No, my Ubiquiti USG is not a real firewall, but for my needs at the moment it's...acceptable. My home network is primarily Blue Iris, Roku's and various IoT devices. No 'important' devices accept my occasional laptop and phone. I'm using Andy's Dahua cameras, latest BI software, static IP from ISP, HP fully managed Procurve switches. I enabled Global Threat Management on the USG and have been monitoring the events it's picked up.
VLAN for BI is my next project however I am getting the following threat detection alerts from the Unifi system and thought the brain trust could offer something. They are all pointing to my BI server, using the BI app for outside the house intrawebs viewing, a static IP from my cable ISP on a business account, and UI3 to serve several all-in-one computers as stand alone BI monitors. My other half is not computer literate so it MUST be simple otherwise I'll be getting grief. All. Day. Long.
While I am an IT guy for the past 20 years, I'm more networking/hardware than security.
I trimmed the info slightly for simplicity:
ET EXPLOIT Wireless IP Camera (P2) WIFICAM Remote Code Execution
Attempted Administrator Privilege Gain
Exploit
Source: 198.98.52.213 : 35920
Destination: 192.168.xxx.xxx : 81 (Static internal BI IP)
Protocol: http
ET DROP Dshield Block Listed Source group 1
Attack
DShield
Source: 167.248.133.17 : 28979
Destination: 192.168.xxx.xxx : 81
ET TOR Known Tor Exit Node Traffic group 56
Attack
TOR
Source185.220.101.48 : 32390
Destination: 192.168.xxx.xxx : 81
VLAN for BI is my next project however I am getting the following threat detection alerts from the Unifi system and thought the brain trust could offer something. They are all pointing to my BI server, using the BI app for outside the house intrawebs viewing, a static IP from my cable ISP on a business account, and UI3 to serve several all-in-one computers as stand alone BI monitors. My other half is not computer literate so it MUST be simple otherwise I'll be getting grief. All. Day. Long.
While I am an IT guy for the past 20 years, I'm more networking/hardware than security.
I trimmed the info slightly for simplicity:
ET EXPLOIT Wireless IP Camera (P2) WIFICAM Remote Code Execution
Attempted Administrator Privilege Gain
Exploit
Source: 198.98.52.213 : 35920
Destination: 192.168.xxx.xxx : 81 (Static internal BI IP)
Protocol: http
ET DROP Dshield Block Listed Source group 1
Attack
DShield
Source: 167.248.133.17 : 28979
Destination: 192.168.xxx.xxx : 81
ET TOR Known Tor Exit Node Traffic group 56
Attack
TOR
Source185.220.101.48 : 32390
Destination: 192.168.xxx.xxx : 81