I have a problem that I hope is easy for you guys to help me with.

At work we have 4 computers that currently are not connected to the internet, only to a local network for our point of sale system. Our debit machines are connected to the PoS computers by RJ45 to serial cables and the debit terminals are connected through an unmanaged switch to our modem to access the internet. Our debit processing company is forcing us to change terminals and these new ones take ethernet in and send it to the computers to communicate through TCP/IP instead of serial. That will force the PoS computers to have access to the internet. We would rather they didn’t have access to the net. I called our ISP today to see if MAC address filtering was a possibility on our modem and it is not. So I am looking for a simple solution to keep the NIC of each of the computers functional but prevent them from accessing the internet.

Would simply upgrading the switch they are on to a managed one or a router, be all I need to do so I can set up a MAC filter? If so any suggestions on one would be appreciated. Is it even possible for wired connections? If not any help would be greatly appreciated. Thanks in advance!

  • e60deluxe@alien.topB
    link
    fedilink
    English
    arrow-up
    2
    ·
    1 year ago

    many options, here are two:

    1. you can set manual IPs on the terminals and simply don’t set a default gateway.

    2. you can use literally any proper, business router and create the required access rules.

    • sanbon909@alien.topOPB
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 year ago

      I have read about your first suggestion. This sounds simple enough but I was worried that it would break the TCP/IP connection between the computer and the debit terminal. I am guessing it won’t??

  • Born-Basis7489@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    You can configure a non existent proxy server on the pos systems and they will not be able to access the internet only local devices .

  • News8000@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    Assign a static IP address the nic at each PoS computer with a bogus gateway ip address and no DNS server entry.

    That computer won’t find the internet but still will communicate on the local lan.

    Then add hostname/address pairs in its HOSTS file as needed.

  • Supergrunged@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    Throw in a Dell Sonic Wall, and make the POS company happy. They’re the industry standard for a reason, where I wouldn’t use a consumer based product for this instance, due to the security issues with many of them. They want a SECURE firewall in front of those terminals, and it keeps you in compliance with the latest rules.

    Reading what you have, your current system is not in compliance, with the debit machines accessing the internet with NO FIREWALL. The fines are not cheap, if something happens.

  • smythluke@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    I’m not sure I understand the need/concern here, you’re jumping straight to the solution you want, not necessarily need.

    What form factor are the POS terminals? iPads, Windows, custom? By default they won’t allow incoming connections anyway. If you’ve got them locked down to a kiosk mode so they only run the POS software and users can’t play with any settings then they’re only going to reach out to legit destinations.

    You also need to ensure the terminals are kept up to date, aggressively patch them.

    Most routers now have a guest network mode. The simplest network protection for you right now is probably to put your terminals on the main network and everyone else uses the guest network or vice versa.

    • e60deluxe@alien.topB
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      nah you arent understanding what he asked for.

      old configuration:

      -POS terminals on a local non internet connected network.

      -Debt machines on a seperate network that is connected to the internet

      -Debt machines connected to POS terminals via serial cable.

      New Setup:

      -Debt machines will communicate with POS terminals through the TCP/IP network.

      -therefore, the POS machines will theoretically now have network access to the internet.

      • smythluke@alien.topB
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 year ago

        Yeah I got that. I don’t see the issue though. The previous connection could still be exploited, it’s not like the serial cable stops comms.

        I don’t see the issue with the POS terminals having access to the internet. It’s not going to allow inbound connections and the outbound connections will make it much easier to keep them up to date.

        Unless I’m missing something here it sounds like they’re trying to make their network unnecessarily complex for no security gain.

        • e60deluxe@alien.topB
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 year ago

          you are 100% correct that his systems arent air gapped before and they arent air gapped going forward.

          that doesnt mean that there is no point doing anything in the middle.

          some people are very paranoid about having financial data on any system that can access the internet. i was treating this as besides the point of the question OP asked and was keeping status quo. it is possible they are running outdated software that cannot have security vulnerabilities patched and that a decision somewhere has been made to keep these devices off of direct internet access.

          there is nothing wrong with that.

          • smythluke@alien.topB
            link
            fedilink
            English
            arrow-up
            1
            ·
            1 year ago

            Absolutely agree. If he’s running POSs with outdated software then keeping it away from the internet is sensible. I think we’re all making assumptions and we need more info on the devices, software, and the other use cases for the network before we can give any concrete advice.