Originally Posted by BenCartwright
Model 7500 DSL modem+router.
Ethernet (Cat5, Cat5e, Cat6, Cat7) surely does use security, via hardware firewalls and port forwarding and masking, etc. It's just not like WiFi security. I use WPA2 for WiFi security, which is considered pretty robust.
I'm knowledgeable about network infrastructure, but have much to learn about the newer hardware setups.
WPA2 & WiFi security doesn't have anything to do with the comment you were responding to. That simply encrypts the radio communication between the router and your wireless device. There would be no need for any similar encryption on your wired network. Hardware firewalls, port forwarding, etc, have to do with the communication between your router and the rest of the internet. Your CAT 5 and
wireless connections should be subject to the same firewall restrictions, if any, between your router and the Internet.
So with that said, there would seem to be something unusual with your setup with the information that you have provided. Either your wireless connections have been set differently against the firewall or there is actualy something else, like a bug, when using the wired CAT 5 connection. Normally you would want your wireless connections to have LESS access through the firewall than the wired ones lest one of the neighborhood kids, etc hacks your network.
If the router can be set to log access, not something that should be turned on, and you could catch the CM when it was doing a guide update, it should be pretty easy to find out what it is trying to access and what ports it's using. Or you could use something like wireshark. Someone with a little time on their hands might be able to figure out what is being sent down, and then with some local DNS changes, could redirect the CM to other guide info. (really dependant on if the protocol being used)