or some other malicious crime.  

       

      As for the concern about the laptop.  I just got another Orbi alert notification from yesterday.  "Suspicious Connection Blocked.  Netgear Armor has detected and blocked a suspicious connection on PC xxxxxxx".  If you click through the alert it will state the remote IP was 80.66.88.211 which is the Netherlands.  I realize they could be using a VPN and routed through that IP, but nonetheless it is some device somewhere well outside my home apparently attempting to connect to this PC.  I see IP connection attempts from Netherlands, Belize, China, Russia, Germany.....and why me?  I don't think I'm that interesting a target to go after.  Your thoughts on these warnings?

      • CrimpOn's avatar
        CrimpOn
        Guru

        Armor is a mystery to me (I have never enabled Armor.  Once I saw, "Free Trial", my brain went into "They want money."

         

        With no experience to draw on, and no documentation about how Armor works, I can only speculate.  If there is no port being forwarded through the router to the laptop, then it is literally impossible for anyone to even attempt to connect to the laptop.  My guess is that some application on the laptop has attempted to connect to this IP address and Armor said, "No Way!"  (Most likely a web browser.) Check this out:

        https://www.abuseipdb.com/check/80.66.88.211 

         

        Here's what Bitdefender says:

        https://www.bitdefender.com/consumer/support/answer/28376/ 

        Would have been nice to see a link to an actual "list" of these web sites.

         

        It might be entertaining to look at web browser history and see what was going on right before this alert popped up.