Wireless

 View Only
last person joined: yesterday 

Ask questions and share experiences with Mist APs, Marvis, and all things wireless and Wi-Fi.

IoT Device Security: Risks & Mitigation Strategies | Part 3 of 3: Bonus Content

  • 1.  IoT Device Security: Risks & Mitigation Strategies | Part 3 of 3: Bonus Content

    Posted 29 days ago

    Hello engineers!

    Why did the DNS server go to therapy? It had too many unresolved issues! 😆

    In the last video of our IoT Security series, we’ll dive into setting up Pi-hole on a Raspberry Pi Zero W for customized DNS filtering tailored to IoT security. With this approach, you’ll be able to whitelist trusted IoT devices on your network while leveraging regex-based filtering—which means far less effort spent managing lists and rules!

    Here’s What We’ll Cover in Part 3:

    1. Pi-hole Setup from Scratch – I’ll guide you through each step of setting up Pi-hole on a Raspberry Pi, covering the installation and initial configuration.
    2. Essential Commands for Maintenance – Learn key commands to keep Pi-hole running smoothly and securely.

    Why Pi-hole?

    Pi-hole’s regex-based DNS filtering simplifies management by letting you create flexible rules that automatically cover a broad range of domains or addresses. This approach not only provides precise control over network access but also minimizes administrative overhead, giving you a low-maintenance solution for IoT security.

    By the end of this video, you’ll have a fully functional Pi-hole setup ready to safeguard your IoT network. 

    Video screenshot
    Video screenshot

    Ready to simplify your network security management? Check out the final video in our series and take control of your IoT environment!

    #cybermaxlab

    #Internet

    #Mist



    ------------------------------
    Maxim Tveritnev
    Senior Resident Engineer
    Juniper Networks
    JNCIEx4
    http://www.youtube.com/@CyberMaxLab
    ------------------------------