Secure Network On-the-Go or Lending to Strangers

  • Be sure to checkout “Tips & Tricks”
    Dear Guest Visitor → Once you register and log-in please checkout the “Tips & Tricks” page for some very handy tips!

    /Steve.
  • BootAble – FreeDOS boot testing freeware

    To obtain direct, low-level access to a system's mass storage drives, SpinRite runs under a GRC-customized version of FreeDOS which has been modified to add compatibility with all file systems. In order to run SpinRite it must first be possible to boot FreeDOS.

    GRC's “BootAble” freeware allows anyone to easily create BIOS-bootable media in order to workout and confirm the details of getting a machine to boot FreeDOS through a BIOS. Once the means of doing that has been determined, the media created by SpinRite can be booted and run in the same way.

    The participants here, who have taken the time to share their knowledge and experience, their successes and some frustrations with booting their computers into FreeDOS, have created a valuable knowledgebase which will benefit everyone who follows.

    You may click on the image to the right to obtain your own copy of BootAble. Then use the knowledge and experience documented here to boot your computer(s) into FreeDOS. And please do not hesitate to ask questions – nowhere else can better answers be found.

    (You may permanently close this reminder with the 'X' in the upper right.)

Just setup my old router as an access point (first time) but it came about because all the apps I use with Chromecast keeps disconnecting (from being able to control the stream - although the audio/video continues) and that began when I bought a new router.

But it was easier than thought and I will buy a VPN router to use instead of my old router so I can use that as a secure access point for most of my devices.

Anyway, just interesting to actually do something about trying it out ;) - and now I'm waiting to see how my apps behave when casting audio/video :) (being connected to the old router)
 
I don't think that I understand what you are trying to do here.

The normal situation when a VPN is required/advisable is when you are connecting to a remote resource, e.g. working from home with access to the company server. VPN's are not normally used within the house to connect from an end device to the "internet gateway" ( I call it that as it may be a modem, a router, or any kind of combo device). The problem is that whilst a number of home gateways will act as a VPN client and route all internet traffic over a VPN to a remote site, I don't think they will act as a VPN server. Remember a VPN is effectively an encrypted point to point communication path, it is not a replacement for WPA2 security on a wifi link.
 
I don't think that I understand what you are trying to do here.

The normal situation when a VPN is required/advisable is when you are connecting to a remote resource, e.g. working from home with access to the company server. VPN's are not normally used within the house to connect from an end device to the "internet gateway" ( I call it that as it may be a modem, a router, or any kind of combo device). The problem is that whilst a number of home gateways will act as a VPN client and route all internet traffic over a VPN to a remote site, I don't think they will act as a VPN server. Remember a VPN is effectively an encrypted point to point communication path, it is not a replacement for WPA2 security on a wifi link.

Don't mind me - was not so much about VPN at this point just trying to figure out why apps casting via chromecast (on my old router) worked fine but with the new one they disconnect all the time. Just leave it. Wasn't a good solution to switch back to my old and slow router. Will find other ways to enjoy my entertainment if Chromecast keeps bugging me ;)
 
trying to figure out why apps casting via Chromecast (on my old router) worked fine but with the new one they disconnect all the time
Well Chromecast is barely peer to peer. The normal idea is that the controller (phone or Chrome on a desktop) is just sending commands (start this source, go to this play position, stop, etc) and the Chromecast gets the actual streaming data DIRECTLY from the source. In this scenario, if it's frequently stopping, it would probably indicate your connection is latent or the source is having trouble sending the data. If you host the source as well, then it would probably be whatever software you're using to be the host that would be causing the grief.
 
  • Like
Reactions: CredulousDane
But whatever she does online can be traced back to your ISP account.
This is what I was waiting to see. Having anyone on an isolated/guest network is one thing and many consumers routers have this feature, but that simply blocks those devices (on the guest/isolated network) from accessing your local/LAN devices, which is great, but anything done on the guest/isolated network will still be associated with your WAN IP address.

Sure, you can get very advanced and set up a VPN service and filter the traffic from the guest/isolated network to tunnel through the VPN service network, but now you have to pay for a VPN service, not sure why you would want to do this for a guest/isolated network.

However, in the scenario that is being discussed (giving internet access to a friend/neighbor/etc) and being concerned with them having access to your network, I think the best thing to do is create a guest network and make sure client isolation is enabled, if possible.

I use pfsense for router/firewall and have tried various brands for multi-AP environments (for traffic hand-off between APs), even if the wireless APs I'm using have an option for client isolation/guest network, I will still create a rule in the pfsense firewall to block LAN > Guest WLAN traffic and Guest WLAN > LAN traffic as a safety net. That way if the wireless setting of client isolation/guest network was changed by accident or firmware update, etc...I'm still protected from the pfsense setting.
 
This is what I was waiting to see. Having anyone on an isolated/guest network is one thing and many consumers routers have this feature, but that simply blocks those devices (on the guest/isolated network) from accessing your local/LAN devices, which is great, but anything done on the guest/isolated network will still be associated with your WAN IP address.

Sure, you can get very advanced and set up a VPN service and filter the traffic from the guest/isolated network to tunnel through the VPN service network, but now you have to pay for a VPN service, not sure why you would want to do this for a guest/isolated network.

However, in the scenario that is being discussed (giving internet access to a friend/neighbor/etc) and being concerned with them having access to your network, I think the best thing to do is create a guest network and make sure client isolation is enabled, if possible.

I use pfsense for router/firewall and have tried various brands for multi-AP environments (for traffic hand-off between APs), even if the wireless APs I'm using have an option for client isolation/guest network, I will still create a rule in the pfsense firewall to block LAN > Guest WLAN traffic and Guest WLAN > LAN traffic as a safety net. That way if the wireless setting of client isolation/guest network was changed by accident or firmware update, etc...I'm still protected from the pfsense setting.
All that is for your protection.
If someone on your guest WiFi creates an email account, then sends an email about illegal activity, perhaps assassinating a government leader. Your ISP will give them your information when they receive the warrant.

This is 10 years old, but IP is still IP.
https://www.registercitizen.com/new...ly-charged-with-child-porn-after-12077668.php