Not directly Home Assistant related yet but this is the first step.
I am looking to install a Reolink POE doorbell and having very little network knowledge was unsure if there is a security risk having an ethernet cable running into the back of the doorbell. If someone were to remove the doorbell they would have access to the ethernet cable, could they then access devices and data on my network? Should there be any security steps I should take when installing security via ethernet outside?
For further information I have not decided yet if i’m using an nvr or a nas to record the video, I know i want it to be local and avoid the cloud, and I will certainly be running it through Home Assistant and want to receive the usual notifications and possibly run a few automations based on doorbell ring or presence detection.
Best practice would be not expose your network to the “outside” without taking extra measurements like encryption and authentication. While this is the “default” for WPAx WIFI’s the ordinary ethernet is missing this.
Ether only provide power (the P in PoE) over the cable and use wifi for coms or implement at least some authentication if you prefer the wires. You also wanna make sure that the ethernet is not (too) easy accessible - maybe by using some security screws or so
I just find video doorbells only require a paperclip to remove from the mount so the screws are largely irrelevant. I’m probably being overly cautious as someone plugging in a laptop outside my house to the ethernet would be quite obvious
I was going to avoid WiFi because whilst I have a strong WIFI connection I’m certain some delivery companies have used WiFi blockers in the past as some events doesn’t get recorded correctly.
I have a Unifi Poe switch, so I have created a mac address filter on the port that goes to the camera. That way the link only works with that one mac address… if someone was to plug in another device it would not work.
Well, that is some protection, but bear in mind that mac of network card can be easily changed in laptop…
Regarding tamper switch: if unit doesn’t have it you can add any microswitch, it will also do it’s job.
Can you share how it went? I am in the same situation, also have a Netgear POE switch, and wondering how to go about securing the external LAN connector.
There are many guides out there and here is one example of how to set up a secure network:
In most setups VLAN 1 is the default untagged route so you setup say VLAN 2 for the internal network, 3 for IoT devices and 4 for guest devices and for each VLAN you setup a dedicated subnet IP i.e 192.168.1.1/24 for VLAN 1, 192.168.2.1/24 for VLAN 2 etc
Then at the firewall level you can designate to allow the IoT VLAN to access only your home assistant host on the internal network and no other deivces.
Sure, but they would need to know the MAC that is being allowed so would need to get that from the doorbell first. It’s all time spent standing at your door when a brick through the window is an easier option.
This is why you do layered security, if you can make them waste time then its more time for the cops to get them and its more evidence of property damage if you can get it for cases against them.
Then again there are people that just vandalize and run.
That’s like 2 seconds with the correct tool after the doorbell was ripped off
In anyway suggesting half backed and easy to circumvent solutions while proper (secure) ways do exist (like VLAN) is not that smart of a move. Many people out there still believe that locking network access to certain MACs is a security feature as people sadly not getting tired repeating this false claims
It’s even funnier when people do this for WIFI as the MACs are usually broadcast openly