NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
9014
Sep 18, 2025Aspirant
Old WNR2000v2/3 - possible to monitor traffic?
Hi, As the title states. I'd like to monitor and block traffic on my ancient WNR2000v2 or WNR2000v3 (I haev both) Netgear wireless routers. The blocking works, and I've selected to log any attemp...
CrimpOn
Sep 18, 2025Guru - Experienced User
A reasonable interest that, alas, no Netgear router will accommodate.
- The IoT device is connected to the router over WiFi, which is encrypted, and bypasses LAN data collection. (Apparently it is technically possible to put a WiFi adapter into a mode that will enable collecting and decoding WiFi traffic. But, I personally have never found a way to do it. There is a software package [HTTP Toolkit by Tim Perry] that can be used to inspect web traffic, but I am too cheap to pay the monthly fee to use it.)
- When communication leaves the router, the device IP address is hidden behind Network Address Translation (NAT).
There IS a method to gather this information, but it neither simple nor "free".
- Install a WiFi extender with an Ethernet port in access point (AP) mode (or an actual WiFi access point) with a WiFi SSID different from the current router.
- Configure the IoT device to connect to this WiFi SSID rather than the current router.
- Tap into the Ethernet connection between the router and AP and connect the tap to an Ethernet port on a computer.
There are a number of ways to tap an Ethernet link, including inserting a smart switch to 'mirror' a port and all sorts of Ethernet taps (from a $10 Throwing Star to the $250 Dualcomm ETAP-2003) - Set up Wireshark (or some other network monitoring program) to collect information from the tap.
- Once it is obvious what the hardware MAC address of the IoT device is, define a filter on Wireshark to avoid collecting information not connected with this IoT device
This information will show clearly which internet IP addresses are communicating with the IoT device. Since the data packets are almost certainly encrypted, there will not be much to look at.
Perhaps a silly question: Does the WNR2000 provide command line access to the Linux operating system (either telnet or ssh)? If so, there may be Linux commands what will display "open connections".
9014
Sep 18, 2025Aspirant
Thanks for this comprehensive reply!
I wasn't aware it mattered, but the IoT device is actually plugged into an Ethernet port on the router. It's a sort of self-contained "server" for some security cameras, designed to be used as local storage for the feeds. Unfortunately there have been reports that some images/streams/data are broadcast to the Internet/cloud without user consent, which is what I'm trying to determine whether it affects my unit. (Ideally I would just isolate the whole setup from the Internet by giving it its own network, but of course, it's just a paperweight without Internet connection for some unknown reason).
I also know the IoT device's MAC address, since the Netgear router reports it and its associated DHCP IP address in the "connected devices" screen.
So since it's already on Ethernet, I won't need the wi-fi extender and just need some sort of "tap". I have an unmanaged network switch on-hand (D-Link DGS-1024D) but I assume that's not the same thing as a smart switch. So I will have to buy something to complete the task.
Then I can install Wireshark on the Linux PC, and using the MAC address from the IoT device, I can see the IP addresses it's communicating with, but not the content of the communication (because of HTTPS connections).
Do I have that right? Did I missing anything?
It does seem I am able to telnet into the router (I tested the WNR2000v2). I didn't see anything that would allow me to monitor traffic when I asked for a list of commands.