© Carey Parker 2018
Carey ParkerFirewalls Don't Stop Dragonshttps://doi.org/10.1007/978-1-4842-3852-3_6

6. LAN Sweet LAN

Carey Parker1 
(1)
North Carolina, USA
 

In this chapter, we’re going to discuss your home network. Even if you have only one computer connected to the Internet, you still technically have a network. A network is something that allows two or more devices to communicate and share resources. The Internet is the most famous network; it’s the network that connects us to computers and services all over the globe. But most of us also have an intranet within our homes, and how we allow our personal network to communicate with the public network is crucial to our security and privacy.

Network Overview

Let’s start by identifying the parts of your home network—called a local area network (LAN) . For your computer to connect to the Internet (referred to as a wide area network [WAN]) , you first need to have Internet service—often called broadband or high-speed Internet service. For most people, this is provided by their cable or phone company.1 In rural areas, you might get your Internet service from a satellite company. In many metropolitan areas, you can get Internet service over fiber-optic cable. But regardless of the specific way in which you connect to the Internet, the company that provides you with this service is called your Internet service provider (ISP) . Somewhere in your house you will have a box that this company provided to you that allows you to connect your computer. This box is usually called a modem (which is short for “modulator-demodulator”). A typical modem looks something like Figure 6-1.
../images/466102_3_En_6_Chapter/466102_3_En_6_Fig1_HTML.jpg
Figure 6-1

Cable modem

The modem converts the common Internet Protocol (that your computer understands) to some sort of special protocol that allows the communication to flow over the phone lines, cable line, fiber-optic cable, or satellite link. This device is assigned an Internet Protocol (IP) address, and like the address on your house, it’s associated specifically with you (or your account). When your computer talks to the Internet, the return address on all its packets is your IP address.

In the simplest case, you just connect your computer directly to this modem and you’re done. That’s your entire network. But many of us today have more than one device in our homes that wants to access the Internet, and in that case you need another piece of equipment called a router . Your ISP gives you only one IP address. If you have multiple devices, then you need some way to give those devices their own addresses—at least within your home—so that each one of those devices can carry on their own conversations with other things on the Internet. (We discussed how this works in previous chapters.)

It’s important to note that if you have multiple devices on your home network, they often talk to each other, as well. That is, they send information between themselves that’s not meant to leave your house. Maybe you’re streaming some music from your computer to your home theater system or printing a document from your laptop to a network printer. In this case, all the info is completely within your network. It’s like someone in marketing sending a package to the sales department via internal company mail. The U.S. Postal Service never sees or knows about this; it’s completely internal and private. We’ll see why this is important in the next section.

Most routers today are wireless routers . This is a little box that often has one or more little antennas on it and is directly connected to your modem via a cable called an Ethernet cable . It will look something like Figure 6-2.
../images/466102_3_En_6_Chapter/466102_3_En_6_Fig2_HTML.jpg
Figure 6-2

A sample Wi-Fi router

Ethernet cables are like phone cables—they usually have little clippy things on the end that snap into place. Ethernet cables are the most common cords that are used to connect things to a network directly. The router box is then connected to all the other devices in your house that need to access the Internet—either hardwired with an Ethernet cable or connected virtually over the air, wirelessly. The wireless connection is called Wi-Fi or sometimes by its technical spec name, 802.11. Networks created by Wi-Fi routers are commonly referred to as wireless LANs (WLANs). (I know... couldn’t they come up with something a little less confusing? LAN, WAN, WLAN—really? Don’t shoot the messenger, folks.) There are many versions of Wi-Fi—over the years they improved things and gave the spec different names like 802.11b, 802.11n, and 802.11ac. But all you really need to know is that the router acts like an internal, private mail room—the router allows all the devices in your house to have private addresses inside your home to talk with each other and to share a single public Internet address for communications with the outside world. Many businesses (hotels, cafes, restaurants, airports, libraries) often provide free Wi-Fi Internet access for customers. These locations are referred to as Wi-Fi hotspots .

That’s pretty much your home network in a nutshell. You have a modem, a router, and a bunch of devices that are connected to that router (either wired or wirelessly). Those devices include desktop computers, laptops, smartphones, printers, and tablets. We’re now also seeing other “smart” devices connecting, as well: TVs, streaming boxes (like Apple TV, Fire TV, or Roku), DVRs, home appliances, thermostats, and even light bulbs.

Now that we know the pieces to the home network puzzle, let’s take a look at the security and privacy issues associated with your home network and how to deal with them.

Modem

The modem provided to you by your Internet service provider is generally something you cannot control, and that makes a security- and privacy-conscious person nervous. Many ISPs are now providing a combo product: a modem and Wi-Fi router all in one—how convenient! That’s even worse. Why? Because what’s best for your ISP is not the same as what’s best for you.2 Your network router is doing two crucial things: it’s a wall between your network and the rest of the wild, woolly Internet, and it’s the hub for all the data traffic within your home network. There’s just no reason to trust your ISP to perform those critical functions. While ISPs will usually try to protect your home network from bad actors on the Internet, they have no reason whatsoever to protect your privacy or to insulate you from their own meddling. Furthermore, you want to have full control over the configuration of your Wi-Fi router, and your ISP may not give you that access. For these reasons alone, I strongly suggest you always insert your own router between your computer and your ISP’s modem. Basic models are pretty cheap, and this book can help you get it set up.

Here’s an interesting story that will help to illustrate my point. A few years ago, Comcast (the largest ISP in the United States) began rolling out a service for its customers called Xfinity Wi-Fi. This service allows Comcast customers to use “millions” of free Wi-Fi hotspots around the world. Sounds great, right? What’s not to like? Well, the company accomplished this by turning people’s private cable boxes into public hotspots—that is, Comcast enabled this feature on your home combo modem/Wi-Fi box so that its customers near (or in) your home could connect to the Internet using your equipment. While I’m sure Comcast customers somehow implicitly gave Comcast permission to do this somewhere in their licensing agreement, I’m willing to bet most people had no idea they were doing this. Your modem is, after all, Comcast’s equipment—not yours. It provides you with a service, and that contract surely allows Comcast to offer other services using its equipment.

When this became widely understood, people rightly had serious questions about this service. Won’t this slow down my Internet connection (having to share it with others)? Will this give strangers access to my home network? What if someone uses my Internet connection to do illegal things—won’t that appear as if I did those things? Comcast has some partial answers for these concerns, and there does exist a way to opt out of this program by changing your account preferences online. But the real question is: do you trust your ISP to do what’s best for you (as opposed to what’s best for them)? If Comcast changes its strategy or decides to offer another feature like this in the future, how likely are you to be properly informed of this? And will you be given the choice to opt out? (Two customers in San Francisco filed a class action lawsuit against Comcast over this, but it was thrown out because all Comcast customers agreed to settle disputes via arbitration in their terms of service.)

The simplest solution to this is to just use your own router. If your ISP provided you with a combo modem and Wi-Fi router, I would call them up and ask them to disable the Wi-Fi service entirely. If you’re a Comcast customer, I would also opt out of the Xfinity public/shared Wi-Fi program, if possible.

Since your modem is usually provided to you by your ISP , there’s usually not much else you can do here. However, sometimes you can get your own modem—see the tips at the end of this chapter.

Wi-Fi Router

Your Wi-Fi router is arguably the most important part of your network in terms of your overall Internet security. It’s also probably the most complicated one because it performs a wide variety of important functions. Understanding how to properly configure a Wi-Fi router is not easy, but that’s why you bought this book! I’ll walk you through the primary settings you need to worry about and show you how to configure them properly. Before we get to the specifics, let’s discuss the key functions of your Wi-Fi router.

As I mentioned in earlier sections, one of the primary functions of your router is to serve as a barrier between your private, home network and the wider, public Internet. Regardless of how many devices you have inside your house, the external world sees all your packets as coming from a single address—your public IP address. Your router takes care of delivering all inbound traffic to the proper device inside your home. This function is called Network Address Translation (NAT) , and we discussed it earlier. However, your router does a lot more than that. Let’s break it down.

The primary function of a router is to act as a boundary between your private home network and the public Internet. Again, it’s like an internal mail service within your house, allowing all the devices on your network to talk to each other and, when necessary, establishing connections between your internal devices and external, public servers and services. In fact, your router is actually in charge of assigning mailing addresses (that is, IP addresses) for all the devices in your network. It does this using Dynamic Host Control Protocol (DHCP) . When you plug a device into the network or allow a new device to connect wirelessly, that device needs to have an IP address to communicate with anything else on the network—and your router is in charge of handing out those addresses.

As we’ve discussed, most routers come with a built-in firewall function that specifically prevents external entities from prying into your private home network, unless you explicitly allow it or something inside your home initiates the conversation. Routers also act as a sort of traffic cop, directing traffic in the network. The router can allow some traffic to have a higher priority than others—for example, allowing live video streams to flow freely while sending Google queries to the back of the line. Packets of audio and video information are very time-sensitive—if those packets are delayed or lost, you will have glitches in your music or your streaming movies. However, things like querying Google for local restaurants or checking your e-mail can wait a bit, if necessary (and by “a bit” I’m talking fractions of a second). This is referred to as quality of service (QoS) ; some network packets are more “important” than others. Some routers will automatically detect important traffic and prioritize it, while others need to be configured for this feature. The quality of service flag on these packets is not required to be honored, it’s more of a suggestion—but it’s a mechanism that can be used to improve the performance of time-sensitive network traffic.

Wi-Fi routers allow you to connect to your home network wirelessly. This feature, while extremely handy, brings with it a lot of security issues. Instead of having to physically plug an Ethernet cable into your router to get onto your network, you can now connect your laptop or other smart device through the ether simply by changing a setting. Instead of having to be physically inside your house, with Wi-Fi you only have to be near your house—like next door or parked outside on the street. To protect your network, Wi-Fi has some security options that will restrict access to your network. These include adding encryption, authentication, and even some good ol’ security by obscurity. However, there are also a lot of add-on features for convenience that have exposed some weaknesses. All of these will be discussed at length in the checklist at the end of this chapter.

The Internet of Things

The Internet of Things (IoT) refers to the current tech trend of making all of our dumb devices smart—that is, connecting them to the Internet (which I’m not sure necessarily makes anything or anyone “smart”). What good is your refrigerator if you can’t query its contents from the office before you come home? Who wants a dumb thermostat that you can’t change from halfway around the globe? Who needs a Bluetooth speaker that won’t respond when you ask it for today’s weather? We’re already spoiled by our smart devices, and this whole trend is just getting started.

The problem with adding smarts to cheap devices like light bulbs, baby monitors, thermostats, and appliances is that it adds cost—in some cases, significant cost (compared to the equivalent “dumb” version). People pay for features they can see and experience—and they tend not to pay for other stuff, like security. Security in particular can cost a lot of time and money to develop and build into your products, especially if you’re going to do it right. And so many companies don’t do it right or at all. We like to say that the S in IoT is for security…meaning there is none. So, as we’re bringing all these wonderful, connected devices into our homes, we also need to be very cognizant of the risks involved.

What does that mean, exactly? There are two primary reasons that bad guys might want to target your weak IoT devices: to establish a beachhead inside your LAN to get at other devices or to conscript your devices to serve in a zombie computer army (I’m not kidding). Let’s take these one at a time.

If a hacker wanted to try to spy on you or score some personal data, they need to get onto your home network, meaning they need to get past your router’s firewall. The best way to do that is to have an “man on the inside,” and usually the easiest target is a vulnerable IoT device. Each of these devices contains a tiny computer. If the hacker can take over that computer with malware by exploiting the weak security, it can now roam around your home network at will. Maybe they’ll try to infect other devices, including your computers. They could turn on microphones or cameras to spy on you or root around your files for sensitive information. While you might wonder why anyone would target you for this, you have to realize that many of these hacking programs are automated. It’s like robotic burglars roaming around neighborhoods looking for unlocked doors and windows and taking stuff that looks valuable.

But once they’ve compromised your devices, the more likely scenario is to use these devices to do nefarious things. We call these groups of hacked computers and devices a botnet . They listen for instructions from remote command-and-control computers and do their bidding. This may be attacking other, higher-value computers or simply mining Bitcoin to make their masters some money. But once conscripted into this zombie army, they can be called upon to do anything at any time.

This might sound silly, but it’s a real problem, and it’s already being exploited. Remember the Target credit card breach in 2014? Hackers got into Target’s payment system by first hacking the heating and air conditioning system. The system was on the same network as the credit card database. In another story, the CEO of cybersecurity company Darktrace revealed that a casino’s high-roller data was exfiltrated by first compromising a smart aquarium thermostat in the casino’s lobby.

Botnets are even more serious. When done well, a thousand compromised devices can bring down an entire web site. The Mirai botnet was responsible for crippling Internet service of much of the United States and parts of Europe in 2016 by taking down the DynDNS service.

The Internet of Things has a lot of promise, and at this point its spread is pretty much unstoppable. But device manufacturers have to step up their game, and governments need to start requiring these devices to meet minimum security and privacy standards, including the ability to be remotely and automatically upgraded to fix bugs as they’re found.

Virtual Private Network

Another important tool in the network security arsenal is the virtual private network (VPN). If you’ve heard this term before, it’s probably because you’ve worked at a large company. The most common use of a VPN is to allow traveling or telecommuting workers to access the big corporate network no matter where they are, as if they were located at the main office. That is, it allows remote workers to access e-mail, files, and internal web sites (resources that are normally blocked to all outside access) as if they were in the main office, plugged into a local network port or connected to the in-building Wi-Fi. The VPN extends the private corporate network (or LAN) outside the boundaries of the company. This creates a virtual private network—it’s not hardwired, but it acts as if it is. It allows someone connected to the public Internet, from any location, to appear as if they are connected to the private, internal corporate network. Furthermore, this connection is completely hidden from the other people on the public Internet, even though the packets of information are flowing freely between the mobile computer and the corporate network back at headquarters.

It’s sort of like having a private, opaque pipeline from your computer to the office. In fact, VPN connections are often referred to as tunnels for this reason. Let’s say you were locked in your castle, with an invading army at your gates laying siege to your stronghold. You would like to be able to send communications to your allies on the outside, perhaps send for help. You can’t just send a messenger out the front gate, can you? But what if you had a secret tunnel under the castle wall that ran two miles to a neighboring keep? Then you could send messengers out and even allow messengers to come in, and the army surrounding would have no idea it was happening. Actually, even if they knew it was happening, there’s nothing they could really do, unless they could somehow figure out where the tunnel was buried. If the tunnel was wide enough, your people could come and go as they pleased. That’s sort of the analogy for a corporate VLAN (virtual LAN).

But VPNs have other very interesting uses outside the corporate world, and they’re starting to become more popular with regular, everyday Internet users. Let’s look at our analogy again. A VPN is like setting up a tunnel between you and another network. This tunnel is essentially 100 percent impregnable and opaque to outside viewers. They may know it’s there, but even if they do, they don’t know where it goes. For the purposes of this analogy, it’s really almost like a magic portal: when you step through it, you are instantly transported to another place. How might we use such a thing?

Well, let’s say you’re traveling internationally for some reason—business or pleasure, it doesn’t matter. But you want to be able to access stuff on your home computer, maybe music or movies or files. You can create a VPN tunnel that will connect your laptop or tablet through the public Internet, halfway around the globe, back to your home network—as if you were sitting in your living room. (Okay, there is going to be some delay if you’re really far away, but you will still have full access to your stuff.)

But what if you want to access some of your favorite web services while you’re traveling, like Netflix or Pandora or Spotify? All three of those services are restricted; they usually work only if you’re accessing them from within your home country or region. With a VPN service, you can create a tunnel or portal from wherever you are back to your home country and appear to these services as if you’re inside the country. All of your network traffic goes through this tunnel and comes out wherever you choose (most VPN services offer you multiple “exit point” locales). For example, you might be in Italy for the summer, but as far as Netflix can tell, you’re really in Seattle, Washington, because the return IP address on all your network packets is located in Seattle, Washington. That’s because there’s a VPN server in that area that is the other end of your tunnel. (Note that these companies have begun blocking access from known VPN service addresses, so this technique doesn’t always work.)

As you might guess, the other great use for a VPN is for privacy. You may buy your Internet service from Spectrum or Comcast, but maybe you don’t want them snooping around on what you’re doing.3 Better yet, if you’re in some place with free, open Wi-Fi, you don’t want all the people around you being able to sniff the packets you’re sending and receiving. Oh, yes…they can do that. It’s wireless. You’re broadcasting your data indiscriminately to everyone within a few dozen feet. Now, if your connections are encrypted (HTTPS instead of HTTP), then the traffic to and from those specific sites can’t be sniffed in the open air... but not all web sites use encryption, though in the last year it’s gotten a lot better. As of 2014, according to SSL Pulse,4 only about 24 percent of the most popular web sites use HTTPS. Now they estimate that nearly 65 percent of today’s web sites have adequate HTTPS support. Industry and government initiatives have made it much easier to adopt HTTPS, but we’ve still got a way to go. So, if you’re using public Wi-Fi hotspots often, you should seriously consider signing up for a VPN service.

Summary

  • We reviewed the key parts of a home network and defined some common networking terms like modem, router, Wi-Fi, LAN, WAN, WLAN, and VPN.

  • We discussed important aspects of networks that provide security like firewalls and Network Address Translation (NAT).

  • The Internet of Things (IoT) promises some amazing advances in connecting all of our electronic devices, but many of them are severely lacking in cybersecurity. This is already leading to threats from vast botnets and providing beachheads for cybercrime in otherwise well-protected networks.

  • We explain how virtual private networks are becoming more important for home users, providing security and privacy, as well as access to some region-restricted services like Netflix.

Checklist

One quick note before we start the checklist. If you have trouble with your home network or if you change some settings and all of a sudden you can’t connect to anything on the Internet, you might want to reset your equipment. The proper way to reset your equipment is as follows:
  1. 1.

    Turn your equipment off including your modem, your router, and any other hardware devices like network switches, set-top boxes used for streaming music and movies, Internet telephony equipment (like Vonage or Ooma), etc. (Computers and smartphones can probably be left on; they will usually sort themselves out on their own.) You can turn off these devices by unplugging them from the wall, or sometimes you can unplug the power cord from the back of the device itself. Give this about 30 seconds.

     
  2. 2.

    Turn the equipment back on starting at the point furthest “upstream.” In most cases, that will be your modem (the device you got from your ISP). Wait for your modem to come up completely. This usually means there are three to four solid lights and one rapidly flashing light.

     
  3. 3.

    Follow the chain downstream. The next device is probably your router (which is probably a Wi-Fi router). Power it back up and give it a few seconds to get itself up and running.

     
  4. 4.

    At this point, the next level downstream is probably the devices on your network. Turn them all back on.

     
  5. 5.

    If your computer or smartphone still can’t connect, you might try restarting them, as well.

     

Many of the configuration items in this checklist require you to log in to your router. Unfortunately, every router is different—even routers from the same maker can have different configuration screens. There’s really no way I can cover them all in this book, so you’re going to probably have to do some searching around. Your best source is the manual that came with your router. If you can’t find your manual, search the Web for it. Type in your router’s make and model plus the word manual—that will usually find it. You can find your router’s model info on a sticker on the router.

While you can use special software “wizards” to configure your router, you should also be able to access a web page on your router that has the full configuration. In most home routers, there is a special IP address assigned to your router for this purpose. Once you get to this web page, you’ll usually be asked to log in using the default administrator credentials. Again, this will be in your router’s manual.

If you can’t find the manual, you try Table 6-1 for some common router info. If these fail, see the web sites after the table. (In the table, [blank] means enter nothing.)
Table 6-1

Common Router IP Addresses and Admin Credentials

Router Make

Admin IP Address

Default Admin ID/Password

Linksys

192.168.1.1

admin/admin

Belkin

192.168.2.1

admin/[blank], admin/Admin, admin/password

Netgear

192.168.0.1, 10.0.0.1

admin/password

D-Link

192.168.0.1

admin/[blank], admin/admin

Asus

192.168.1.1

admin/admin

For a longer list of router default IP addresses, try this:
For more default passwords, try this:

Once you find this admin web page, spend some time looking around. Most of these special admin web pages will have helpful information right there to tell you what all the settings are for. Don’t let it overwhelm you, though—we will be tweaking only a few of these options.

Note

Whenever you change administrative settings on your router, be sure to “save” and “apply” those changes. That is, sometimes you can change a setting, but nothing will actually happen until you save and apply the changes. Some changes may require your router to restart, which is fine—but you will lose Internet service for maybe a minute or two while the router comes back online.

Without further ado, here’s the checklist for this chapter.

Tip 6-1. Get Your Own Modem

Internet service providers will usually install their own modem for you to use, and that modem is often a combination modem and Wi-Fi router. They will also likely charge you a monthly fee to rent this modem for $10 a month, which can be expensive over time. However, in many cases, you can buy your own modem for as little as $70 to $90—it’s often the same make and model that the ISP gives you.

Note that ISPs don’t like this and sometimes will find ways to make this difficult. Be sure to check with them first to make sure they’ll let you hook up your own router without any weird service charges or fees. You should also ask them which makes and models they support.

Tip 6-2. Get Your Own Router

If you haven’t done this already, you should buy your own home router. Even if the modem given to you by your Internet service provider has a built-in Wi-Fi router, for privacy and security reasons, you should not use it. Even if you have only one computer, you should insert your own router between it and your modem.
  • There are many good brands to choose from. I would go with something like Linksys, Netgear, Belkin, D-Link, or Asus.

  • I would definitely get a Wi-Fi router—there are just too many cool things out there that require Wi-Fi connections, and your friends and family will appreciate having free, secure Internet access within your home. You can always disable the Wi-Fi part when you don’t need it, if you want to be super paranoid.

  • Wi-Fi routers are pretty easy to set up these days. However, you should avoid using Wireless Protected Setup (WPS). While this technique is convenient, it’s also fraught with security bugs. Just use the “old-school” method of setting a password on the router and entering this password on the Wi-Fi devices that you want to connect to the network.

Tip 6-3. Lock Down Your Wi-Fi

Always set a password for accessing your Wi-Fi network. (Your router admin page might call it a key, a shared key, or passphrase.) This password should be fairly strong, but it doesn’t have to be crazy. People still need to be within Wi-Fi range to try to hack it, so that limits the number of attackers. I would say use a short phrase that’s easy to say and remember, maybe 12 to 15 characters long.

Tip 6-4. Use WPA2 (or WPA3, When Available)

Use Wireless Protected Access version 2 (WPA2) for your Wi-Fi encryption. Absolutely do not use Wired Equivalent Privacy (WEP)—this is old technology that was cracked a long time ago and is not secure. WPA is okay, but WPA2 is better. If there’s an option of WPA Personal or WPA Enterprise, you should use WPA Personal.

The Wi-Fi Alliance announced plans for WPA3 in early 2018, which will replace WPA2 and comes with some much-needed security updates. When this becomes available and is supported by your devices, you should use it.

Tip 6-5. Set a Strong Password for Your Router Admin Page

Your router will come with a default user ID and password to configure the router itself through the admin web page (usually something of the form 192.168.x.x). (Note that this ID and password is totally different from the Wi-Fi network password from the earlier tip!) You should change this password as soon as possible. Malware will often try to log into your router using these well-known default passwords, and if they get in, they can get up to all sorts of nasty business. You want to lock them out by changing the password to something the bad guys can’t guess.

Generate a password using LastPass and save it there. Since it’s a web page, LastPass should fill it in for you, so it can be a truly strong random password. Don’t be afraid to write this password down—you can even tape it to your router, if you want. The bad guys won’t be in your house; they’ll be trying to guess this password from some remote location.

Tip 6-6. Change Your Default SSID

Your router will come with some default network name that it broadcasts. When you whip out your smart device and look at the available Wi-Fi networks, the names you see listed there are the service set identifiers (SSIDs) of all the Wi-Fi routers near you. Having a default name can be confusing, especially if your neighbors have similar names. I would change your SSID to be something more unique but also not easy to associate with you or your home (like your name or street address).

If you really want to get paranoid, you can prevent your router from broadcasting the name at all. This might be some helpful security through obscurity if there are a lot of people near you, like in an apartment complex. Basically, you tell your router not to broadcast your network name SSID so that when people nearby scan for available networks, they won’t see anything. To join your network, you will have to manually set up a connection by specifying the network name (SSID).

Tip 6-7. Disable External Admin

Some routers allow you to log into their admin pages from outside your network—that is, from the public Internet or WAN. This is almost never necessary and extremely risky. If you find this feature on your router, disable it.

Tip 6-8. Disable External Services

Some routers also have services like Universal Plug and Play (uPNP) and telnet enabled on the outside of your network, the WAN side. Again, this is almost never needed and just gives hackers another place to prod for weaknesses. If you have any of these services enabled on the WAN side, be sure to disable them.

Tip 6-9. Enable and Use the Guest Network

If your router supports a guest Wi-Fi network, you should enable that. This allows people who visit your house to have access to the Internet, but not to your regular home network. You might think: but I trust these people! But you never know what devices people are bringing into your home or where they’ve been.

Be sure to set a password for the guest network, as well. You can put this password on your fridge or something so your guests can easily see it and copy it to their smartphone or whatever.

Tip 6-10. Put “Internet of Things” Devices on the Guest Net

If you have smart devices in your home like thermostats, refrigerators, smart TVs, Wi-Fi digital picture frames, light bulbs, toasters, whatever…put them on your guest Wi-Fi network, not your regular Wi-Fi network. If these devices only need to talk to something on the Internet or to each other, then there’s no reason to give them access to anything else within your home.

Note, however, that if you’re not using the “smart” features, then don’t bother connecting the device to the network at all. For example, if you’re only using your TV for regular TV functions, then there’s no need to connect it to the Internet at all.

Tip 6-11. Register Your Devices

We all hate junk mail—electronic or otherwise. And we all know that when you register the products you purchase and give them your address, you can expect to increase your level of spam. However, for any product you have that connects to the Internet—including smart devices like TVs, thermostats, light bulbs, web cams, and also your Wi-Fi router—you want to make sure the manufacturer can contact you about potential security issues and remedies. For this reason, you should suck it up and register these devices online if you haven’t already. Some of these devices will require manual software updates to fix security bugs; others may require outright replacement. But if you don’t know about the bugs, they will just sit there, waiting to be hacked.

When you register online (using your make and model number or perhaps the serial number), you should get a confirmation e-mail of some sort. Make sure that it didn’t go to your junk mail or spam folder. If you see it there, you can usually mark is as “not junk,” which should tell your e-mail service to not hide e-mails from this source in the future. If you want to be doubly sure, you can add the “from” e-mail address to your e-mail’s contact list.

Tip 6-12. Update Your Router’s Firmware

Your Wi-Fi router, in particular, is important to keep up-to-date. Using Table 6-1, you should log into your router’s admin interface and find the tab/page that lists the current version of the software installed (on appliances like this, the software is sometimes referred to as firmware). If you’re lucky, this page will have a link or button to check for updates and install them if found. If not, you will need to go to your device’s manufacturer web site to see whether you’re up-to-date. In either case, you may be asked to download a file and then upload it to your router for installation.

If you’ve registered your router with the manufacturer, you should be notified of important software updates via e-mail.

Tip 6-13. Disable Auto-connect to Wi-Fi

Many laptops, tablets, and smartphones will automatically connect to public Wi-Fi when available. Some will automatically re-connect to Wi-Fi networks that you’ve been on before. Both of these are bad. You should tell your devices to always ask you before connecting to any Wi-Fi network. If you’ve given your home Wi-Fi a unique name, then you can automatically connect to this network. But in general, you should always be notified first. Bad guys will often create fake networks with common names like “Linksys” or “Starbucks” in an effort to attack or spy on devices that auto-connect.

If you use a VPN service that automatically enables for untrusted networks, this can protect you in situations like this, too.

Tip 6-14. Turn Off Your ISP’s Wi-Fi

If your ISP’s modem comes with Wi-Fi built in, call your ISP and ask them to disable it. Assuming you have your own Wi-Fi router (explained earlier), you have no need for the ISP’s Wi-Fi, and there’s no reason to leave it on—it’s just another way someone can try to get into your home network.

If Comcast is your ISP, call Comcast and tell them you want to opt out of the Xfinity Wi-Fi service (1-800-XFINITY). You can supposedly disable this yourself, if you want to try. According to Comcast, do the following:
  1. 1.
     
  2. 2.

    Click Users & Preferences.

     
  3. 3.

    Then select Manage XFINITY Wi-Fi.

     

Tip 6-15. Use ShieldsUp to Check for Vulnerabilities

One of my favorite security guys, Steve Gibson, has a web site that will help you check to see whether your router or modem has any obvious weaknesses. It’s a service called ShieldsUp (in reference to the Star Trek Enterprise).
  1. 1.
     
  2. 2.

    Read the little blurb in the box and then click Proceed.

     
  3. 3.

    The next few pages are a little hard to follow. First click the big yellow Instant UPnP Exposure Test button. This should verify that you’ve disabled external UPnP access (see earlier).

     
  4. 4.

    Then, in the funny table below, click the silver “Common ports” button... or if you want to go full tilt, click the All Service Ports button. It will scan your system to see whether any of these ports are accepting requests from outside, which they shouldn’t be. If your report is anything but green, you should use the web site to dig further. You may have to go back to your router’s admin pages to turn more things off on the WAN side.

     

Tip 6-16. Use a VPN

As we discussed in the chapter, if you commonly use Wi-Fi hotspots in airports, restaurants, cafes, etc., you should seriously consider signing up for a VPN service. Sometimes your device or laptop will automatically connect to these networks, and quite often you will have smartphone apps or background computer apps that automatically send and receive information whenever they’re connected. Also, VPNs can be handy for international travelers who want to access services that are restricted to their home region (like Netflix).

VPN services are hard to evaluate and recommend because they change all the time and different people have different priorities for their secure connections. However, here are a few options that are solid to consider. However, in general, I would avoid services that are primarily free—that is, that don’t have an obvious revenue model. If they show you ads or push “pro” services all the time, I would worry about their trustworthiness. If you’re going to use a VPN, it’s usually safest to pay for it.
  • NordVPN

  • ExpressVPN

  • ProtonVPN

  • TunnelBear

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.220.16.184