NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
Serranopr
Feb 03, 2024Tutor
IoT, Guest, Primary best practice network security RB850
I have an RB853 router with wired and WiFi and presently just a primary network and a Guest Network. I have extensive IoT devices and home automation and would like to get suggestions on best practi...
CrimpOn
Feb 03, 2024Guru - Experienced User
Like beauty, security practices are "in the eye of the beholder". What one person considers "best" others may think of as "meh".
Random comments:
IoT Network. Your observation is correct. Devices connected to the IoT network are in the same IP subnet as everything except Guest devices. The IoT network was created to address a specific customer complaint: that the primary 2.4G and 5G WiFi network has only one SSID. The 2.4G and 5G WiFi networks cannot be given different names, which was a common feature on earlier WiFi routers. Some IoT devices have poorly written smart phone apps and setup struggles when the phone is connected at 5G. Netgear "held the line" for years and finally offered a solution: create a different WiFi network where the 5G signal could be turned off. (There were numerous other solutions Netgear could have implemented, but that's the one they chose. If a particular user finds that all IoT devices are "no problem" to set up, there is no reason to enable the IoT network.
Guest Network. With the guest network being "separate", it is not possible to access devices on the guest network from the primary network. For the vast majority of IoT devices, this is not a problem because the app managing them goes "through the cloud". If the app will turn on a light bulb from Starbucks or when driving around in a car, being on the guest WiFi network is not a problem. In one sense, therefore, putting IoT devices on the guest WiFi is "more secure" because if some evil person "takes over" the IoT device, there is not much damage they can do. But......really? Are we worried about Dr. Evil commandeering our smart plugs?
Can you please explain how attempts to connect to a laptop on the Orbi LAN are detected? The laptop is 'hidden' behind Network Address Translation (NAT). It does not have a public IP address. Are ports being forwarded through the router to this laptop?
Serranopr
Feb 03, 2024Tutor
Hi CrimpOn, thanks for your comments. WRT the IoT devices my main concern was having them on the primary network would allow them to potentially be a way to sniff into our network in case one of the devices had a known vulnerability (i.e. Purple Air Sensor, weather station, sprinkler system....). I've seen reports of burglaries in the Bay Area with bad guys carrying WiFi jammers and disrupting home security cameras. I'm assuming at some point bad guys that were also "smart" might learn how to gain access to your network and disable security systems or some other malicious crime.
As for the concern about the laptop. I just got another Orbi alert notification from yesterday. "Suspicious Connection Blocked. Netgear Armor has detected and blocked a suspicious connection on PC xxxxxxx". If you click through the alert it will state the remote IP was 80.66.88.211 which is the Netherlands. I realize they could be using a VPN and routed through that IP, but nonetheless it is some device somewhere well outside my home apparently attempting to connect to this PC. I see IP connection attempts from Netherlands, Belize, China, Russia, Germany.....and why me? I don't think I'm that interesting a target to go after. Your thoughts on these warnings?
- CrimpOnFeb 03, 2024Guru - Experienced User
Armor is a mystery to me (I have never enabled Armor. Once I saw, "Free Trial", my brain went into "They want money."
With no experience to draw on, and no documentation about how Armor works, I can only speculate. If there is no port being forwarded through the router to the laptop, then it is literally impossible for anyone to even attempt to connect to the laptop. My guess is that some application on the laptop has attempted to connect to this IP address and Armor said, "No Way!" (Most likely a web browser.) Check this out:
https://www.abuseipdb.com/check/80.66.88.211
Here's what Bitdefender says:
https://www.bitdefender.com/consumer/support/answer/28376/
Would have been nice to see a link to an actual "list" of these web sites.
It might be entertaining to look at web browser history and see what was going on right before this alert popped up.
- SerranoprFeb 04, 2024Tutor
To answer your question on what was the PC doing prior to the alert coming up..................nothing. Some of these alerts are occurring during the night when the PC is not being used. It's not a URL that the user gets blocked on. Instead it is the alert that an outside IP tried to connect to the PC. That IPabuse website you referenced shows that the IP that is attempting to connect has thousands of user reports/complaints of hacking attempts (bruteforce, SSH...). That PC is a lightly used relic from some years ago although its loaded with current OS, and scanned for malware/viruses using BitDefender and previously Norton. I do know that my email address and prior passwords could have been subject to a breach by Comcast and they have appeared on the dark web. However every password has been changed and two factor authentication on most every important site we access. Nonetheless, still disturbing to see regular what appear to be hacking attempts on a low value home PC.
- CrimpOnFeb 04, 2024Guru - Experienced User
Thanks for the information. Sounds like Black Magic (Voodoo) to me.
I would love for one of the technically adapt users on the forum to propose a mechanism that would allow someone to attempt to connect to a specific device on the Orbi LAN.
The Wikipedia article on Network Address Translation (NAT) is pretty specific in stating that it is impossible for an external device to connect to an internal device:
This method allows communication through the router only when the conversation originates in the private network, since the initial originating transmission is what establishes the required information in the translation tables. Thus a web browser within the private network would be able to browse websites that are outside the network, whereas web browsers outside the network would be unable to browse a website hosted within.[a] Protocols not based on TCP and UDP require other translation techniques.
If this laptop is powered on when these events happen, it might be doing "something"? My desktop is a busy little guy 24 hours a day, running all sort of updates, backups, and what-not at all hours of the day and night.
There is a community forum for Armor. Maybe someone there would have more insight?
https://community.netgear.com/t5/NETGEAR-Armor/bd-p/en-home-armor