Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    TP-Link Easy Smart Switch security question

    Scheduled Pinned Locked Moved Hardware
    185 Posts 44 Posters 78.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      CanYaHearMeNow4
      last edited by

      Yeah, as n3by says, you can't check that box or edit VLAN1 in any way. I even tried to edit the the HTML code surrounding that checkbox with Chrome's Development console to no avail.

      @johnpoz:

      Really.. That is not what I show, I show that the rebate is $30.. So puts the price at 80$  If there was a mistake and you got the switch for $30 sweet for you!!  But I am guessing more same sort of info that didn't get right either ;) Just Sayin…

      It must have been some sort of price mistake and it popped up on a deal site (https://slickdeals.net/f/9686276) for $35. I figured even with this "VLAN flaw" it would still work well as a "dumb" switch for a network contained to a single broadcast domain at that price.

      @n3by:

      in V2 ASIC is RTL8367c… maybe later a custom firmware will be ported.

      I was going to look into this somewhat. Not necessary "custom" firmware, but I had hopes that there may be a way to port the Netgear firmware over (assuming they use the same or similar hardware).

      Does anybody think we have any recourse with TP-Link support to get a new firmware released? In this day and age where some of the largest ever DDoS attacks are sourced from IP camera DVRs and other embedded devices, one would think that a company would make it a priority to resolve security issues of this nature.

      1 Reply Last reply Reply Quote 0
      • jahonixJ
        jahonix
        last edited by

        I e-mailed a TP-Link engineer I met at a trade show last year. I'll report back what he responds.
        Be gentle, I linked this thread to him.

        1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator
          last edited by

          Not talking about editing the vlan 1, I am talking about removing the port from the vlan.. If you can not remove a port from being in vlan 1 as untagged then you have a problem sure.. The switch is doing what it says its going to do.. Port 1-8 are set to be untagged vlan 1.. So yeah any traffic on vlan 1 that is broadcast traffic should flood out those ports as untagged.

          Does not matter that you set PVID to.. All this says that hey untagged traffic I see INBOUND to this port, this is the vlan that traffic is in..

          So your using the webgui - can you try their utility software?  Maybe their is bug in their code in the web gui for removal of ports from vlan 1?  I have half a mind to just order one of these to play with.. But from what you posted the switch is doing what its configured to do..  All ports are in vlan 1 untagged.  Any broadcast traffic that it see inbound to a port that has pvid of 1, will be flooded out every other port that as being in vlan 1..

          Generate your broadcast traffic inbound to a port that has its pvid set to something other than vlan 1.  That untagged traffic would be in that vlan and not broadcast out vlan 1 ports.  But in the current config state any traffic ingress to ports 1 or 8 that have pvid of 1 would be flooded out all the ports since they are listed as being untagged in vlan 1.

          If you set all the pvid to something else other than 1 - can you still get to the IP of the switch?  Does the config software utility still work?

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

          1 Reply Last reply Reply Quote 0
          • W
            wbond
            last edited by

            Johnpoz, I think you have the right idea.  I have a TL-SG2008 and a couple of TL-SG3424's and removed all the ports from the default VLAN 1 when I set them up.  I don't think you can delete VLAN 1, but on my models at least you can remove all the ports from it.  All the PVID's are set to something other than 1 and I can still reach the IP of the switch.  I've never seen any traffic bleeding from one vlan to another.

            1 Reply Last reply Reply Quote 0
            • W
              whosmatt
              last edited by

              @johnpoz:

              Not talking about editing the vlan 1, I am talking about removing the port from the vlan.. If you can not remove a port from being in vlan 1 as untagged then you have a problem sure.. The switch is doing what it says its going to do.. Port 1-8 are set to be untagged vlan 1.. So yeah any traffic on vlan 1 that is broadcast traffic should flood out those ports as untagged.

              Does not matter that you set PVID to.. All this says that hey untagged traffic I see INBOUND to this port, this is the vlan that traffic is in..

              So your using the webgui - can you try their utility software?  Maybe their is bug in their code in the web gui for removal of ports from vlan 1?  I have half a mind to just order one of these to play with.. But from what you posted the switch is doing what its configured to do..  All ports are in vlan 1 untagged.  Any broadcast traffic that it see inbound to a port that has pvid of 1, will be flooded out every other port that as being in vlan 1..

              Generate your broadcast traffic inbound to a port that has its pvid set to something other than vlan 1.  That untagged traffic would be in that vlan and not broadcast out vlan 1 ports.  But in the current config state any traffic ingress to ports 1 or 8 that have pvid of 1 would be flooded out all the ports since they are listed as being untagged in vlan 1.

              If you set all the pvid to something else other than 1 - can you still get to the IP of the switch?  Does the config software utility still work?

              I'll have to double check, but I think all ports remain untagged in VLAN 1 no matter what we do.  That could explain some of the behavior reported, but I've had no problem keeping traffic isolated.  I have my PVID set to something other than VLAN1 on all ports and can still hit the management interface.  There is no way to define a VLAN for the management interface that I can see.

              1 Reply Last reply Reply Quote 0
              • V
                Vlado
                last edited by

                Is there any update on this?

                @jahonix, did the TP-Link engineer ever answer your questions? I'm especially interested in the option to be able to set a management VLAN on the Easy Smart switches.

                1 Reply Last reply Reply Quote 0
                • jahonixJ
                  jahonix
                  last edited by

                  @Vlado:

                  did the TP-Link engineer ever answer your questions?

                  Unfortunately not, I would have let you know otherwise.
                  I'm confident to meet some TP-Link guys at CeBIT this March. I'll point them to this thread.

                  1 Reply Last reply Reply Quote 0
                  • ivorI
                    ivor
                    last edited by

                    Any updates on this thread? Seems like this is a serious problem.

                    Need help fast? Our support is available 24/7 https://www.netgate.com/support/

                    1 Reply Last reply Reply Quote 0
                    • W
                      whosmatt
                      last edited by

                      @ivor:

                      Any updates on this thread? Seems like this is a serious problem.

                      I haven't seen any firmware updates that allow removing VLAN1 untagged from the switch ports.  I'm guessing TP-Link sees this as a feature, so that the end user can avoid having to set up the management interface on a VLAN and perhaps locking themselves out of managing the switch, since there's no console or anything like that.

                      Of course I understand the implications, and obviously these switches are meant for home use. I'd be curious to hear what TP-Link says about it, but that's my guess.

                      1 Reply Last reply Reply Quote 0
                      • P
                        pfBasic Banned
                        last edited by

                        I got one of these and immediately returned it.

                        I ended up with a zyxel gs1900-8hp, it's 70W of PoE over all 8 ports for $100. It didn't have the forced VLAN 1, and it even has a telnet CLI you can activate and a header for serial access.  MUCH better GUI and many more features!

                        The non-PoE version is I think $60. So almost double the price of a tplink might not be interesting but I thought I'd throw it out there.

                        I actually kept my LAN on VLAN1. It's for home use and you can force HTTP/S only acces, that combined with a strong password keeps me from worrying about needing a management only interface.

                        1 Reply Last reply Reply Quote 0
                        • jahonixJ
                          jahonix
                          last edited by

                          @ivor:

                          Any updates on this thread?

                          Sorry, I didn't make it to CeBIT. Workload prohibited going there.
                          And the engineer I talked to last year never responded to my mails.

                          1 Reply Last reply Reply Quote 0
                          • DerelictD
                            Derelict LAYER 8 Netgate
                            last edited by

                            For just a couple dollars more you can get a D-Link DGS-1100-08 that has a management VLAN setting and doesn't do all this VLAN 1 nonsense.

                            Not sure what the fascination with these TP-Link things is. They are garbage.

                            Chattanooga, Tennessee, USA
                            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                            Do Not Chat For Help! NO_WAN_EGRESS(TM)

                            1 Reply Last reply Reply Quote 0
                            • P
                              pfBasic Banned
                              last edited by

                              At least for me the fascination was the price. Also, before asking around in a forum like this they appear to be a great buy based on amazon reviews.

                              But I agree, better off getting something a little better.

                              1 Reply Last reply Reply Quote 0
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator
                                last edited by

                                I got one of these to play with since see a lot of threads about them.. You can not remove vlan 1 that is for damn sure, and there also seems to be a cosmetic issue with it reporting rxbadpkts on interface that tagged vlan traffic hits…  But seems to just be cosmetic.

                                I have not had a chance to test the security if vlan 1 traffic is broadcasted out a port if you change the pvid to some other vlan.  But pretty sure you can get to the management IP from any switch port..  When I get some play time do some testing.  But for a home switch, that does vlans the price is attractive.

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                1 Reply Last reply Reply Quote 0
                                • P
                                  pfBasic Banned
                                  last edited by

                                  @johnpoz:

                                  But pretty sure you can get to the management IP from any switch port.

                                  How big of a security concern is this really? If the webgui is HTTP/S and you have a strong password on it then what is the security risk?

                                  My setup is home use only so for me I'm not at all concerned about anyone on my network even caring to look for a switch or router on the network, I was just curious how much of an actual security vulnerability this would be on a larger network?

                                  1 Reply Last reply Reply Quote 0
                                  • DerelictD
                                    Derelict LAYER 8 Netgate
                                    last edited by

                                    I have very little patience (read zero) for any flakiness in my layer 2 gear.

                                    Chattanooga, Tennessee, USA
                                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                    1 Reply Last reply Reply Quote 0
                                    • W
                                      whosmatt
                                      last edited by

                                      @pfBasic:

                                      @johnpoz:

                                      But pretty sure you can get to the management IP from any switch port.

                                      If the webgui is HTTP/S

                                      It's not, and I don't see any way to change it.  I get it, these switches are basically the same price as a typical unmanaged switch.  They're cheap and offer VLANs.  That's about all I can say.

                                      Right now all my ports are either trunk ports (two between switches, one to my AP, one to my ESXi box) or access ports on a single VLAN (not VLAN1) which uses a subnet that also happens to contain the management IP address.  My other two VLANs / subnets are either wireless only or contained entirely in ESXi / pfSense.  In other words, I don't have any wired devices on an access port in a VLAN / subnet that doesn't also contain the management IP.

                                      As expected, my guest wireless network cannot access the management IP of the switch.  It can access certain services on that subnet, but only because I explicitly allow that access in pfSense.  In that regard, the switches behave exactly as I'd expect.

                                      I suppose I should put a port into the VLAN for the guest network and test that way with a wired connection, but for my setup that test would be academic.

                                      Next time I buy a switch for home use, I'll choose something different.  If anyone can show me a 16 port fanless 1Gbps fully managed switch (with a proper CLI) I'd be ecstatic.  For now, I'm not freaking out about it.

                                      1 Reply Last reply Reply Quote 0
                                      • P
                                        pfBasic Banned
                                        last edited by

                                        @whosmatt:

                                        @pfBasic:

                                        @johnpoz:

                                        But pretty sure you can get to the management IP from any switch port.

                                        How big of a security concern is this really? If the webgui is HTTP/S and you have a strong password on it then what is the security risk?

                                        My setup is home use only so for me I'm not at all concerned about anyone on my network even caring to look for a switch or router on the network, I was just curious how much of an actual security vulnerability this would be on a larger network?

                                        It's not, and I don't see any way to change it.  I get it, these switches are basically the same price as a typical unmanaged switch.  They're cheap and offer VLANs.  That's about all I can say.

                                        I just meant in general is it a security concern if you can force HTTP/S and put a good password on it.
                                        I replaced my TP-Link with a Zyxel GS1900 and it allows you to force HTTP/S WebGUI.

                                        1 Reply Last reply Reply Quote 0
                                        • W
                                          whosmatt
                                          last edited by

                                          @pfBasic:

                                          I just meant in general is it a security concern if you can force HTTP/S and put a good password on it.
                                          I replaced my TP-Link with a Zyxel GS1900 and it allows you to force HTTP/S WebGUI.

                                          Yeah, got it.  Sorry, my response was not entirely directed at you or the https question.

                                          1 Reply Last reply Reply Quote 0
                                          • P
                                            pfBasic Banned
                                            last edited by

                                            @whosmatt:

                                            If anyone can show me a 16 port fanless 1Gbps fully managed switch (with a proper CLI) I'd be ecstatic.

                                            Youtube Video

                                            It's 16 port, gigabit and fanless. But not quite fully managed, you might be interested though.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.