2.9 Configuring Appropriate Security Settings on Small Office/Home Office (SOHO) Wireless and Wired Networks

COMPTIA A+ CORE 2 - DOMAIN 2

Cyber Wizard

black and white striped flag
black and white striped flag

This article provides an in-depth guide on securing SOHO networks through proper router configurations, wireless settings, and firewall adjustments, as required for the CompTIA A+ exam.

CompTIA A+ Exam Domain: Domain 2.9 - Given a scenario, configure appropriate security settings on small office/home office (SOHO) wireless and wired networks.

Home Router Security Settings

Properly configuring a router is essential for securing home and small office networks against cyber threats.

Change Default Passwords

  • Why? Default router admin credentials are publicly known and can be exploited.

  • How?

    • Access the router settings via 192.168.1.1 or 192.168.0.1.

    • Change both administrator password and Wi-Fi passphrase.

    • Use a strong password with at least 12 characters, mixed-case letters, numbers, and symbols.

    • Disable remote administrative access if not needed.

IP Filtering

  • Why? Restricts access to specific IP addresses, blocking unauthorized users.

  • How?

    • Configure access control lists (ACLs) in the router settings.

    • Allow only specific IP ranges for trusted devices.

Firmware Updates

  • Why? Fixes vulnerabilities and enhances security.

  • How?

    • Check the router manufacturer’s website for the latest firmware.

    • Enable automatic updates if available.

    • Schedule updates during non-peak hours.

Content Filtering

  • Why? Blocks malicious or inappropriate websites.

  • How?

    • Use built-in parental controls or third-party DNS services like OpenDNS or Cloudflare Family.

    • Configure keyword filtering to block specific content.

Physical Placement/Secure Locations

  • Why? Prevents unauthorized physical access to the router.

  • How?

    • Place the router in a central, secure location, away from windows and entry points.

    • Lock networking equipment in server cabinets if necessary.

Dynamic Host Configuration Protocol (DHCP) Reservations

  • Why? Ensures devices receive the same internal IP address, improving network security and stability.

  • How?

    • Assign static IPs to trusted devices using MAC address binding.

    • Prevent unauthorized devices from obtaining network access.

Static Wide-Area Network (WAN) IP

  • Why? A static WAN IP is beneficial for hosting secure services like VPNs.

  • How?

    • Contact the ISP to request a static IP.

    • Configure WAN settings in the router’s network settings.

    • Use dynamic DNS (DDNS) if static IP is unavailable.

Universal Plug and Play (UPnP)

  • Why? UPnP can introduce security risks by allowing applications to open ports automatically.

  • How?

    • Disable UPnP unless required for specific applications.

    • Use manual port forwarding instead.

Screened Subnet (DMZ - Demilitarized Zone)

  • Why? Isolates public-facing services (web, email, VPN) from internal networks.

  • How?

    • Create a separate subnet for external-facing devices.

    • Ensure the firewall restricts traffic between the DMZ and internal LAN.

Wireless-Specific Security Settings

Changing the Service Set Identifier (SSID)

  • Why? Prevents broadcasting default network names, making it harder for attackers to identify the router brand.

  • How?

    • Rename the SSID to something unique but non-identifiable.

    • Avoid including personal information (e.g., “SmithHouseWiFi”).

Disabling SSID Broadcast

  • Why? Hides the network from casual discovery.

  • How?

    • Disable SSID broadcast in wireless settings.

    • Manually configure devices to connect to the hidden network.

Encryption Settings

  • Why? Protects wireless data transmission.

  • How?

    • Use WPA3 (preferred) or WPA2-PSK (AES).

    • Avoid outdated encryption methods like WEP and WPA (TKIP).

    • Use enterprise authentication (WPA2-Enterprise, RADIUS) for corporate environments.

Disabling Guest Access

  • Why? Prevents unauthorized users from connecting to the network.

  • How?

    • Turn off the guest network or set strong authentication.

    • If needed, create a separate VLAN for guest access.

    • Restrict bandwidth for guest devices to prevent abuse.

Changing Channels

  • Why? Reduces interference and improves performance.

  • How?

    • Use channel 1, 6, or 11 for 2.4GHz networks to avoid overlap.

    • Use a Wi-Fi analyzer to identify the least congested channels.

    • For 5GHz, select channels with minimal interference.

Firewall Settings

Disabling Unused Ports

  • Why? Prevents open ports from being exploited.

  • How?

    • Close all unused ports in the router’s firewall settings.

    • Use Nmap or ShieldsUP! to check for open ports.

    • Disable remote management if not required.

Port Forwarding/Mapping

  • Why? Directs external traffic to internal devices securely.

  • How?

    • Only forward ports that are absolutely necessary.

    • Use randomized high-numbered ports for security.

    • Example: Forwarding port 3389 (RDP) to a non-standard port to reduce attack risks.

    • Implement port triggering for dynamic access control.

Additional Security Measures

Implementing VLANs

  • Why? Segments network traffic to improve security.

  • How?

    • Separate IoT, guest, and business devices into different VLANs.

    • Apply different firewall rules and bandwidth limits per VLAN.

Using VPNs for Secure Remote Access

  • Why? Encrypts external connections to the network.

  • How?

    • Configure OpenVPN or WireGuard on the router.

    • Use corporate VPN services for remote employees.

Monitoring and Logging

  • Why? Helps detect anomalies and security incidents.

  • How?

    • Enable router logging to track network activity.

    • Use Intrusion Detection Systems (IDS) like Snort for real-time monitoring.

Final Thoughts

Configuring a SOHO network with proper security settings mitigates risks of unauthorized access, data breaches, and cyber threats. The CompTIA A+ exam evaluates knowledge of router security, wireless encryption, firewall configurations, and best practices for maintaining secure home and small office networks.