Recent content by Derelict

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

  1. D

    Actiontec MoCA 2.0 ECB6000 Encryption

    Yes. http://192.168.144.20/ is prompting for authentication via standard HTTP browser fields. None of the standards (admin/admin, admin/password, etc.) I have tried work. It is also listening on port 23. All I get in response is a '>'. Seems that no matter what I enter there the unit...
  2. D

    Actiontec MoCA 2.0 ECB6000 Encryption

    Thanks a lot for posting. I did find a web interface on 192.168.144.20 (Should have nmap'ed it before. Derp) I don't know the authentication credentials and none of the standards have worked for me yet. Your information is hopeful enough for me to hang on to these. I called actiontec level 1...
  3. D

    Actiontec MoCA 2.0 ECB6000 Encryption

    Things that go out on the WAN, sure. I'm talking about the LAN, which is the realm of the MoCA technology, and the subject at hand.
  4. D

    Actiontec MoCA 2.0 ECB6000 Encryption

    Why are you so willing to defend the obvious deficiency in this Actiontec product? WAN is WAN. Yes, it's either in a VPN, protected with SSL, or out on the public internet for all to see. LAN is LAN. I don't have my LAN hanging out in my PoE on the side of my house - unless I use this...
  5. D

    Actiontec MoCA 2.0 ECB6000 Encryption

    I would argue that even with the low-pass filter, your MoCA traffic would still be readable from the outside. The signal is still there, just attenuated. It is better - for sure, and might require special equipment to receive, but absent strong encryption is likely still readable.
  6. D

    Actiontec MoCA 2.0 ECB6000 Encryption

    I don't have an ethernet cable off my switch hanging out the side of my house in front of the gate in a box secured by a simple screw. I am not talking about people inside my house. I'm talking about outside. Rogue AP? They'd have to plug in - see above. You are not going to convince me that...
  7. D

    Actiontec MoCA 2.0 ECB6000 Encryption

    All my runs are home-run to the PoE. That's pretty typical for coax. There is a PoE filter on the main feed from the cable company into the 6-way splitter. That prevents the signal from bleeding back into the cable network but doesn't prevent someone from putting a bridge on the splitter at...
  8. D

    Actiontec MoCA 2.0 ECB6000 Encryption

    Yes, I have an LPF. Still doesn't stop someone from putting a bridge at the PoE and hopping on my network. As it is it will not join my existing network due to lack of an encryption key. Pretty disappointing. I'm surprised they can be certified MoCA 2.0 without implementing AES.
  9. D

    MoCA 2.0 Actiontech ECB6000

    MacBook Pro i5 <-> ECB6000 <- 3-foot coax -> ECB6000 <-> Gig Switch <-> em0 pfSense 2.2.4 Starts dropping frames at about 540Mbit/s unidirectional and about 260Mbit/s bi-directional [ 4] local 172.29.99.1 port 5001 connected with 172.29.99.221 port 54357 [ 4] 0.0-10.0 sec 646 MBytes 542...
  10. D

    Actiontec MoCA 2.0 ECB6000 Encryption

    Just got a couple of these to replace my D-Link DXN-220 MoCA 1.1 adapters. With no configuration page how is one supposed to set the network encryption password? Without it what's stopping someone from connecting another bridge at the PoE and hopping on my network?
Top