Security issues of Easy Smart configuration protocol
This thread has been locked for further replies. You can start a new thread to share your ideas or ask questions.
Security issues of Easy Smart configuration protocol
Region : Ukraine
Model : TL-SG1024DE
Hardware Version : V1
Firmware Version : 20131023
We're having 3 different networks divided by the 802.1Q VLANs on the TL-SG1024DE switch.
One of this networks (on the 10 VLAN) is having white IPs and shared with another office. I want to disable the usage of the Easy Smart configuration utility from that VLAN.
The other members of the network is able to discover [COLOR=#000000][COLOR=#000000]Easy Smart devices with their real IPs. It is not safe when malware for [COLOR=#000000]TL-SG10*DE will appear.
I found no option how to bind Easy Smart configuration server to the specific VLAN.
I'm misunderstanding what I can do this or have I missed something?
Thanks
PS: The worst is that they can be discovered by the network scanning software
Model : TL-SG1024DE
Hardware Version : V1
Firmware Version : 20131023
We're having 3 different networks divided by the 802.1Q VLANs on the TL-SG1024DE switch.
One of this networks (on the 10 VLAN) is having white IPs and shared with another office. I want to disable the usage of the Easy Smart configuration utility from that VLAN.
The other members of the network is able to discover [COLOR=#000000][COLOR=#000000]Easy Smart devices with their real IPs. It is not safe when malware for [COLOR=#000000]TL-SG10*DE will appear.
I found no option how to bind Easy Smart configuration server to the specific VLAN.
I'm misunderstanding what I can do this or have I missed something?
Thanks
PS: The worst is that they can be discovered by the network scanning software