Howard Hudson - Week 10 - VLAN
Often, homeowners and business administrators use newer capabilities such as remote access to manage a network. Do you want to add devices such as a wireless HVAC controller and water heater controller? That is no problem. There was as recent burglary down the street so you want to install a few cameras. That is not difficult, wireless camera systems are abundant and relatively easy to setup.
Is there any danger when installing all of those devices on a network? Yes, there is a risk. Most of the wireless devices are not secure, which creates vulnerabilities in a network. Can someone access the camera system and see inside my property? It is possible, but preventable. Applying a few basic security techniques greatly reduces the threat.
Some of the all-purpose precautions that help prevent unauthorized access to your network include maintaining up-to-date software, restricting or eliminating public networks, using passwords that are less common than 123456, password, and abc123. As well, consider changing default passwords. M!C@rI$a7^9fB* is an example of a decent non-randomized password (see picture below). Password managers are a good tool for keeping passwords safe and randomizing your passwords.
There are more advanced ways to protect a network. Excluding fiscal restraints and depth of features, the choices are similar for households and businesses. Two courses of action include separating devices on a network and masking devices.
Changing the name (SSID) of the segments is relatively easy. Simply, edit the names of the network segments (and devices if able) so that the names do not represent the function (or devices); rename an Ubiquiti Camera to an ambiguous name. As well, segregating a network will prevent cross-talk and isolate a breach to one specific VLAN. That means that if someone breaks into a wireless HVAC controller, the IP cameras are not immediately accessible. In addition, keeping sensitive data and devices on a separate segment will provide the same protection. On side note, consider using PoE IP cameras. Doing so will eliminate the vulnerability associated with wireless cameras.
An Ubiquiti Managed UniFi Switch (US-8-150W) provides VLAN features. The TP-LINK TL-SG108PE switch is another option. It provides port based VLAN and software based VLAN. The Cisco
SG300-20 Gigabit Managed Switch (SRW2016-K9-NA) provides advances features since it is a Light Layer 3 LAN Switch. It is a better choice for business requirements because it provides advanced capabilities such as VLAN groups and VOIP VLANS among other capabilities.
Bullet Point Summary
Resources
Empey, C. (2018, July 19). How to secure your smart home. Retrieved February 18, 2019, from https://blog.avast.com/how-to-secure-your-smart-home
Global CTI. (n.d.). LAN Switching – Layer 2, Layer 3, Light Layer 3. Retrieved February 18, 2019, from https://gcti.com/lan-switching-layer-2-layer-3-light-layer-3/
Rashid, F. Y. (2017, October 16). How to Secure Your (Easily Hackable) Smart Home. Retrieved February 18, 2019, from https://www.tomsguide.com/us/secure-smart-home-how-to,news-19380.html
Santoso, F. K., & Vun, N. C. (2015). Securing IoT for smart home system. Retrieved February 18, 2019, from https://ieeexplore.ieee.org/document/7177843
Symantec employee. (n.d.). 12 tips to help secure your smart home and IoT devices. Retrieved February 18, 2019, from https://us.norton.com/internetsecurity-iot-smart-home-security-core.html
Widmark. (2017, May 14). Difference Between TP Link SG108E Smart Switch v3 and v2? Retrieved February 18, 2019, from https://www.snbforums.com/threads/difference-between-tp-link-sg108e-smart-switch-v3-and-v2.39137/
Configuring VLANs on 200 and 300 Series Managed Switches
https://www.youtube.com/watch?v=bPBAnRLuco4
TL SG108PE VLAN 4:23
https://www.youtube.com/watch?v=1_Ikd6wDinE
UniFi Switch 8 Follow-Up and VLAN Config 7:56
https://www.youtube.com/watch?v=JblnjsnJNJU
Is there any danger when installing all of those devices on a network? Yes, there is a risk. Most of the wireless devices are not secure, which creates vulnerabilities in a network. Can someone access the camera system and see inside my property? It is possible, but preventable. Applying a few basic security techniques greatly reduces the threat.
Some of the all-purpose precautions that help prevent unauthorized access to your network include maintaining up-to-date software, restricting or eliminating public networks, using passwords that are less common than 123456, password, and abc123. As well, consider changing default passwords. M!C@rI$a7^9fB* is an example of a decent non-randomized password (see picture below). Password managers are a good tool for keeping passwords safe and randomizing your passwords.
There are more advanced ways to protect a network. Excluding fiscal restraints and depth of features, the choices are similar for households and businesses. Two courses of action include separating devices on a network and masking devices.
Changing the name (SSID) of the segments is relatively easy. Simply, edit the names of the network segments (and devices if able) so that the names do not represent the function (or devices); rename an Ubiquiti Camera to an ambiguous name. As well, segregating a network will prevent cross-talk and isolate a breach to one specific VLAN. That means that if someone breaks into a wireless HVAC controller, the IP cameras are not immediately accessible. In addition, keeping sensitive data and devices on a separate segment will provide the same protection. On side note, consider using PoE IP cameras. Doing so will eliminate the vulnerability associated with wireless cameras.
An Ubiquiti Managed UniFi Switch (US-8-150W) provides VLAN features. The TP-LINK TL-SG108PE switch
- Maintain up-to-date software
- Restrict or eliminate public networks
- Use passwords that are less common and changing the factory passwords
- Consider password managers if necessary (be aware that some of the programs store your data on their server).
- Use unmanaged, smart, or managed switches as necessary
- Separate devices using VLANs
- Change names (SSIDs)
MyCarIsa79fordBronc* |
Resources
Empey, C. (2018, July 19). How to secure your smart home. Retrieved February 18, 2019, from https://blog.avast.com/how-to-secure-your-smart-home
Global CTI. (n.d.). LAN Switching – Layer 2, Layer 3, Light Layer 3. Retrieved February 18, 2019, from https://gcti.com/lan-switching-layer-2-layer-3-light-layer-3/
Rashid, F. Y. (2017, October 16). How to Secure Your (Easily Hackable) Smart Home. Retrieved February 18, 2019, from https://www.tomsguide.com/us/secure-smart-home-how-to,news-19380.html
Santoso, F. K., & Vun, N. C. (2015). Securing IoT for smart home system. Retrieved February 18, 2019, from https://ieeexplore.ieee.org/document/7177843
Symantec employee. (n.d.). 12 tips to help secure your smart home and IoT devices. Retrieved February 18, 2019, from https://us.norton.com/internetsecurity-iot-smart-home-security-core.html
Widmark. (2017, May 14). Difference Between TP Link SG108E Smart Switch v3 and v2? Retrieved February 18, 2019, from https://www.snbforums.com/threads/difference-between-tp-link-sg108e-smart-switch-v3-and-v2.39137/
Configuring VLANs on 200 and 300 Series Managed Switches
https://www.youtube.com/watch?v=bPBAnRLuco4
TL SG108PE VLAN 4:23
https://www.youtube.com/watch?v=1_Ikd6wDinE
UniFi Switch 8 Follow-Up and VLAN Config 7:56
https://www.youtube.com/watch?v=JblnjsnJNJU
Comments
Post a Comment