NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Security
29 TopicsWAX620 V10.8.13.2 generating apparently bogus auth messages
I'm seeing messages for the MAC address of a Tuya Smart device authenticating and deauthenticating repeatedly to one of my SSIDs. There is no such device in my house. Is this a neighbor's device or a bug, or combination of the two? I tried creating a MAC ACL for it, which didn't completely stop the auth messages -- the WAX620 still reported periodic auths along with block messages. I've changed the SSID password (WPA3/2) and turned off the four devices using that SSID, but the messages continue. Below is a sample, the first form is seen every few seconds. No associated device ever makes a DHCPREQUEST. May 13 14:21:16 hostapd: wifi0vap0: STA a8:80:55:3c:be:c5 IEEE 802.11: authenticated May 13 03:45:52 hostapd: wifi0vap0: STA a8:80:55:3c:be:c5 IEEE 802.11: Station deauthenticated due to reason code 34 May 13 04:00:37 hostapd: wifi0vap2: STA a8:80:55:3c:be:c5 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)49Views1like2CommentsTLS 1.0 & 1.1 active in WAX625 https web interface
Having TLS 1.0 and TLS1.1 supported in https web interface makes Wifi WAX product line susceptible to TLS attacks : - BEAST Attack - CRIME Attack - RC4 Attack - Weak Cipher Suites Attack - Attacks renegotiation And the product is unfortunately shown to be non compliant with security scans, just for that unfortunate reason. The firmware is V10.8.11.4 and I cannot find a security option about TLS ? Are there hidden options somewhere ? Would it be possible to add an option to only support TLS 1.2 (and not 1.0 and 1.1) ? [ I means, as far as software is concerned, this is mostly a change of a numerical constant somewhere. ]775Views0likes4CommentsWAX220 Guest Network - Unsecured
Do not buy this Access Point and expect a secure Guest Network. The original firmware had an option for L2 Isolation, but updating removes this option and reverting does not restore it. The Guest Network is broken, since it allows access to any device connected to the internal network via Ethernet with no way of isolating. It is a bad joke that even the WAX214 has better security and allows for L2 Isolation on both guest and regular SSID's. In 2023, implementing a proper Guest Network is something that apparently too complex for the firmware developers here. They'll push for selling more cloud subscription crap, but they can't even get something like this done correctly. No idea how anybody could justify paying a monthly fee and expect things to be properly secured after seeing this. Also, the timezone seems to keep defaulting itself to Pacific Standard Time. Did QA even test this model?Solved5.1KViews0likes14CommentsWAC104 Passphrase masked
How do I unmask the passphrase in the security options on the wireless setup page admin site for my WAC104 ? I want to verify the password but the passphrase fields are masked with ****. How do I unmask them to see the current settings ? Please see attached screenshot Thanks in advance for any assistance1.1KViews0likes2CommentsWAX 610 Password
We have 4 WAX610 devices with Firmware 10.3.2.2. A technician did not document the password and now we can't Access the single APs Website. I resettet the insights password and I know in the other sites I can connect using the insight password. But in this case it is not working. I restartet alle Access Points and hoped the password would work but no success. Is there anything I could try besides from resetting the APs? The local admin wants to look into the APs, so that is the reason for this question. Best regards, Bernd2.1KViews0likes4CommentsWax630 at Two Physical sites
Have two sites - physically seperate Town/City At both site we have Draytek 2866 Routers, Sites are conected via SITE-SITE VPN on the Draytek Router At the Main Site we have a Windows Server 2012 with DHCP The Satalite site's Router has a different IP but DHCP users at this site pick up IP from Servers DHCP at the Main site Existing Wifi set up - consists of Staff and Guest SSID (guest has no access to LAN) NO VLAN's setup - never really setup VLANs On the WAX630 - I want to keep the Staff and Guest Networks separete ie. guest have no access to LAN or other Wifi devices I've created Guest and Staff SSID - guest as ISOLATED Currently I've set this up for the Main site on 2 x WAX630's at Home The other two access Points for the Satalite site will use the same SSID's ? I'm not sure have to Test that but... Technically if I add the other 2 devices at home I'm guessing that should work in a similar way (although my Virgin Router provide the DHCP) Appreciate any comments / feed back.802Views0likes1CommentHow to access web interface on WAG102 with a modern browser
I am unable to open the web interface on our WAG102 access point. I've tried Microsoft Edge, IE11, Chrome and FIrefox. All report similar errors, associated with SSL/TLS. Is there any way that I can still access the device, or do I need to scrap it?!Solved26KViews0likes22CommentsWAX620 Client Isolation Broken after Firmware Upgrade
Installed WAX620, immediately upgraded firmware to 9.5.4.6. Accepting all defaults. Set SSID name and password. Then enabled Wireless Client Isolation and disabled allowing access to the AP UI. Intention is a guest only WAP. No other settings done. Connected to SSID via an iPhone. Verified it was connected to the WAX620 SSID. Within Mail app, I can print emails to a wired printers (Brother, HP and Canon). Within Airport app, I can see/connect/manage all AirPort devices. Within Nest and Ring apps, I can connect/manage all devices. I downgraded firmware to 9.5.4.3 and 9.5.3.4 and found the feature is also broken. I downgraded firmware to 9.5.2.5 and the feature works properly. I am not comfortable using any of the 3 most recent versions of firmware, nor am I comfortable using such an old firmware version after so many security updates.2.7KViews0likes8Comments