I have our ePMP's setup to get their public IP via PPPoE, and the radio
also gets a completely separate private management IP via DHCP, which is
the only way you can remotely access the radio, and it doesn't even have to
be in a separate vlan unless you want it to be... and it's one checkbox to
configure it.

I'm not sure if that can be duplicated on UBNT or not, since I haven't
really tried yet, but at the very least it's a lot more complicated to
configure.



On Wed, May 4, 2016 at 7:04 PM, Josh Luthman <j...@imaginenetworksllc.com>
wrote:

> It does...you just need to set it up that way.
>
>
> Josh Luthman
> Office: 937-552-2340
> Direct: 937-552-2343
> 1100 Wayne St
> Suite 1337
> Troy, OH 45373
>
> On Wed, May 4, 2016 at 7:54 PM, Mathew Howard <mhoward...@gmail.com>
> wrote:
>
>> I really wish Ubiquiti radios had a separate management vlan option (in
>> router mode), like ePMP does...
>>
>> On Wed, May 4, 2016 at 6:10 PM, Josh Reynolds <j...@kyneticwifi.com>
>> wrote:
>>
>>> I would encourage you to put your CPEs on a management vlan, in RFC1918
>>> space.
>>>
>>> On Wed, May 4, 2016 at 6:00 PM, SmarterBroadband
>>> <li...@smarterbroadband.com> wrote:
>>> > Hi Tushar
>>> >
>>> >
>>> >
>>> > We run all radios in NAT mode.
>>> >
>>> >
>>> >
>>> > Adam
>>> >
>>> >
>>> >
>>> > From: Af [mailto:af-boun...@afmug.com] On Behalf Of Tushar Patel
>>> > Sent: Wednesday, May 04, 2016 3:34 PM
>>> > To: af@afmug.com
>>> > Subject: Re: [AFMUG] UBNT CPE being used for Abusive actions?
>>> >
>>> >
>>> >
>>> > Radios could be put on private ip so nobody from outside world can
>>> access
>>> > it. That is what we do.
>>> >
>>> > Tushar
>>> >
>>> >
>>> >
>>> >
>>> > On May 4, 2016, at 5:22 PM, SmarterBroadband <
>>> li...@smarterbroadband.com>
>>> > wrote:
>>> >
>>> > I have received a number of emails for ab...@light-gap.net saying
>>> certain of
>>> > our IP address are being used for attacks (see email text below).
>>> >
>>> >
>>> >
>>> > All IP addresses are in UBNT radios.  We are unable to remote access
>>> any of
>>> > the these radios now.  We see that the radio we are unable to access
>>> > rebooted a couple of days ago.  A number of other radios show they
>>> rebooted
>>> > around the same time (in sequence) on the AP.  We are unable to remote
>>> > access any of those either. Other radios with longer uptime on the
>>> AP’s are
>>> > fine.
>>> >
>>> >
>>> >
>>> > We have a tech on route to one of the customer sites.
>>> >
>>> >
>>> >
>>> > We think the radios are being made into bots.  Anyone seen this or
>>> anything
>>> > like this?  Do the hackers need a username and password to hack a
>>> radio?
>>> > I.E.  Would a change of the password stop the changes being made to the
>>> > radios?  Any other thoughts, suggestions or ideas?
>>> >
>>> >
>>> >
>>> > Thanks
>>> >
>>> >
>>> >
>>> > Adam
>>> >
>>> >
>>> >
>>> > Email Text below:
>>> >
>>> >
>>> >
>>> > “This is a semi-automated e-mail from the LG-Mailproxy authentication
>>> > system, all requests have been approved manually by the
>>> > system-administrators or are obviously unwanted (eg. requests to our
>>> > spamtraps).
>>> >
>>> > For further questions or if additional information is needed please
>>> reply to
>>> > this email.
>>> >
>>> >
>>> >
>>> > The IP xxx.xxx.xxx.xxx has been banned for 48 hours due to suspicious
>>> > behaviour on our system.
>>> >
>>> > This happened already 1 times.
>>> >
>>> > It might be be part of a botnet, infected by a trojan/virus or running
>>> > brute-force attacks.
>>> >
>>> >
>>> >
>>> > Our affected destination servers: smtp.light-gap.net,
>>> imap.light-gap.net
>>> >
>>> >
>>> >
>>> > Currently 7 failed/unauthorized logins attempts via SMTP/IMAP with 6
>>> > different usernames and wrong password:
>>> >
>>> > 2016-05-04T23:48:40+02:00 with username "downloads.openscience.or.at"
>>> > (spamtrap account)
>>> >
>>> > 2016-05-04T22:47:19+02:00 with username "sp_woq" (spamtrap account)
>>> >
>>> > 2016-05-04T14:55:11+02:00 with username "info" (spamtrap account)
>>> >
>>> > 2016-05-03T21:24:22+02:00 with username "fips" (spamtrap account)
>>> >
>>> > 2016-05-03T20:57:19+02:00 with username "downloads.openscience.or.at"
>>> > (spamtrap account)
>>> >
>>> > 2016-05-03T10:13:59+02:00 with username "d10hw49WpH" (spamtrap account)
>>> >
>>> > 2016-05-03T05:34:43+02:00 with username "12345678" (spamtrap account)
>>> > Ongoing failed/unauthorized logins attempts will be logged and sent to
>>> you
>>> > every 24h until the IP will be permanently banned from our systems
>>> after 72
>>> > hours.
>>> >
>>> >
>>> >
>>> > The Light-Gap.net Abuse Team.”
>>> >
>>> >
>>>
>>
>>
>

Reply via email to