Recommended Posts

I have a total of three PCs going through a router and I often use them to share files etc, but due to a recent virus attack I would like to isolate one of the PCs from the network so that it can't spread viruses etc through the network.

I'm guessing that once isolated it should still be able to use the printer (which is also plugged into the router) and continue to access the internet as well.

Any help would be much appreciated.

thanks for the reply.

what i meant was that it no longer has the ability to send/receive information to the other computers as it did when I had the recent virus problem. I've tried to change the workgroup but it still seems to be able to see/view/change the other computers information.

hope this clears what i mean!

  popisdead uk said:
Take it out of the same domain/workgroup. That will stop it sharing files
And where did you get that tidbit of misinformation from??

What workgroup your in has NOTHING to do with file sharing, and to be honest either does the domain really -- as long as you auth to the machine with a valid account you can access resources. A domain just makes it easier to give permissions since there is a central userbase.

And this clearly does not isolate the machine from possible viruses or exploits to the ports they are listening on, ie the file sharing ports, etc. Not having a valid account to auth with will not always protect you from a virus/exploit - but it will protect you from that machines virus from infecting every file it has permission too, depending on what account its logged in as, etc.

So blocking the account the other machine logs in with from having file share access would provide some minor protection. But if using SFS, thats not possible -- would need to have pro with the ability to give different accounts different access to files/shares, etc. But that would not protect you from an exploit using the file sharing ports, etc.

If you router does not allow you to setup vlans and put access control lists between them. Then your going to need to run software filewalls on the machines or put them behind a nat compared to the other machine. You would then need to do a port forward to allow printer access. Quite often this is port 9100, it would depend exactly how your sharing your printer - be it connected to a machine or on a stand alone printer server device, or if the printer has its own network card, etc.

Treating a machine(s) as hostile on the same local network is what software firewalls are good for! If you run software firewalls on your machines -- just use them to block access from that one machine.

One way as mentioned to put a line of protection between that machine and your other machines is to put the other machines behind another nat router.

example layout;

post-14624-1218542661_thumb.png

But I would REALLY NOT suggest this -- since the double nat comes with quite a few of its own headaches. Your best bet is to get a router that supports lan to lan firewall rules. There are few out there -- but not recalling any model numbers off the top of my head.. Would have to look around for one that does -- but they are out there for sure. What router do you have now?

Believe me -- I would love to get off the soapbox about FUD -- but it seems no matter how many times you state FACT and discredit FUD, it still manages to stay around. And the misconceptions about what a workgroup is and does just never seems to go way -- Arrrghhh ;)

I would love to know what you thought the question was asking -- that suggesting a different workgroup or domain would isolate it.

  technics said:
I have a total of three PCs going through a router and I often use them to share files etc, but due to a recent virus attack I would like to isolate one of the PCs from the network so that it can't spread viruses etc through the network.

I'm guessing that once isolated it should still be able to use the printer (which is also plugged into the router) and continue to access the internet as well.

Any help would be much appreciated.

So you want to stop computer (1) from giving it's virus to computers (2) and (3) on the network, but still want it to spread the virus to the internet?

You do know they make good FREE anti-virus software don't you? Right here on Neowin.

  BudMan said:
Believe me -- I would love to get off the soapbox about FUD -- but it seems no matter how many times you state FACT and discredit FUD, it still manages to stay around. And the misconceptions about what a workgroup is and does just never seems to go way -- Arrrghhh ;)

I would love to know what you thought the question was asking -- that suggesting a different workgroup or domain would isolate it.

I honestly don't know mate. It was early this morning when I read it. I think I thought he meant, .... I have no idea. Really.

If I had read it properly I would have seen what he was trying to do, and I would have ignored it.

Follow up: Router that supports lan to lan firewall rules, yes I know this model is EOL, but its an example of what I was talking about with lan to lan rules on a home priced router.

post-14624-1218551467.jpg

Also if your router will run dd-wrt or openwrt you can setup vlans and use iptables to deny specific traffic between the vlans, etc. Not sure if tomato can do this?

So you can accomplish what you want fairly simple with home priced network equipment to be sure. I do not believe the current web ui to dd-wrt supports lan to lan firewall rules? But can be done from the command line after a bit of reading for sure. Or I do believe you can run firewall builder on it. http://www.dd-wrt.com/wiki/index.php/Firewall_Builder which would give you a gui in building your rules.

Another option would be to run a linux distro as your router, ipcop I know allows for multiple segments and then rules between them. Any of the router distro's should be able to do something as basic as this.

What I would suggest is if your current router does not support either dd-wrt or lan to lan rules is since you would need to buy another router to use the double nat method anyway -- is purchase one that allows for lan to lan filtering, or one that supports 3rd party firmware that will allow you to do it.

thanks for that.. (just going out atm and will read your post when i return)

i just had a quick idea, which is probably very silly but thought i might ask anyway. would disabling/removing file and printer sharing for Microsoft networks in the local area connection properties help solve the problem i'm having?

thanks for that.. (just going out atm and will read your post when i return)

i just had a quick idea, which is probably very silly but thought i might ask anyway. would disabling/removing file and printer sharing for Microsoft networks in the local area connection properties help solve the problem i'm having?

On which machine? On the machine your worried about, or the other machines. If turn off file and print sharing on the machine your saying is hostile -- that does not prevent some type of infection from doing anything -- just that it would not be able to use the built in file and print sharing to do it.

But without know exactly which infection your looking to protect against.. You would need to understand its method of spreading to know if that could stop it.

Now doing it on the 3 other machines would prevent them from listing, and or anything from accessing file shares, etc.. EVEN yourself for you legit use, etc.. Its a pretty harsh fix -- and this does not mean that they would still be safe from any type of infection the other machine might pick up that uses say a rpc exploit, to compromise the other machines.

You need to isolate the friendly machines from the hostile machine. This can be done with firewalls on each of the friendly machines, or with firewall between them (the lan to lan rules example) or by putting the friendly machines behind a nat to the network the hostile machine is on, etc. etc.

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Posts

    • Hello, My thoughts on this are mixed. Microsoft has hosted malicious code in the Microsoft Update Catalog where third party device drivers are stored; I wrote about one such incident about fifteen years ago, so if there are any other old malicious drivers floating around in the catalog, this will be a good step towards preventing any infestations from reoccurring. Another thing, which surprisingly is not mentioned in Microsoft's announcement, is that this helps protect against BYOVD (Bring Your Own Vulnerable Driver) attacks, where malware either comes with or downloads an older device drivers with vulnerabilities in it that can be exploited to gain access to kernel memory. Removing all those old device drivers from the Windows Update Catalog, potentially with all sorts of undisclosed vulnerabilities in them, means an attacker can no longer leisurely count on being able to download them from Microsoft's servers--something that may go unnoticed or ignored by security analysts. This makes the adversary attack a little more noisy, since they have to either include the device driver with the rest of their initial payload or download it from a third-party site at some point prior to beginning their BYOVD attack. On the other hand, it means that people who are looking for a specific version of an older device driver for whatever legitimate reasons, like compatibility, performance or stability, may end up going to dodgy third-party sites in search of older drivers, which increases the risk of exposure to everything from nuisance advertisements and unwanted software to actual malicious code. As for me, I have keeping copies of all the device drivers, firmware updates, etc. I have downloaded over the years, some dating back to DOS and Windows 3.x era, not just for hardware I won, but popular things like unified chipset and video card drivers, just in case I ever needed it. It might seem silly to collect such a thing, but the hardware drivers, firmware updates, and documentation are just about 2 TB in size. From my perspective, it is an inexpensive form of insurance, especially given that disk space is always getting cheaper over time. Regards, Aryeh Goretsky
    • @Raze Bold it boy. (I admit, we all did it from time to time..)
    • Fan Control V227 by Razvan Serea Fan Control is a powerful and versatile portable utility that allows you to monitor, control and customize the fans of your GPU and CPU to keep your machine cool and running smoothly. Fan Control supports a wide range of devices and hardware configurations, giving you complete control over your computer's cooling system. Fan Control backend is mainly based on LibreHardwareMonitor, an open source fork of the original OpenHardwareMonitor. This means that hardware compatiblity is entirely open for anyone to contribute, and doesn't rely on a single developer who may stop caring at some point. Combined with the plugin system, Fan Control is unlocked for many generations of hardware to come. Main features Guided setup process on first launch Save, edit and load multiple profiles Change the theme and color of the application. Multiple temperature sources ( CPU, GPU, motherboard, hard drives... ) Multiple fan curve functions, including a custom graph Mix fan curves or sensor togethers (max, min, average) Low resource usage Advanced tuning with steps, start %, stop %, response time and hysteresis FanControl V227 changelog: Allow decimal with hysteresis values Radeon Pro support through ADLX Fix a bug when cancelling the graph editing dialog Update LibreHardwareMonitorLib Download: FanControl V227 | Installer ~15.0 MB (Open Source) View: Fan Control Homepage | Screenshot Get alerted to all of our Software updates on Twitter at @NeowinSoftware
    • Lol tf you are talking about. People are PAYING by using this app exclusively, just indirectly. Do you have any idea how much facebook charges for api access to WhatsApp which has become more or less a monopoly in e-commerce.
    • My kid tried, so I took her to Microcenter and showed her the differences in price as well as storage and specs. We bought a Windows machine. She loves it, and is off to college this fall with her gaming level windows laptop at the price of a Mac that came with a 512GB SSD, and half the RAM.
  • Recent Achievements

    • Contributor
      GravityDead went up a rank
      Contributor
    • Week One Done
      BlakeBringer earned a badge
      Week One Done
    • Week One Done
      Helen Shafer earned a badge
      Week One Done
    • First Post
      emptyother earned a badge
      First Post
    • Week One Done
      Crunchy6 earned a badge
      Week One Done
  • Popular Contributors

    1. 1
      +primortal
      660
    2. 2
      ATLien_0
      266
    3. 3
      Michael Scrip
      235
    4. 4
      Steven P.
      164
    5. 5
      +FloatingFatMan
      149
  • Tell a friend

    Love Neowin? Tell a friend!