Maybe I'm misunderstanding something. If you installed a POE filter inside your home where the cable comes in, all of your MoCA traffic will stay inside your home. To get another MoCA adapter to talk to your adapters, someone would have to place it inside your home, on the same side of the filter as your adapters. If they put an adapter outside your home (and obviously on the other side of the filter), your adapters wouldn't communicate with it or even see it.Yes, I have an LPF. Still doesn't stop someone from putting a bridge at the PoE and hopping on my network.
As it is it will not join my existing network due to lack of an encryption key.
Pretty disappointing. I'm surprised they can be certified MoCA 2.0 without implementing AES.
All my runs are home-run to the PoE. That's pretty typical for coax. There is a PoE filter on the main feed from the cable company into the 6-way splitter. That prevents the signal from bleeding back into the cable network but doesn't prevent someone from putting a bridge on the splitter at the PoE and being on my LAN.
I was not intending to give up encryption to go from MoCA 1.1 to MoCA 2.0.
Okay, now I see the difference. What you describe isn't typical for my area (unless they've changed things since my house was built). In this area TWC brings one cable into the house and then splits it to feed the locations inside the house. All the cables in the house go to the place (typically the basement) where the serving cable comes into the house, and they're attached with a splitter there. A POE filter can then be placed on the serving cable before it attaches to the splitter, and no MoCA traffic can leave the house.All my runs are home-run to the PoE. That's pretty typical for coax. There is a PoE filter on the main feed from the cable company into the 6-way splitter. That prevents the signal from bleeding back into the cable network but doesn't prevent someone from putting a bridge on the splitter at the PoE and being on my LAN.
I was not intending to give up encryption to go from MoCA 1.1 to MoCA 2.0.
Okay, now I see the difference. What you describe isn't typical for my area (unless they've changed things since my house was built). In this area TWC brings one cable into the house and then splits it to feed the locations inside the house. All the cable feeds in the house go to the place (typically the basement) where the serving cable comes into the house, and they're attached with a splitter there. A POE filter can then be placed on the serving cable before it attaches to the splitter, and no MoCA traffic can leave the house.
Well for your sake I hope you are running a VPN with strong encryption on your router so all data coming to and leaving your home is encrypted. If not someone can tap into your data stream on your drop, in the neighborhood at the node, or at your ISP and read everything you are sending and receiving. Also be sure to select a country, for the far point of your VPN connection, where they have strong laws protecting data privacy.I would argue that even with the low-pass filter, your MoCA traffic would still be readable from the outside. The signal is still there, just attenuated.
It is better - for sure, and might require special equipment to receive, but absent strong encryption is likely still readable.
Well for your sake I hope you are running a VPN with strong encryption on your router so all data coming to and leaving your home is encrypted. If not someone can tap into your data stream on your drop, in the neighborhood at the node, or at your ISP and read everything you are sending and receiving. Also be sure to select a country, for the far point of your VPN connection, where they have strong laws protecting data privacy.
Having encryption on your POE LAN connections doesn't give you any protection once your data moves onto the WWW.
Install the filter inside your home and protect your demarc with a metal cabinet with a good padlock and call it good.
Well for your sake I hope you are running a VPN with strong encryption on your router so all data coming to and leaving your home is encrypted. If not someone can tap into your data stream on your drop, in the neighborhood at the node, or at your ISP and read everything you are sending and receiving. Also be sure to select a country, for the far point of your VPN connection, where they have strong laws protecting data privacy.
FWIW - strong encryption or not - at some point, things need to get back into the clear...
At the end of the day - if you're worried about privacy, and using VPN - big data networks are tapped, and that traffic is going to be tagged, and then... it's compute resources, and TLA's (and 4LA's) have the resources..
just saying...
see post #11 here. No filter needed.I really don't see the point in the encryption. You can easily put the filter at the point of entry.
I don't know if you still have the ECB6000's, but in the thread about the ECB6200 it was discovered that the configuration page is at 192.168.144.30, and it includes the ability to turn on encryption. However, the ability to turn on encryption (called MOCA Privacy on the configuration page) is only available after doing a firmware update to the ECB6200, so you might want to contact Actiontec and see if there's an update for the ECB6000 as well.Just got a couple of these to replace my D-Link DXN-220 MoCA 1.1 adapters.
With no configuration page how is one supposed to set the network encryption password?
Without it what's stopping someone from connecting another bridge at the PoE and hopping on my network?
The firmware update for the ECB6200 was obtained by another poster in the thread linked above. He had submitted a problem report to Actiontec and they emailed him the update, so either the rep you spoke to isn't aware that the firmware update exists, or they aren't ready to make it generally available. It may be the latter because I noticed they haven't posted the update on their website either.Thanks a lot for posting. I did find a web interface on 192.168.144.20 (Should have nmap'ed it before. Derp) I don't know the authentication credentials and none of the standards have worked for me yet. You information is hopeful enough for me to hang on to these.
I called actiontec level 1 support and she said there are no firmware updates available for the ECB6000 or ECB6200. That conflicts with your information. It's late and I'll revisit later.
Thanks again.
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!