Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Guides - Privacy & Security Tips
How to protect the wi-fi router and home LAN.
Message
<blockquote data-quote="HarborFront" data-source="post: 887632" data-attributes="member: 55987"><p><strong>Network segmentation can be used to isolate risky/unsecured/untrusted devices i.e. such devices (like IoT) need to be <em>protected separately</em> from the main WiFi network</strong></p><p></p><p>1) Use the default free AiProtection from ASUS/TP-Link/Linksys, McAfee from Dlink routers or subscription-based Netgear Armor for Netgear routers but at the expense of privacy due to user data collection by Trend Micro/BitDefender/McAfee. This method will not impact much on throughput performance</p><p></p><p>2) Using multi-SSID method like use of the Guest Network and setting with static ip addresses is also possible but the wireless separation of separate LAN access is within the same supporting router. Availability of AP(aka Wireless/Station/Client /Guest Mode) Isolation in Guest Network will depend on the router</p><p></p><p>3) Attaching a second non-WiFi6 router to the main router(as Access Point) and connecting all the IoT devices to the second router. The second router can provide the firewall/IDS/IPS/malware/AP Isolation protection to the IoT devices</p><p></p><p>4) Or setup a separate non-WiFi6 router network with second line for IoT devices and set static addresses only with isolated (firewalled) network, intrusion prevention, malware protection and AP Isolation capabilities</p><p></p><p>5) Install an external hardware firewall like the Netgate SC-5100 (need to confirm whether its VPN is ougoing or incoming)</p><p></p><p>6) Buy a smart home IoT protection device like BitDefender Box v2/RATtrap etc which comes with IPS/IDS/Firewall but needs to pay for annual subscription. Take note that such devices may not be compatible with your router and will affect the throughput performance</p><p></p><p>7) Some routers offer the option to create VLANs (virtual LANs) inside a larger private network. These virtual networks can be used to isolate IoT devices. In short, VLANs are Guest WiFi networks on steroids. Generally, not available for consumer routers.</p></blockquote><p></p>
[QUOTE="HarborFront, post: 887632, member: 55987"] [B]Network segmentation can be used to isolate risky/unsecured/untrusted devices i.e. such devices (like IoT) need to be [I]protected separately[/I] from the main WiFi network[/B] 1) Use the default free AiProtection from ASUS/TP-Link/Linksys, McAfee from Dlink routers or subscription-based Netgear Armor for Netgear routers but at the expense of privacy due to user data collection by Trend Micro/BitDefender/McAfee. This method will not impact much on throughput performance 2) Using multi-SSID method like use of the Guest Network and setting with static ip addresses is also possible but the wireless separation of separate LAN access is within the same supporting router. Availability of AP(aka Wireless/Station/Client /Guest Mode) Isolation in Guest Network will depend on the router 3) Attaching a second non-WiFi6 router to the main router(as Access Point) and connecting all the IoT devices to the second router. The second router can provide the firewall/IDS/IPS/malware/AP Isolation protection to the IoT devices 4) Or setup a separate non-WiFi6 router network with second line for IoT devices and set static addresses only with isolated (firewalled) network, intrusion prevention, malware protection and AP Isolation capabilities 5) Install an external hardware firewall like the Netgate SC-5100 (need to confirm whether its VPN is ougoing or incoming) 6) Buy a smart home IoT protection device like BitDefender Box v2/RATtrap etc which comes with IPS/IDS/Firewall but needs to pay for annual subscription. Take note that such devices may not be compatible with your router and will affect the throughput performance 7) Some routers offer the option to create VLANs (virtual LANs) inside a larger private network. These virtual networks can be used to isolate IoT devices. In short, VLANs are Guest WiFi networks on steroids. Generally, not available for consumer routers. [/QUOTE]
Insert quotes…
Verification
Post reply
Top