Nice to know my network is working - cameras blocked

saltwater

Getting comfortable
Joined
Oct 6, 2019
Messages
488
Reaction score
633
Location
Melbourne, Australia
I'm in the Ubiquity eco-system, have a UDM Pro, a few switches and access points. My UDM Pro was updated a few days ago and I was casually checking the settings page, and then stumbled across triggers. I'm sure the triggers screen wasn't there previously but what it shows are all my cameras trying to access the internet but failing. It gives me some comfort that my blocking rules are in fact working.

2023-03-28_19-28-55.jpg
 

Jim I.

Getting comfortable
Joined
Jul 15, 2018
Messages
227
Reaction score
609
Location
Richmond, Texas
I'm in the Ubiquity eco-system, have a UDM Pro, a few switches and access points. My UDM Pro was updated a few days ago and I was casually checking the settings page, and then stumbled across triggers. I'm sure the triggers screen wasn't there previously but what it shows are all my cameras trying to access the internet but failing. It gives me some comfort that my blocking rules are in fact working.

View attachment 158378
I noticed the same thing on my UDMSE recently. I think that feature was added in a recent update. I'm using Vlans to isolate the cameras, along with a second NIC in the Blue Iris PC. But seeing all those messages coming from the firewall log makes me think I should have set up fake default gateways when configuring the cameras. I'm thinking that would keep the traffic from even reaching the firewall.
 

SpacemanSpiff

Known around here
Joined
Apr 15, 2021
Messages
1,474
Reaction score
2,483
Location
USA
I noticed the same thing on my UDMSE recently. I think that feature was added in a recent update. I'm using Vlans to isolate the cameras, along with a second NIC in the Blue Iris PC. But seeing all those messages coming from the firewall log makes me think I should have set up fake default gateways when configuring the cameras. I'm thinking that would keep the traffic from even reaching the firewall.
If you already employ VLANs and a dual NIC BI server, you have a couple layers of isolation in place. Fake default gateways will cause unnecessary traffic, I believe you'd be better off leaving the default gateway field blank on the devices you are trying to isolate. If you wish to add another layer, consider adding a rule to your router that blocks the network (or IP range) assigned to your cameras
 

jihiggs

n3wb
Joined
Mar 19, 2021
Messages
5
Reaction score
0
Location
south dakota
my amcrest cameras do the same thing. auto check for firmware is disabled and p2p is disabled on all of them. these are aws servers. pretty shady that amcrest isnt transparent about this.
 

saltwater

Getting comfortable
Joined
Oct 6, 2019
Messages
488
Reaction score
633
Location
Melbourne, Australia
I was messing with one of my cameras, reverted the Primary & Secondary DNS (from 8.8.8.8 and 8.8.4.4) back to 0.0.0.0 and changed the gateway to 192.168.30.100 (goes nowhere) and yet the camera continued to check both 8.8.8.8 and 8.8.4.4 DNS.

As an aside, I thought I shot myself in the foot because after changing the gateway to a non-existent setting, I then couldn't login to the camera from my other network. I was stumped for about 20 min, thinking I'd have to do a factory reset. Anyway, put my computer onto the same network as the cameras and was able to login and fix things.
 
Top