NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Security
1937 TopicsWAX620 V10.8.13.2 generating apparently bogus auth messages
I'm seeing messages for the MAC address of a Tuya Smart device authenticating and deauthenticating repeatedly to one of my SSIDs. There is no such device in my house. Is this a neighbor's device or a bug, or combination of the two? I tried creating a MAC ACL for it, which didn't completely stop the auth messages -- the WAX620 still reported periodic auths along with block messages. I've changed the SSID password (WPA3/2) and turned off the four devices using that SSID, but the messages continue. Below is a sample, the first form is seen every few seconds. No associated device ever makes a DHCPREQUEST. May 13 14:21:16 hostapd: wifi0vap0: STA a8:80:55:3c:be:c5 IEEE 802.11: authenticated May 13 03:45:52 hostapd: wifi0vap0: STA a8:80:55:3c:be:c5 IEEE 802.11: Station deauthenticated due to reason code 34 May 13 04:00:37 hostapd: wifi0vap2: STA a8:80:55:3c:be:c5 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)34Views1like2CommentsShare internet between two Vlans on a netgear GS724TV4
Hi So I been trying for altmost 2 days to set up my netgear GS724TV4, which is a managed layer3 switch, but does not have capability to create a DHCP server. I am running a webserver and email server, and would like to seperate this from my private network, in case of hacking. So I though I would make two Vlan, lets say vlan1 for private and vlan100 for the server. ISP fiber to my house -> deco X10 setup (internet Vlan id 101 - 802.1q tag) -> unmanaged layer3 switch that provides my netgear with 2 patch cabels in port12 and 13 I have attached a screenshot of my setup and here is some info: port 2 and 3 my private network. port 12 and 13 - Conntect to an unmanaged switch, where my internet patch-cable is connected. port 24 - my server Since I dont understand inter-routing my idea was to have 2 vlans, where vlan1 had port 1-12 untagged and vlan2 had 13-24 untagged, and both vlans would get internet via port 12 or 13. Could somebody tell me if and how to set this up? Help is greatly appriciated169Views0likes1CommentGS724Tv6 How to disable UPnP?
Bought GS724Tv6 switches, which are now spamming my network with SSDP NOTIFY packets. From what I gathered this is due to some UPnP advertising. How can I stop these switches from doing that? In the manual (GS724Tv6_GS748Tv6_UM_EN.pdf) I read: "Manage UPnP switch discovery By default, Universal Plug and Play (UPnP) is enabled on the switch." and I could disable it under "Select System > Management > Switch Discovery. The Switch Discovery page displays." Sadly there is no such option, not does the Site Index list 'Switch Discovery' anywhere. => How can I disable UPnP?328Views0likes0CommentsEAX20 trying to connect to internet via port 8883
Hello everybody, I am currently seeing my EAX20 connecting to the internet a amazon data center via port 8883. I have currently blocked this but I am wondering why it does this? if it is sometthing to do with MQTT, what is it trying to do and do I need it? apart from checking for firmware updates whicj it can still do and I dont have it connected to any app or cloud services, what could be using this? Any help would be greatly appreciated as I cant find this answer anywhere and cant do a support ticket because Netgear only offers 3 months support. Anyway thank you in advance.New EAX15 Mesh Extender - I have a few questions
Hello, this is my first post. Although I am a long time Netgear user! For over 2 decades, I have used two of their cable modems, some Wi-Fi routers, Wi-Fi adapters and many of their venerable 4, 8, and 16 port switches for the home! The EAX15 is the latest Netgear hardware to add to my list! First of all, it works great! I mean, my network setup is fairly simple and kind of old. But it works very well for extending my old 802.11n 2.4 GHz network just fine! I was worried that it may not support that old stuff... Firmware:1.0.3.36 Not explicitly listed on the configuration website mywifiext.local (why?)... but it's up to date and Netgear's site says 1.0.3.36. Model: "EAX15-100NAS" That's written on UPC code portion of the box above serial number, MAC and so forth numbers. The forum suggested there might be a V2 or V3 version of EAX15, but I don't see that anywhere. I guess it's just EAX15. So I have a few questions: Being an old user of home network appliances, I was able to quickly plug my computer into the Ethernet jack of the EAX15 and configure the "conventional" way as expected. The IP was a bit different, but that was easy to figure out. To my dismay, I noticed that documentation neglects telling users about this capability and instructs them to install the Nighthawk App. I installed the app and noticed it wanted me to create an Internet account and provide information to Netgear not relevant for the local network device ... like, Location? OK, maybe it's for Wi-Fi regulatory domain. But still... why wouldn't you document the "old fashion" way to do this? And why would you require an Internet account and collect lots of data from our phones for a strictly local network appliance? This is probably a dumb question. But why can't this product simply amplify or repeat a signal on specific frequencies? Why do you need a man-in-the-middle computer to serve simultaneously as an access point and wireless client? This device is way more complicated in functionality than I thought it would be. I use Adguardhome to protect my elderly father from scams and malware (and helpless devices). I logged into it today and noticed that my EAX15 queries netgear.com about 200 times per hour. What exactly is my strictly local network device communicating with Netgear? I've attached s screenshot of part of my adguardhome statistics page for context. Anyway, I'm otherwise very pleased with the device. It works great! Good job Netgear!865Views0likes1CommentTLS 1.0 & 1.1 active in WAX625 https web interface
Having TLS 1.0 and TLS1.1 supported in https web interface makes Wifi WAX product line susceptible to TLS attacks : - BEAST Attack - CRIME Attack - RC4 Attack - Weak Cipher Suites Attack - Attacks renegotiation And the product is unfortunately shown to be non compliant with security scans, just for that unfortunate reason. The firmware is V10.8.11.4 and I cannot find a security option about TLS ? Are there hidden options somewhere ? Would it be possible to add an option to only support TLS 1.2 (and not 1.0 and 1.1) ? [ I means, as far as software is concerned, this is mostly a change of a numerical constant somewhere. ]762Views0likes4CommentsConfigure SSL/HTTPS for GS724TPV2 and GS752TPv3
Hi All, I am looking to enable HTTPS for all my Netgear Switches (GS724TPV2 and GS752TPV3). But I cannot import the self-signed certificate that I have already got available. I feel like I'm missing a vital step, and was wondering if someone is able to help me on this? Looking forward to hearing some advice. Cheers!952Views0likes5CommentsR8000 V1.0.5.88 released?
I have been having connectivity issues with my R8000 as of late (~2 weeks) and finally came looking today for solutions. To my great surprise (and skepticism) there is a new V1.0.5.88 firmware available as of today?!? My incredulity stems partly from the large version bump (1.0.4.88->1.0.5.88) when the release notes state that the release only "addresses security vulnerabilities". I can find no mention of which security vulnerabilities this addresses on the advisory page . Additionally, aren't security patches typically relegated to W in the X.Y.Z.W version ID? All this compounds when considering this device is EOL for some time now... At any rate, curious to hear any more about this mysterious release and to hear if anyone else has tried it out. Best, SAX1800 WiFi Mesh Extender (EAX14 being hacked?
I've only started having difficulty with this priduct 3 months ago. When I first got it, it worked perfectly fine. I think it's being hacked into because my password for the login has been changed 2 times and I was unable to get it until I managed to change it again. The nighthawk app is saying it doesn't recognize my phone so I can't get in. Is this a matter of which phone I first set it up on? Also, the setting to autmoatically upgrade firmware had been set on no. I had it on yes. I think it's being hacked and if so, what can be done to effectively secure it? Btw. I'm not savvy in this area.