© Carey Parker 2020
C. ParkerFirewalls Don't Stop Dragonshttps://doi.org/10.1007/978-1-4842-6189-7_6

6. LAN Sweet LAN

Carey Parker1 
(1)
North Carolina, NC, USA
 

In this chapter, we’re going to discuss your home network. Even if you have only one computer connected to the Internet, you still technically have a network. A network is something that allows two or more devices to communicate and share resources. The Internet is the most famous network; it’s the network that connects us to computers and services all over the globe. But most of us also have an intranet within our homes, and how we allow our personal network to communicate with the public network is crucial to our security and privacy.

Network Overview

Let’s start by identifying the parts of your home network—called a local area network (LAN) . For your computer to connect to the Internet (referred to as a wide area network , or WAN), you first need to have Internet service—often called broadband or high-speed Internet service. For most people, this is provided by their cable or phone company.1 In rural areas, you might get your Internet service from a satellite company. In many metropolitan areas, you can get Internet service over fiber-optic cable. But regardless of the specific way in which you connect to the Internet, the company that provides you with this service is called your Internet service provider (ISP). Somewhere in your house you will have a box that this company provided to which you connect your computer. This box is usually called a modem (which is short for “modulator-demodulator”). A typical modem looks something like Figure 6-1.
../images/466102_4_En_6_Chapter/466102_4_En_6_Fig1_HTML.jpg
Figure 6-1

Cable modem

The modem converts the common Internet Protocol (that your computer understands) to some sort of special protocol that allows the communication to flow over the phone lines, cable line, fiber-optic cable, or satellite link. This device is assigned an Internet Protocol (IP) address, and like the address on your house, it’s associated specifically with you (or your account). When your computer talks to the Internet, the return address on all its packets is your IP address.

In the simplest case, you just connect your computer directly to this modem and you’re done. That’s your entire network. But most of us today have more than one device in our homes that wants to access the Internet, and in that case, you need another piece of equipment called a router . Your ISP gives you only one IP address. If you have multiple devices, then you need some way to give those devices their own addresses—at least within your home—so that each one of those devices can carry on their own conversations with other things on the Internet. (We discussed how this works in previous chapters.)

It’s important to note that if you have multiple devices on your home network, they often talk to each other, as well. That is, they send information between themselves that’s not meant to leave your house. Maybe you’re streaming some music from your computer to your home theater system or printing a document from your laptop to a printer. In this case, all the data travels completely within your network. It’s like someone in marketing sending a package to the sales department via internal company mail. The US Postal Service never sees or knows about this; it’s completely internal and private. We’ll see why this is important in the next section.

Most routers today are wireless routers. This is a little box that often has one or more little antennas on it and is directly connected to your modem via a cable called an Ethernet cable. It will look something like Figure 6-2.
../images/466102_4_En_6_Chapter/466102_4_En_6_Fig2_HTML.jpg
Figure 6-2

A sample Wi-Fi router

Ethernet cables are like phone cables—they usually have little clippy things on the end that snap into place. Ethernet cables are the most common cords that are used to connect things to a network directly. The router box is then connected to all the other devices in your house that need to access the Internet—either hardwired with an Ethernet cable or connected virtually over the air, wirelessly. The wireless connection is called Wi-Fi or sometimes by its technical spec name, 802.11. Networks created by Wi-Fi routers are commonly referred to as wireless LANs (WLANs). (I know…couldn’t they come up with something a little less confusing? LAN, WAN, WLAN—really? Don’t shoot the messenger, folks.) There are many versions of Wi-Fi—over the years they improved things and gave the spec different names like 802.11n and 802.11ac. Realizing that this naming is rather cumbersome, the Wi-Fi Alliance has moved to a simpler naming scheme: “Wi-Fi” followed by a number. The latest version is Wi-Fi 6 (which would have been called 802.11ax in the old naming scheme). But all you really need to know is that the router acts like an internal, private mail room—the router allows all the devices in your house to have private addresses inside your home to talk with each other and to share a single public Internet address for communications with the outside world. Many hotels, cafes, restaurants, airports, and libraries provide free Wi-Fi Internet access for customers. These locations are referred to as Wi-Fi hotspots .

That’s pretty much your home network in a nutshell. You have a modem, a router, and a bunch of devices that are connected to that router (either wired or wirelessly). Those devices include desktop computers, laptops, smartphones, printers, and tablets. With the explosion of “smart” devices (the so-called Internet of Things), we also have several other devices wanting to connect to the Internet, including TVs, streaming boxes (like Apple TV, Fire TV, or Roku), video doorbells, home appliances, thermostats, and even light bulbs.

Now that we know the pieces to the home network puzzle, let’s take a look at the security and privacy issues associated with your home network and how to deal with them.

Modem

The modem provided to you by your Internet service provider is generally something you cannot control, and that makes a security- and privacy-conscious person nervous. Many ISPs are now providing a combo product: a modem and Wi-Fi router all in one—how convenient! That’s even worse. Why? Because what’s best for your ISP is not the same as what’s best for you.2 Your network router is doing two crucial things: it’s a wall between your network and the rest of the wild, woolly Internet, and it’s the hub for all the data traffic within your home network. There’s just no reason to trust your ISP to perform those critical functions. While ISPs will usually try to protect your home network from bad actors on the Internet, they have no reason whatsoever to protect your privacy or to insulate you from their own meddling. Furthermore, you want to have full control over the configuration of your Wi-Fi router, and your ISP may not give you that access. For these reasons alone, I strongly suggest you always insert your own router between your computer and your ISP’s modem. Basic models are pretty cheap, and this book can help you get it set up.

Here’s an interesting story that will help to illustrate my point. A few years ago, Comcast (one of the largest ISPs in the United States) began rolling out a service for its customers called Xfinity Wi-Fi. This service allows Comcast customers to use “millions” of free Wi-Fi hotspots around the world. Sounds great, right? What’s not to like? Well, the company accomplished this by turning people’s private cable boxes into public hotspots—that is, Comcast enabled this feature on your home combo modem/Wi-Fi box so that its customers near (or in) your home could connect to the Internet using your equipment. While I’m sure Comcast customers somehow implicitly gave Comcast permission to do this somewhere in their licensing agreement, I’m willing to bet most people had no idea they were doing this. Your modem is, after all, Comcast’s equipment—not yours. It provides you with a service, and that contract surely allows Comcast to offer other services using its equipment.

When this became widely understood, people rightly had serious questions about this service. Won’t this slow down my Internet connection (having to share it with others)? Will this give strangers access to my home network? What if someone uses my Internet connection to do illegal things—won’t that appear as if I did those things? Comcast has some partial answers for these concerns, and there does exist a way to opt out of this program by changing your account preferences online. But the real question is: do you trust your ISP to do what’s best for you (as opposed to what’s best for them)? If Comcast changes its strategy or decides to offer another feature like this in the future, how likely are you to be properly informed of this? And will you be given the choice to opt out? (Two customers in San Francisco filed a class action lawsuit against Comcast over this, but it was thrown out because all Comcast customers agreed to settle disputes via arbitration in their terms of service.)

The simplest solution to this is to just use your own router. If your ISP provided you with a combo modem and Wi-Fi router, I would call them up and ask them to disable the Wi-Fi service entirely. If you’re a Comcast customer, I would also opt out of the Xfinity public/shared Wi-Fi program, if possible.

Since your modem is usually provided to you by your ISP, there’s usually not much else you can do here. However, in most cases you can buy your own modem—see the tips at the end of this chapter.

Wi-Fi Router

Your Wi-Fi router is arguably the most important part of your network in terms of your overall Internet security. It’s also probably the most complicated one because it performs a wide variety of important functions. Understanding how to properly configure a Wi-Fi router is not easy, but that’s why you bought this book! I’ll walk you through the primary settings you need to worry about and show you how to configure them properly. Before we get to the specifics, let’s discuss the key functions of your Wi-Fi router.

As I mentioned in earlier sections, one of the primary functions of your router is to serve as a barrier between your private, home network and the wider, public Internet. Regardless of how many devices you have inside your house, the external world sees all your packets as coming from a single address—your public IP address. Your router takes care of delivering all inbound traffic to the proper device inside your home. This function is called Network Address Translation (NAT), and we discussed it earlier. However, your router does a lot more than that. Let’s break it down.

The primary function of a router is to act as a boundary between your private home network and the public Internet. Again, it’s like an internal mail service within your house, allowing all the devices on your network to talk to each other and, when necessary, establishing connections between your internal devices and external, public servers and services. In fact, your router is actually in charge of assigning mailing addresses (i.e., IP addresses) for all the devices in your network. It does this using Dynamic Host Configuration Protocol (DHCP). When you plug a device into the network or allow a new device to connect wirelessly, that device needs to have a unique IP address to communicate with anything else on the network—and your router is in charge of handing out those addresses.

As we’ve discussed, most routers come with a built-in firewall function that specifically prevents external entities from prying into your private home network, unless you explicitly allow it or something inside your home initiates the conversation. Routers also act as a sort of traffic cop, directing traffic in the network. The router can allow some traffic to have a higher priority than others—for example, allowing live video streams to flow freely while sending Google queries to the back of the line. Packets of audio and video information are very time-sensitive—if those packets are delayed or lost, you will have glitches in your music or your streaming movies. However, things like querying Google for local restaurants or checking your email can wait a bit, if necessary (and by “a bit” I’m talking fractions of a second). This is referred to as quality of service (QoS) ; some network packets are more “important” than others. Some routers will automatically detect important traffic and prioritize it, while others need to be configured for this feature. The quality of service flag on these packets is not required to be honored, it’s more of a suggestion—but it’s a mechanism that can be used to improve the performance of time-sensitive network traffic.

Wi-Fi routers allow you to connect to your home network wirelessly. This feature, while extremely handy, brings with it a lot of security issues. Instead of having to physically plug an Ethernet cable into your router to get onto your network, you can now connect your laptop or other smart device through the ether simply by changing a setting. Instead of having to be physically inside your house, with Wi-Fi you only have to be near your house—like next door or parked outside on the street. To protect your network, Wi-Fi has some security options that will restrict access to your network. These include adding encryption, authentication, and even some good ol’ security by obscurity. However, there are also a lot of add-on features for convenience that have exposed some weaknesses. All of these will be discussed at length in the checklist at the end of this chapter.

The Internet of Things

The Internet of Things (IoT) refers to the current tech trend of making all of our dumb devices smart—that is, connecting them to the Internet (which I’m not sure necessarily makes anything or anyone “smart”). What good is your refrigerator if you can’t query its contents from the office before you come home? Who wants a dumb thermostat that you can’t change from halfway around the globe? Who needs a Bluetooth speaker that won’t respond when you ask it for today’s weather? We’re already spoiled by our smart devices, and we’ve frankly only scratched the surface of what’s possible.

The problem with adding smarts to cheap devices like light bulbs, baby monitors, thermostats, and appliances is that it adds cost—in some cases, significant cost (compared to the equivalent “dumb” version). People pay for features they can see and experience—and they tend not to pay for other stuff, like security. Security in particular can cost a lot of time and money to develop and build into your products, especially if you’re going to do it right. And so many companies don’t do it right or at all. We like to say that the S in IoT is for security…meaning there is none. So, as we’re bringing all these wonderful, connected devices into our homes, we also need to be very cognizant of the risks involved.

What does that mean, exactly? There are two primary reasons that bad guys might want to target your weak IoT devices: to establish a beachhead inside your LAN to get at other devices or to conscript your devices to serve in a zombie computer army (I’m not kidding). Let’s take these one at a time.

If a hacker wanted to try to spy on you or score some personal data, they need to get onto your home network, meaning they need to get past your router’s firewall. The best way to do that is to have an “man on the inside,” and usually the easiest target is a vulnerable IoT device. Each of these devices contains a tiny computer. If the hacker can take over that computer with malware by exploiting the weak security, it can now roam around your home network at will. Maybe they’ll try to infect other devices, including your computers. They could turn on microphones or cameras to spy on you or root around your files for sensitive information. While you might wonder why anyone would target you for this, you have to realize that many of these hacking programs are automated. It’s like robotic burglars roaming around neighborhoods looking for unlocked doors and windows and taking stuff that looks valuable.

But once they’ve compromised your devices, the more likely scenario is to use these devices to do nefarious things. We call these groups of hacked computers and devices a botnet . They listen for instructions from remote command-and-control computers and do their bidding. This may be attacking other, higher-value computers or simply mining Bitcoin to make their masters some money. But once conscripted into this zombie army, they can be called upon to do anything at any time.

This might sound silly, but it’s a real problem. Remember the Target credit card breach in 2014? Hackers got into Target’s payment system by first hacking the heating and air conditioning system. The system was on the same network as the credit card database. In another story, the CEO of cybersecurity company Darktrace revealed that a casino’s high-roller data was exfiltrated by first compromising a smart aquarium thermostat in the casino’s lobby.

Botnets are even more serious. When done well, a thousand compromised devices can bring down an entire website. The Mirai botnet was responsible for crippling Internet service of much of the United States and parts of Europe in 2016 by taking down the DynDNS service.

The Internet of Things is bringing us a ton of innovation and convenience, but device manufacturers have to step up their security game. Likewise, governments need to start requiring these devices to meet minimum security and privacy standards, including the ability to be remotely and automatically upgraded to fix software bugs as they’re found.

Virtual Private Network

Another important tool in the network security arsenal is the virtual private network (VPN). A VPN creates a secure (encrypted) connection between a client (computer or smart device) and a remote network. Historically, VPNs were most commonly used by employees of large companies when traveling or telecommuting. The VPN connection allowed them to access the internal corporate network from the outside. That is, it allowed remote workers to access email, files, and internal websites (resources that are normally blocked to all outside access) as if they were in the main office, plugged into a local network port or connected to the in-building Wi-Fi.

Of course, when the coronavirus hit, VPN usage soared as many more people were forced to work from home—going into the office was no longer an option. But VPNs have many more uses outside the corporate world. To understand this, we need to understand what a virtual private network is and how it works.

A VPN service connects a “client” (usually a computer or a smart device like your phone) to another computer in a remote location using encryption to protect the data traffic from prying eyes along the path. In the traveling employee scenario, this remote computer is at the border of the company’s internal network, allowing remote access to the corporate LAN. It’s sort of like having a private, opaque pipeline from your computer to the office. In fact, VPN connections are often referred to as tunnels for this reason.

Let’s say you were locked in your castle, with an invading army at your gates laying siege to your stronghold. You would like to be able to send communications to your allies on the outside, perhaps send for help. You can’t just send a messenger out the front gate, can you? But what if you had a secret tunnel under the castle wall that ran two miles to a neighboring keep? Then you could send messengers out and even allow messengers to come in, and the army surrounding would have no idea it was happening. Actually, even if they knew it was happening, there’s nothing they could really do, unless they could somehow figure out where the tunnel was buried. If the tunnel was wide enough, your people could come and go as they pleased. That’s sort of the analogy for a corporate VLAN (virtual LAN).

But VPNs have other very interesting uses outside the corporate world, and they’re starting to become more popular with regular, everyday Internet users. Let’s look at our analogy again. A VPN is like setting up a tunnel between you and another network. This tunnel is essentially 100 percent impregnable and opaque to outside viewers. They may know it’s there, but even if they do, they don’t know where it goes. For the purposes of this analogy, it’s really almost like a magic portal: when you step through it, you are instantly transported to another place. How might we use such a thing?

Well, let’s say you’re traveling internationally for some reason—business or pleasure, it doesn’t matter. But you want to be able to access stuff on your home computer, maybe music or movies or files. You can create a VPN tunnel that will connect your laptop or tablet through the public Internet, halfway around the globe, back to your home network—as if you were sitting in your living room. (Okay, there is going to be some delay if you’re really far away, but you will still have full access to your stuff.)

But what if you want to access some of your favorite web services while you’re traveling, like Netflix or Spotify? Both of those services are restricted; they usually work only if you’re accessing them from within your home country or region. With a VPN service, you can create a tunnel or portal from wherever you are back to your home country and appear to these services as if you’re inside the country. All of your network traffic goes through this tunnel and comes out wherever you choose (most VPN services offer you multiple “exit point” locales). For example, you might be in Italy for the summer, but as far as Netflix can tell, you’re really in Seattle, Washington, because the return IP address on all your network packets is located in Seattle, Washington. That’s because there’s a VPN server in Seattle that is the other end of your tunnel. (Note that these companies now try to block access from known VPN service addresses, so this technique doesn’t always work.)

As you might guess, the other great use for a VPN is for privacy. You may buy your Internet service from Spectrum or Comcast, but maybe you don’t want them snooping around on what you’re doing.3 Similarly, if you’re in some place with free, open Wi-Fi, you don’t want all the people around you being able to see the packets you’re sending and receiving. Oh, yes…they can do that. It’s wireless. You’re broadcasting your data indiscriminately to everyone within a few dozen feet. Now, if your connections are encrypted (HTTPS instead of HTTP), then the traffic to and from those specific sites can’t be spied upon. As of May 2020, almost 70 percent of the top one million websites use encrypted connections by default.4 That number goes up to 87 percent for the top 100,000 sites. While industry and government initiatives have made it much easier to adopt HTTPS, we’ve still got a way to go. So, if you’re using public Wi-Fi hotspots often, you should seriously consider signing up for a VPN service.

Summary

  • We reviewed the key parts of a home network and defined some common networking terms like modem, router, Wi-Fi, LAN, WAN, WLAN, and VPN.

  • We discussed important aspects of networks that provide security like firewalls and Network Address Translation (NAT).

  • The Internet of Things (IoT) promises some amazing advances in connecting all of our electronic devices, but many of them are severely lacking in cybersecurity. This is already leading to threats from vast botnets and providing beachheads for cybercrime in otherwise well-protected networks.

  • We explain how virtual private networks are becoming more important for everyday Internet users, providing security and privacy, as well as access to some region-restricted services like Netflix.

Checklist

One quick note before we start the checklist. If you have trouble with your home network or if you change some settings and all of a sudden you can’t connect to anything on the Internet, you might want to reset your equipment. The proper way to reset your equipment is as follows:
  1. 1.

    Turn your equipment off including your modem, your router, and any other hardware devices like network switches, set-top boxes used for streaming music and movies, Internet telephony equipment (like Vonage or Ooma), and so on. (Computers and smartphones can probably be left on; they will usually sort themselves out on their own.) You can turn off these devices by unplugging them from the wall, or sometimes you can unplug the power cord from the back of the device itself. Give this about 30 seconds.

     
  2. 2.

    Turn the equipment back on starting at the point furthest “upstream.” In most cases, that will be your modem (the device you got from your ISP). Wait for your modem to come up completely. This usually means there are three to four solid lights and one rapidly flashing light.

     
  3. 3.

    Follow the chain downstream. The next device is probably your router (which is probably a Wi-Fi router). Power it back up and give it time to come up fully.

     
  4. 4.

    At this point, the next level downstream is probably the devices on your network. Turn them all back on.

     
  5. 5.

    If your computer or smartphone still can’t connect, you might try restarting them, as well.

     

Many of the configuration items in this checklist require you to log in to your router. Unfortunately, every router is different—even routers from the same maker can have different configuration screens. There’s really no way I can cover them all in this book, so you’re going to probably have to do some searching around. Your best source is the manual that came with your router. If you can’t find your manual, search the Web for it. Type in your router’s make and model plus the word manual—that will usually find it. You can usually find your router’s model info on a sticker on the router itself.

While you can use special software “wizards” to configure your router, you should also be able to access a special administration web page on your router that has the full configuration. In most home routers, there is a special IP address assigned to your router for this purpose. Once you get to this web page, you’ll usually be asked to log in using the default administrator credentials. Again, this will be in your router’s manual.

If you can’t find the manual, you try Table 6-1 for some common router info. If these fail, see the websites after the table. (In the table, [blank] means enter nothing.)
Table 6-1

Common Router IP Addresses and Admin Credentials

Router Make

Admin IP Address

Default Admin ID/Password

Linksys

192.168.1.1

admin/admin

Belkin

192.168.2.1

admin/[blank], admin/admin, admin/password

Netgear

192.168.0.1, 10.0.0.1

admin/password

D-Link

192.168.0.1

admin/[blank], admin/admin

Asus

192.168.1.1

admin/admin

For a longer list of router default IP addresses, try this:
For more default passwords, try this:

Once you find this admin web page, spend some time looking around. Most of these special admin web pages will have helpful information right there to tell you what all the settings are for. Don’t let it overwhelm you, though—we will be tweaking only a few of these options.

Note

Whenever you change administrative settings on your router, be sure to “save” and “apply” those changes. That is, sometimes you can change a setting, but nothing will actually happen until you save and apply the changes. Some changes may require your router to restart, which is fine—but you will lose Internet service for maybe a minute or two while the router comes back online.

Without further ado, here’s the checklist for this chapter.

Tip 6-1. Get Your Own Modem

Internet service providers will usually install their own modem for you to use, and that modem is often a combination modem and Wi-Fi router. They will also likely charge you a monthly fee to rent this modem, anywhere from $5 to $14 per month—which adds up quickly. However, in many cases, you can buy your own modem for as little as $70 to $90—it’s often the same make and model that the ISP gives you.

Note that ISPs don’t like this and sometimes will find ways to make this difficult. Be sure to check with them first to make sure they’ll let you hook up your own modem without any weird service charges or fees. You should also ask them which makes and models they support.

Modems use different types of communication protocols, and those protocol standards have versions. Generally speaking, the newer the version (i.e., the larger the number), the faster the connection speed. For example, cable modems use the DOCSIS standard. For most people, DOCSIS 3.1 will be good.

Tip 6-2. Get Your Own Wi-Fi Router

If you haven’t done this already, you should buy your own home router. Even if the modem given to you by your Internet service provider has a built-in Wi-Fi router, for privacy and security reasons, you should buy your own.
  • There are many good brands to choose from. I would go with a popular brand like Linksys, Netgear, Belkin, D-Link, or Asus.

  • Wi-Fi routers are pretty easy to set up these days. However, you should avoid using Wireless Protected Setup (WPS) . While this technique is convenient, it’s also fraught with security bugs. Just use the “old-school” method of setting a password on the router and entering this password on the Wi-Fi devices that you want to connect to the network.

Tip 6-3. Lock Down Your Wi-Fi

Always set a password for accessing your Wi-Fi network. (Your router admin page might call it a key, a shared key, or passphrase.) This password should be fairly strong, but it doesn’t have to be crazy. People still need to be within Wi-Fi range to try to hack it, so that limits the number of attackers. I would say use a short phrase that’s easy to say and remember, maybe 12 to 15 characters long.

You can make it easier for your guests to connect to your Wi-Fi network by creating a handy QR code. This QR code embeds your Wi-Fi name (SSID) and the password into a little scannable image. Use the following website to generate your code, then print this, and post it on your fridge or wherever. The website also has instructions for how to use the QR code with different devices:

https://qifi.org

Tip 6-4. Use WPA2 or WPA3

Use Wireless Protected Access (WPA) version 2 or 3 for your Wi-Fi encryption. This will be selectable on your Wi-Fi router’s admin web page, usually as “WPA2-Personal” or “WPA3-Personal”. WPA (version 1) is okay, but WPA2 is better, and WPA3 is much better (but not widely supported yet).

If your router still has WEP (Wireless Encryption Protection) as a security option, absolutely avoid it—it’s very old and trivial to hack. It’s probably time for a new router.

Tip 6-5. Set a Strong Password for Your Router Admin Page

Your router will probably come with a default user ID and password to configure the router itself through the admin web page (usually something of the form 192.168.x.x). (Note that this ID and password is totally different from the Wi-Fi network password from the earlier tip!) You should change this password as soon as possible. Malware will often try to log into your router using these well-known default passwords, and if they get in, they can get up to all sorts of nasty business. You want to lock them out by changing the password to something the bad guys can’t guess.

Generate a password using LastPass and save it there. Since it’s a web page, LastPass should fill it in for you, so it can be a truly strong random password. Don’t be afraid to write this password down—you can even tape it to your router, if you want. The bad guys won’t be in your house; they’ll be trying to guess this password from some remote location.

Default passwords are so bad that California passed a law (SB-327) in late 2018 that bans this practice for all connected devices, which includes Wi-Fi routers. It wouldn’t make sense for router manufacturers to sell something different in California from the rest of the world, so we should all benefit from this regulation. The law went into effect in January 2020, so if you bought a router recently, you may already have a good, unique admin password. Just store this in LastPass. (Of course, you can still change this password, if you want.)

Tip 6-6. Change Your Default SSID

Your router will come with some default network name that it broadcasts. When you whip out your smart device and look at the available Wi-Fi networks, the names you see listed there are the service set identifiers (SSIDs) of all the Wi-Fi routers near you. Having a default name can be confusing, especially if your neighbors have similar names. I would change your SSID to be something more unique but also not easy to associate with you or your home (like your name or street address).

If you really want to get paranoid, you can prevent your router from broadcasting the name at all. This might be some helpful security through obscurity if there are a lot of people near you, like in an apartment complex. Basically, you tell your router not to broadcast your network name SSID so that when people nearby scan for available networks, they won’t see anything. To join your network, you will have to manually set up a connection by specifying the network name (SSID). (This is another great use for the QR code mentioned in Tip 6-3.)

Tip 6-7. Disable External Admin

Some routers allow you to log into their admin pages from outside your network—that is, from the public Internet or WAN. This is almost never necessary and extremely risky. If you find this feature on your router, make sure it’s disabled.

Tip 6-8. Disable External Services

Some routers also have services like Universal Plug and Play (UPnP) and telnet enabled on the outside of your network, the WAN side. Again, this is almost never needed and just gives hackers another place to prod for weaknesses. If you have any of these services enabled on the WAN side, be sure to disable them. (See the next tip for how to test your system.)

Tip 6-9. Use ShieldsUp to Check for Vulnerabilities

One of my favorite security guys, Steve Gibson, has a website that will help you check to see whether your router or modem has any obvious weaknesses. It’s a service called ShieldsUp (in reference to the Star Trek starship Enterprise). You might wonder if this is really necessary, but you need to realize that there are automated hacking systems on the Internet right now that are already doing these exact same port scans, continuously, looking for vulnerable systems. So your system has already been scanned, just not by you. You may as well find out what they found out.
  1. 1.

    Go to this website: https://www.grc.com/shieldsup.

     
  2. 2.

    Read the little blurb in the box and then click Proceed.

     
  3. 3.

    The next few pages are a little hard to follow. First click the big yellow Instant UPnP Exposure Test button. This should verify that you’ve disabled external UPnP access (see Tip 6-8).

     
  4. 4.

    Return to the previous page. In the following funny table, click the silver “Common ports” button, or if you want to go full tilt, click the All Service Ports button. It will scan your system to see whether any of these ports are accepting requests from outside, which they shouldn’t be.

     

The ideal status here is “stealth” (green), meaning that your router completely ignored the request. The next best status is “closed” (purple), meaning that your router replied but denied the connection. If any of your ports are listed as “open”, then you need to go back to your Wi-Fi router’s admin page and find the setting for the listed service and disable it on the external (WAN) side. You can run the ShieldsUp test again to see if you succeeded.

Note that many ISPs will block these sorts of requests, too, trying to increase your security. So this test is actually testing both your ISP’s blocking and your router’s external port settings.

Tip 6-10. Enable and Use the Guest Network

If your router supports a guest Wi-Fi network, you should enable that. This allows people who visit your house to have access to the Internet, but not to your regular home network. You might think: but I trust these people! But you never know what devices people are bringing into your home or where they’ve been.

Be sure to set a password for the guest network, as well. You can put this password on your fridge or something so your guests can easily see it and copy it to their smartphone or whatever (or use the QR code method from Tip 6-3).

Tip 6-11. Put “Internet of Things” Devices on the Guest Net

If you have smart devices in your home like thermostats, refrigerators, smart TVs, Wi-Fi digital picture frames, light bulbs, video doorbells, toasters, whatever… put them on your guest Wi-Fi network, not your regular Wi-Fi network. If these devices only need to talk to the Internet or to each other, then there’s no reason to give them access to anything else within your home.

Note, however, that if you’re not using the “smart” features, then don’t bother connecting the device to the network at all—keep the devices “dumb”. For example, if you’re only using your TV for regular TV functions (and not for streaming services like Netflix), then there’s no need to connect it to the Internet. Either don’t configure the Wi-Fi settings or disable them. (If your device is connected using an Ethernet cable, just disconnect the cable.)

Tip 6-12. Register Your Devices

We all hate junk mail—electronic or otherwise. And we all know that when you register the products you purchase and give them your address, you can expect to increase your level of spam. However, for any product you have that connects to the Internet—including smart devices like TVs, thermostats, light bulbs, webcams, and also your Wi-Fi router—you want to make sure the manufacturer can contact you about potential security issues and remedies. For this reason, you should suck it up and register these devices online if you haven’t already. Some of these devices will require manual software updates to fix security bugs; others may require outright replacement. But if you don’t know about the bugs, they will just sit there, waiting to be hacked.

When you register online (using your make and model number or perhaps the serial number), you should get a confirmation email of some sort. Make sure that it didn’t go to your junk mail or spam folder. If you see it there, you can usually mark is as “not junk”, which should tell your email service to not hide emails from this source in the future. If you want to be doubly sure, you can add the “from” email address to your email’s contact list.

Tip 6-13. Update Your Router’s Firmware

Your Wi-Fi router, in particular, is important to keep up to date. Using Table 6-1, you should log into your router’s admin interface and find the tab/page that lists the current version of the software installed (on appliances like this, the software is sometimes referred to as firmware). If you’re lucky, this page will have a link or button to check for updates and install them if found. If not, you will need to go to your device’s manufacturer website to see whether you’re up to date. In either case, you may be asked to download a file and then upload it to your router for installation.

If you’ve registered your router with the manufacturer, you should be notified of important software updates via email.

Tip 6-14. Disable Auto-Connect to Wi-Fi

Many laptops, tablets, and smartphones will automatically connect to public, open Wi-Fi when available (i.e., Wi-Fi service that doesn’t require a password to connect). Some will also automatically reconnect to Wi-Fi networks that you’ve been on before. Both of these are bad. You should tell your devices to always ask you before connecting to any Wi-Fi network, except for truly trusted networks (like your home network). If you’ve given your home Wi-Fi a unique name, then you can automatically connect to this network. But in general, you should always be notified first. Bad guys will often create fake networks with common names like “Linksys” or “Starbucks” or “Free Wi-Fi” in an effort to attack or spy on devices that auto-connect.

If you use a VPN service that automatically enables for untrusted networks, this can protect you in situations like this, too.

Tip 6-15. Turn Off Your ISP’s Wi-Fi

If your ISP’s modem comes with Wi-Fi built in, call your ISP and ask them to disable it. Assuming you have your own Wi-Fi router (explained earlier), you have no need for the ISP’s Wi-Fi, and there’s no reason to leave it on—it’s just another way someone can try to get into your home network.

If Comcast/Xfinity is your ISP, call Comcast and tell them you want to opt out of the Xfinity Wi-Fi service (1-800-XFINITY). You can supposedly disable this yourself, if you want to try.
  1. 1.

    Visit My Account at https://customer.xfinity.com.

     
  2. 2.

    From the Services tab, under Internet, click Manage Internet.

     
  3. 3.

    Scroll down to Xfinity Wi-Fi Hotspot Connected Devices.

     
  4. 4.

    Click Manage Devices, and then click Remove on your device.

     

Tip 6-16. Use a VPN

As we discussed in the chapter, if you commonly use Wi-Fi hotspots in airports, restaurants, cafes, and so on, you should seriously consider signing up for a VPN service. Sometimes your device or laptop will automatically connect to these networks, and quite often you will have smartphone apps or background computer apps that automatically send and receive information whenever they’re connected. While these connections should be encrypted, they may not be—and you’ll never know.

Also, VPNs can be handy for international travelers who want to access services that are restricted to their home region (like Netflix)—though most of the big-name services have gotten wise to this and just block all connections coming from known VPN service provider IP addresses.

However, you also need to realize that your Internet service provider—not only your home ISP but your mobile service provider, as well—can see everyplace you go on the Internet. Due to a complete lack of data privacy regulations in the United States, your ISP can and does record and sell this information. Even if the connections themselves are encrypted, they still know every time you go to any website—when you go, how long you stay, how many times you go, and so on. Using a privacy-respecting VPN service will blind them to your web surfing habits. (If you’d rather not use a VPN on all your devices all the time, I’ll tell you another way to plug this privacy hole in the next chapter.)

Even though VPN contains the word “private”, the question is “private from whom?” Basically, when you use a VPN service, you are exchanging your trust in ISP for trust in the VPN service provider—because now it’s the VPN service that has access to all your web surfing habits. For this reason, I would avoid any “free” VPN services—they have to make money somehow, and your data is worth quite a bit. If you’re going to use a VPN, it’s usually safest to pay for it.

VPN services are notoriously hard to objectively evaluate in terms of user privacy. While they all have stated privacy policies, those policies are usually hard to understand and impossible for you to verify. However, some services are more adamant about their commitment to your privacy and have in some cases paid for independent third-party audits to verify their privacy claims. I wouldn’t hesitate to recommend any of the following services (and I’ve used most of them myself):
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.149.240.185