Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    TP-Link Easy Smart Switch security question

    Scheduled Pinned Locked Moved Hardware
    185 Posts 44 Posters 82.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator @easycompany251
      last edited by

      @easycompany251 said in TP-Link Easy Smart Switch security question:

      but the web-ui requires it for at least 1 port....

      Yeah as @stephenw10 stated leaving it on 1 port so you can get to the gui to admin, is prob a safety feature to prevent users from shooting themselves in the foot. And would be preferred to allowing all ports to be able to get to the gui.

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      1 Reply Last reply Reply Quote 1
      • E
        easycompany251 @stephenw10
        last edited by easycompany251

        @stephenw10 @johnpoz

        Right so after you mentioned VLAN1 being on a single port, I went back and was actually able to make it work.

        Turns out I left the VLAN1 on all ports (as defaulted) and the switch does allow for it to be set to one. Never even thought about removing VLAN1 all together except for a single port.

        Thanks!

        1 Reply Last reply Reply Quote 1
        • S
          surenz @Apocalypse
          last edited by

          @apocalypse Registered just to thank you about the great idea and tutorial.
          It was just a mess what software to use for creation of the hex file but finally managed to do it with HxD.
          Finally I have a web interface and latest security updates for this very old device (Netgear latest firmware 1.6.0.9 is updated 1 year ago where the TP-Link's is from the 2014).

          1 Reply Last reply Reply Quote 2
          • ?
            A Former User
            last edited by

            Several ways here might be able to go with gaining the entire security using dump switches and/or smart ones up to real small layer3 switches.

            Plain Routing (using dump switches)
            If you are using the pfSense as firewall you may be able to set up on any LAN port a small or greater dump switch.

            Network plugs in the wall --- patch panel --- some ports from patch panel to a dump switches --- dump switch to the pfSense firewall

            So will be able to connect all WiFi APs to one Switch
            Livingroom and house electric (smarthome) to another one
            sons room to one switch
            daughters room to one switch

            and each of the switches will be connected to one LAN port of the pfSense, you may be now routing it all
            through the pfSense and you work with rules.

            Pro

            • cheap
            • easy to manage

            Cons

            • but only one routing point
            • firewall must do the entire routing

            Smart Switches (Using VLANs)
            If you are using a smart switch you may be able to work with VLANs in your network and segment it in to many parts. You can now work with rules on the pfSense and
            on top with ACLs on the Switch directly. The VLAN1 or VLAN0 is often so called default VLAM or management VLAN used only by the admin. After you were creating all your VLANs often you lay over another one (one over all the others) but not the VLAN1 (default) and with ACLs
            you may now creating who has hands on what VLAN.

            Pros

            • cheap
            • small broadcast domain
            • better overview over devices
            • better structured or segmented network
            • the admin owns now a management VLAN

            Cons

            • ARP spoofing is not solved
            • Inter VLAN hopping is not solved
            • VLANs must be created and ACLs must be set up
            • the management VLAN can be miss used by others

            Greater Smart or managed Switches VLANs, MacSec, multiple Radius auth. for each switch port

            You will be setting up VLANs as before;

            • one management VLAN1 (default)
            • all other with a great one over all others
            • Setting up ACLs

            But now you will be able to turn on MacSec, and now one is able to sniff inside of that Switch(es), you will be able to stack them (ring) to better manage them. And you will be able to set up on your pfSense the FreeRadius package or
            another FreeRadius server on an RaspBerry PI or PC Engines APU1/2/3/4/6 if needed. You will be able to gain your security over installing OpenLDAP (wired clients),
            FreeRadius Server with certificates, (wired and wireless clients) and now you will be able to put any device into its own VLANs by using a radius certificate and I mean not only for the wireless clients.

            Pros

            • Building stacks (ring)
            • often MIBS for Nagios or PRTG
            • each devices will be put in the right VLAN (certificates)
            • MacSec is able to turn on (no sniffers)
            • Switch Ports with multiple certificate authentication are
              not any more allowing to finger at the VLAN1 (default)
            • no y-cable usage and/or foreign devices in your network
            • much can be realized over pfSense itself or a small RaspBerry PI 2/3/4

            Cons

            • not so cheap as the other ways
            • more management and admin power or work
            • more complicated and also a much more hit on the
              entire LAN network cable (MacSec and Radius with certificates and encryption will be using much horse power)

            Managed switches (greater ones)
            You can be often her and in the section before getting hands on layer3 license and/or they will be also in all
            other segments being sold as real layer3 switches such
            the Cisco SG300 or SG350 series. You will be getting all as above mentioned but on top layer3 that let route the entire VLANs it self and free the pfSense firewall from that
            workload. Often stacking modules will be also available
            for such managed switches. It is often also offered some
            different routing methods like RIP-2, IGMP, VRRP, OSPFv2, PIM-SM, static IP Routing, PIM-DM and others so it is more interesting what your pfSense firewall is set up
            and/or using to the WAN side and the LAN side too.

            Pros

            • Stackable, Layer3 Licences available
            • more routing protocols available
            • faster and more powerful
            • better connect and support to the WAN routing device
              (pending on the used routing protocols there)

            Cons

            • high cost
            • high electric power using
            • much more complicate to manage
            • not for all circumstances and users
            1 Reply Last reply Reply Quote 0
            • S
              spaghetti_trash
              last edited by

              Hi everyone, I recently bought the v6.0 version of this switch (TL-SG108E) and updated its firmware to the latest version (TL-SG108E(UN)_V6_1.0.0 Build 20230218) released last February.

              Can you confirm the vulnerability is still there?

              I personally tried to relegate the management interface to a single port but I was nonetheless able to access it from every other port.

              noplanN 1 Reply Last reply Reply Quote 0
              • noplanN
                noplan @spaghetti_trash
                last edited by

                @spaghetti_trash

                have u tested it ?

                S 1 Reply Last reply Reply Quote 0
                • S
                  spaghetti_trash @noplan
                  last edited by spaghetti_trash

                  @noplan I assigned vlan 90 to port 5 and made it not a member of vlan 1. Devices plugged into port 5 got the correct address via DHCP but could still access the management interface in vlan 1. Additionally, I could also manually force these devices to get an IP from vlan 1.

                  I asked to make sure I did not miss anything during my tests, especially because TP-link talks about "security" enhancements in the release notes of their latest firmware. So I was hoping they had actually fixed this problem.

                  noplanN 1 Reply Last reply Reply Quote 0
                  • noplanN
                    noplan @spaghetti_trash
                    last edited by

                    @spaghetti_trash

                    hi,

                    last time i checked it was possible to remove the port from any membership or vlan 1

                    gonna look up where this switch (sg-108e) is doin his job right now ... and check back
                    keep you posted

                    br np

                    N 1 Reply Last reply Reply Quote 2
                    • N
                      NicklyJohn @noplan
                      last edited by NicklyJohn

                      @noplan Any luck?

                      Are you removing the ports using the web gui or @tpham3783 's guide for hexadecimal hacking a config backup?

                      EDIT: I was able to set a port to 2 to a different VLAN and it stopped showing for VLAN1:

                      c6e2e7dc-0fb6-460f-bfa3-8575e7b2d30d-image.png

                      A 1 Reply Last reply Reply Quote 0
                      • A
                        Apocalypse @NicklyJohn
                        last edited by Apocalypse

                        @NicklyJohn You are confusing port based VLAN and 802.1q based VLAN.
                        However, since v3.0 it is possible to remove any port from VLAN1 in 802.1q VLAN Tag.

                        1 Reply Last reply Reply Quote 0
                        • D
                          devport
                          last edited by

                          Hey
                          I have TL-SG105E v5.0. My firmware doesn't work.
                          Can someone share a flash dump for the EN25H16 dice? I am from Poland and my English is not good.

                          Thank

                          johnpozJ 1 Reply Last reply Reply Quote 0
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator @devport
                            last edited by

                            @devport said in TP-Link Easy Smart Switch security question:

                            TL-SG105E v5.0.

                            Your saying they are back to their nonsense of not allowing removal of vlan1?

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                            D 1 Reply Last reply Reply Quote 0
                            • D
                              devport @johnpoz
                              last edited by

                              @johnpoz sorry model is TL-SG108E v5.0. My faul. No this problem. My problem is not run switch. Boot start -> processing -> supply diode 2x flash -> and reset boot sequence. No connect switch all lan port. So i looking for software from flash but from site TP-Link is not image SPI flash.

                              A 1 Reply Last reply Reply Quote 0
                              • A
                                Apocalypse @devport
                                last edited by Apocalypse

                                @devport You may can use .bin image from TP-Link website to build a .bin with entire 2MB memory flash size. But first you need read your flash to preserve bootloader (if not yet damaged) and copy & paste all content from TP-Link .bin upgrade image, starting paste in proper offset on the dump file. If your bootloader if damaged, you need a good dump from working v5 and change/write your Switch's MAC address in correct offset before write the dump. You can send me your dump and when have time i will inspect it.

                                johnpozJ D 3 Replies Last reply Reply Quote 0
                                • johnpozJ
                                  johnpoz LAYER 8 Global Moderator @Apocalypse
                                  last edited by johnpoz

                                  Just curious why would you spend more than say 10 minutes on say trying to flash the firmware.. Its a $27 switch on amazon, you could have a new one tmrw ;) I don't see spending more than a few minutes on trying to get something like that to work..

                                  A 200$ ok, might be worth spending some time on.. But a $30 switch.. not worth more than a few minutes of time if you ask me.

                                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                                  If you get confused: Listen to the Music Play
                                  Please don't Chat/PM me for help, unless mod related
                                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                                  1 Reply Last reply Reply Quote 0
                                  • D
                                    devport @Apocalypse
                                    last edited by

                                    @Apocalypse I don't know if the bootloader is broken, so I asked if anyone has a flash memory dump file. I don't know how to check it, the beginning of the Hex code is different than in the file from the TP-Link website.
                                    @johnpoz if rescue the switch i so happy. it interests me.

                                    1 Reply Last reply Reply Quote 1
                                    • D
                                      devport @Apocalypse
                                      last edited by devport

                                      @Apocalypse My dump File:
                                      https://www.mediafire.com/file/siafjrigd2d19cy/TL-SG108E_V5_Flash.bin/file

                                      MAC address at offset 0x1FC000 (filled in with "AA BB CC DD EE AB"). I Change it.

                                      A 2 Replies Last reply Reply Quote 0
                                      • A
                                        Apocalypse @devport
                                        last edited by

                                        @devport I will examine it when I can. It is normal for the Dump not to begin as the firmware file. From 0x0 to at least 0x1000 is the bootloader. In the update file there is no bootloader.

                                        1 Reply Last reply Reply Quote 0
                                        • A
                                          Apocalypse @devport
                                          last edited by

                                          @devport The dump file looks correct. I think this is a hardware problem.

                                          D 1 Reply Last reply Reply Quote 0
                                          • D
                                            devport @Apocalypse
                                            last edited by

                                            @Apocalypse Thanks

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.