NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Security
517 TopicsRequest: List of Products That Perform Cryptographic Key Provisioning
We are reviewing your networking products for internal compliance purposes. Could you please confirm which of your hardware-based products (e.g., switches, routers, relays, gateways) include any of the following cryptographic functions: Provisioning or distribution of encryption keys to other devices Acting as a MACsec Key Server (e.g., providing CAKs/SAKs to peers via MKA) Providing IPsec/IKEv2 key exchange for other systems Embedded EAP/PKI certificate provisioning or CA functions Managing network-wide encryption policies or certificate trust for other devices We are not asking about encryption used only for login/authentication (e.g., HTTPS, SNMPv3, 802.1X), or encryption used solely for the unit’s own interfaces. This request is limited to cases where the product provides or manages encryption on behalf of other devices. If possible, please provide a list or matrix identifying which models include any of the above features. Any documentation that describes these capabilities would also be appreciated. Thank you for your support.15Views0likes0CommentsWAX620 V10.8.13.2 generating apparently bogus auth messages
I'm seeing messages for the MAC address of a Tuya Smart device authenticating and deauthenticating repeatedly to one of my SSIDs. There is no such device in my house. Is this a neighbor's device or a bug, or combination of the two? I tried creating a MAC ACL for it, which didn't completely stop the auth messages -- the WAX620 still reported periodic auths along with block messages. I've changed the SSID password (WPA3/2) and turned off the four devices using that SSID, but the messages continue. Below is a sample, the first form is seen every few seconds. No associated device ever makes a DHCPREQUEST. May 13 14:21:16 hostapd: wifi0vap0: STA a8:80:55:3c:be:c5 IEEE 802.11: authenticated May 13 03:45:52 hostapd: wifi0vap0: STA a8:80:55:3c:be:c5 IEEE 802.11: Station deauthenticated due to reason code 34 May 13 04:00:37 hostapd: wifi0vap2: STA a8:80:55:3c:be:c5 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)52Views1like2CommentsShare internet between two Vlans on a netgear GS724TV4
Hi So I been trying for altmost 2 days to set up my netgear GS724TV4, which is a managed layer3 switch, but does not have capability to create a DHCP server. I am running a webserver and email server, and would like to seperate this from my private network, in case of hacking. So I though I would make two Vlan, lets say vlan1 for private and vlan100 for the server. ISP fiber to my house -> deco X10 setup (internet Vlan id 101 - 802.1q tag) -> unmanaged layer3 switch that provides my netgear with 2 patch cabels in port12 and 13 I have attached a screenshot of my setup and here is some info: port 2 and 3 my private network. port 12 and 13 - Conntect to an unmanaged switch, where my internet patch-cable is connected. port 24 - my server Since I dont understand inter-routing my idea was to have 2 vlans, where vlan1 had port 1-12 untagged and vlan2 had 13-24 untagged, and both vlans would get internet via port 12 or 13. Could somebody tell me if and how to set this up? Help is greatly appriciated186Views0likes1CommentGS724Tv6 How to disable UPnP?
Bought GS724Tv6 switches, which are now spamming my network with SSDP NOTIFY packets. From what I gathered this is due to some UPnP advertising. How can I stop these switches from doing that? In the manual (GS724Tv6_GS748Tv6_UM_EN.pdf) I read: "Manage UPnP switch discovery By default, Universal Plug and Play (UPnP) is enabled on the switch." and I could disable it under "Select System > Management > Switch Discovery. The Switch Discovery page displays." Sadly there is no such option, not does the Site Index list 'Switch Discovery' anywhere. => How can I disable UPnP?340Views0likes0CommentsTLS 1.0 & 1.1 active in WAX625 https web interface
Having TLS 1.0 and TLS1.1 supported in https web interface makes Wifi WAX product line susceptible to TLS attacks : - BEAST Attack - CRIME Attack - RC4 Attack - Weak Cipher Suites Attack - Attacks renegotiation And the product is unfortunately shown to be non compliant with security scans, just for that unfortunate reason. The firmware is V10.8.11.4 and I cannot find a security option about TLS ? Are there hidden options somewhere ? Would it be possible to add an option to only support TLS 1.2 (and not 1.0 and 1.1) ? [ I means, as far as software is concerned, this is mostly a change of a numerical constant somewhere. ]791Views0likes4CommentsConfigure SSL/HTTPS for GS724TPV2 and GS752TPv3
Hi All, I am looking to enable HTTPS for all my Netgear Switches (GS724TPV2 and GS752TPV3). But I cannot import the self-signed certificate that I have already got available. I feel like I'm missing a vital step, and was wondering if someone is able to help me on this? Looking forward to hearing some advice. Cheers!1KViews0likes5CommentsVLAN Layer Requirements for Home/Work/Everything under the sun Network operation
Hi all, I need you brains and experience to set up separate VLAN's for better security i believe, too many gaps here atm. Last time i want to rebuild the Desktop this week. Seeking your advice. And I'm no expert in networking, so if something sounds ridiculous, let me know, i wont be offended. So, i want to delve into the world of VLANS for added security, free for all here atm. I would like 1x VLAN - For work laptop,1x for IOT Helium Miner as need to use as a node soon too, 1x for my desktop and laptop, mobile, 1x for Guests, 1x for smart devices like TV's and Foxtel boxes, PS4. and Media streaming devices, 1x for power meter monitors, humidity sensors, moisture sensors, 1x for the 4xWi-Fi CCTV cameras outside the granny flat within My granny flats SSID range, 1x for the Western Digital MyCloudEX2 Ultra NAS, 1x for Guests, 1x for the other 4 x WIFI CCTV cameras at the top end of property connected to TP-Link RE650 Access Point via CAT6 cable from here to house which are on a separate SSID. This is all currently held together by a Huawei B818-236 LTE Router which has a WAN Port and one WAN/LAN1 Port. I have the Helium minor a Sensecap M1 connected directly into the WAN/LAN1 port on the B818-236 as no ports available on GS108E-300AUS Switch atm. It has the WAN port from the Huawei B818-236 connecting into port 8, then the port 7 is connected to my Desktop atm, as its easier when the router goes to hell to direct log into the B818--236 as they are next to each other, unplug from switch to router to fix it after a factory reset basically. Port 6 goes into the WDMyCloudEX2Ultra NAS also located there on the tv cabinet, port 5 is cable running to the office where there is a unmanaged GS105v5 switch, ( i used to have my desktop plug into port 4 here, but now have the cable that runs into the house and plugs into the GS105E-200AUS , port 3 into the Foxtel IQ4, port 2 into the into Samsung TV Lounge room, Port 2 into TV Bedroom, Port 1 into PS4.......back to the Port 5 connecting the GS108E-300AUS to the unmanaged GS105v5 switch, Port 4 here goes to House into GS105E-200AUS, port 3 goes into Work Laptop on my desk when needed or the personal laptop when needed, port 3 goes into the Brother Laser Printer when needed. In the house the unmanaged GS105v5 switch, Port 4 connects to a GS105E-200AUS where port 2 connects to a TP-Link RE-650 wireless Access Point providing coverage to the 3 Wi-Fi Cameras 65meters from here on their secure SSID 2.4Ghz, and port 3 goes to mums Foxtel box as half my data is now used for days of our lives the bold and the beautiful, but that's cool, least i can do for the mum, since after 50 years the shows moved online, her TV , phone, Foxtel box also connect wirelessly to the RE650 AP. If you managed to understand all that, you're doing well. I need to secure all this, i was going to simply replace the unmanaged GS105v5 with another GS105E-200AUS managed switch and use VLAN Layer 2 setup. However, reading allot on the NET, and asking Ai allot i am confused if i need layer 3 VLAN capability, and need to buy a GS108T-300AUS layer 3 switch , which i would swap with the GS108E-300AUS switch, and use the GS108E-300AUS switch in place of the GS105v5 unmanaged switch,.....so we end up with antenna on roof to Huawei B818-236 on cable to Sense cap M1 Helium IOT Minor, the other to GS108T-300AUS layer 3 switch (probably plug the miner into this, and the desktop into the next switch down line to free a port) which plugs into the relocated GS108E-300AUS layer 2 switch at my desk, which feeds into the GS105E-200AUS layer 2 switch up in the house. All help, comments appreciated, and please point out any mistakes, its been ad hoc network slowly growing never planned for end state. Need proper secure end state now lol. Now i have not proofread this as its 3am need sleep been rebuilding desktop with fresh SSD and windows install, any malware is DEAD. Nothing is connected to the net other than this laptop atm. and will stay this way until i know what the hell i need to do this right, i have no experience in VLANS, understand the concept, YouTube helping. makes sense. Question: Do i need a layer 3 switch for all this to work, given all devices at the circus here. Look forward to some wise advice, Thank you all in advance, Much appreciated, I need sleep. Laters \m/FVS336G How do I change the certificate presented from 192.168.1.1 (Default admin)
I have the FVS336G installed to load balance between two internet providers (small office) The admin page is SSL secured with a self signed NetGear CA certificate - After I add this certificate into my trusted list in Windows the browser complains about it using an obsolete cipher suite. I am concerned at some point these browsers are going to shut down access to this NetGear Firewall I tried installing a self signed root CA cert and signing the FVS336G generated request with it - but it must only be used with VPN as it did not change the certificate used by the admin page. Is there a way to update this admin certificate? Or maybe a way to disable SSL - I have no interest in remote managing the FVS336G. Is there a way to SSH into the firewall and swap out a certificate file or something? ...Dale PS: I have the latest firmware installed.Solved11KViews0likes11Comments