1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.

    Dismiss Notice

Chord Electronics ☆ Poly ☆ (wireless & microSD module for Mojo) ☆★►USEFUL INFO on 1st PAGE!!◄★☆

Discussion in 'Portable Source Gear' started by Matt Bartlett, Jan 5, 2017.
First
 
Back
555 556 557 558 559 560 561 562 563 564
566 567 568 569 570 571 572 573 574 575
Next
 
Last
  1. miketlse
    Which version of the firmware are you using now?
     
  2. opienor
    I am on the latest firmware.
     
  3. miketlse
    In that case, I remember someone posting something similar a couple of days ago, and I think that the solution involved changing the poly mode using the config pin. The exact solution was described in better detail in a post, but it did include the reminder that the process with the config pin has changed, so you need to cycle through the options, then select the option that you wanted.
     
    opienor likes this.
  4. opienor
    Thanks for your input. I manage to reset to factory settings through the config pin procedure, but it doesn´t seem to do anyting. My Poly´s name, all the stored wifi SSIDS and passwords and everything remain the same. I guess a factory reset should reset everything? Oh well, in a couple hours I can try configuring with ipad and GoFigure app:)
     
  5. miketlse
    Hope the app sorts out your problem.
    A small caveat is to put your Poly on charge for a couple of hours first.
    There are isolated posts being received about the recent iOS update causing issues with iphones and Mojo/Poly, but charging the Poly is reported to be a solution in this post.
    It is a very small data set at present, but something to be kept at the back of ones mind, if anyone experiences an issue tonight.
     
  6. tekkster
    That information is really designed for consumer APs where people mistakenly think that a hidden SSID ALONE is the only security required.

    ----

    IT security for me is about layering multiple security features and multiple firewalls. Hidden SSIDs is just one of them.

    So my setup is different. I have three layers of firewalls (two of which provide wireless AP capabilities), each from a different enterprise security manufacturer, combined with two 24/7 packet sniffers looking at what's going into and out of my ingress egress points (perimeter).

    Partly because I work in the IT industry, and partly because I've been hacked multiple times (e.g. bot-port scanners are still happening to me today, every day), and partly because I'm a gadget geek who likes to see what's happening on my network.

    - Secure L2 firewall between my wireless and wired networks (two different subnets, blocked between)
    - Mac Address white listing (I was happy Chord's AP portal included the network MAC add right in the web page)
    - Protocol monitoring (e.g. only approved protocols allowed, even when my computer makes a request)
    - IDS/IPS with Deep packet inspection for all HTTPS traffic. Which, these days, is 90% of my web traffic
    - Domain blacklisting
    - RIA port forwarding and IPSec vpn only for remote access (Sonicwall and Fortinet come with free licenses). SSL VPN turned off.
    - blocked access to management port

    Of course, I use most of the other basic UTM features too. Nothing too fancy, just turning on the common ones like IP reputation, DLP, antimalware, port level antivirus and antispam. Mostly just standard East-West level security. I also setup a teeny tiny simple AD within the network for server services to my NAS server, mostly consumer grade stuff, but every layer of security counts.

    I try to do security at on the server side, and switch side as well. With both a Cisco SMB200 and a Consentry 4048 (Consentry went out of business, but their switch was top notch, just weak on sales). Also an inline PAN200.

    These are just a few of my security practices.

    There are more, but the ones above are the most common ones.
     
    Last edited: Apr 8, 2018
    ZappaMan and Signal2Noise like this.
  7. Signal2Noise
    ^
    Nerd.



    :o2smile:
     
    Mython likes this.
  8. ZappaMan
    Is this for your home network?
    Be good if you could do a post somewhere - or series of posts - helping people to implement /understand the how and the whys of what you’re doing.
     
    Last edited: Apr 8, 2018
    opienor likes this.
  9. Peter Hyatt

    Here’s something worth a try.

    We did the reset w poly but only got it to take after running the battery out.

    It worked. This was the first poly w issues. After this we could get it to work but it took 30 min on average.

    The replacement has been without issue.

    I hope this works.

    PS: we did get new modem/router from our provider. Poly did not work on old one. The old network just didn’t work w poly.

    Provider did not charge for exchange.
     
    Last edited: Apr 8, 2018
  10. tekkster
    ZappaMan and Peter Hyatt like this.
  11. tekkster

    Yes, this is my home network.

    Sorry, I didn't mean to go totally off tangent from the Chord Poly thread

    I'm not a network and systems security engineer, so what I know is limited. But my clients' companies are all engineers in IT, and security. While I try to setup and maintain my home security myself, they have really helped me figure out what is happening on my network and the different things I can do to secure it. My wife and have have actually spent a fair bit of money to keep our network secure as we have been hacked before and our identities have been stolen before.
     
  12. Signal2Noise
    ^

    We just wear tinfoil hats when in the house using anything network related.

    Hope it won't affect GoFigure download. (Keeping it Poly-specific) :wink:
     
    opienor and tekkster like this.
  13. jirams
    Think I heard a reindeer ........... sure I did?

    Perhaps not.
     
  14. witega
    It’s not really about consumer vs commercial networks, although clearly some consumers have been mistaken in thinking a hidden SSID is enough without a password. It’s that hidden SSIDs lead to network traffic that makes your setup less secure. For example see here:

    https://apple.stackexchange.com/a/244181

    Apologies of this is considered too off-topic but I think it’s worth helping the community avoid bad security practices! Happy to continue the discussion elsewhere if more appropriate.
     
    Peter Hyatt and tekkster like this.
  15. opienor
    Soooo I´m sitting here drinking gin awaiting the GoFigure release. And I´m an Android user. That would be something for a psychologist...
     
First
 
Back
555 556 557 558 559 560 561 562 563 564
566 567 568 569 570 571 572 573 574 575
Next
 
Last

Share This Page