• March 29, 2024, 12:54:02 AM
  • Welcome, Guest
Please login or register.

Login with username, password and session length
Advanced search  

News:

This Forum Beta is ONLY for registered owners of D-Link products in the USA for which we have created boards at this time.

Author Topic: FTPES : how to remove SSLV3 protocol ? (because unsafe)  (Read 2391 times)

qcha

  • Level 1 Member
  • *
  • Posts: 2
FTPES : how to remove SSLV3 protocol ? (because unsafe)
« on: September 21, 2017, 11:25:31 AM »

Hi everyone,

I just finished to setup my ftpes server on my dlink 320LW.
Apparently, the NAS use an TLSv1/SSLv3 encryption protocol. Or, I saw on internet that SSLv3 is considered unsafe.

I would like to know if there is a way to force only TLSv1 encryption protocol on the NAS.

Thank you in advance for your help !  :)
Logged

FurryNutz

  • Poweruser
  •   ▲
    ▲ ▲
  • *****
  • Posts: 49923
  • D-Link Global Forum Moderator
    • Router Troubleshooting
Re: FTPES : how to remove SSLV3 protocol ? (because unsafe)
« Reply #1 on: September 21, 2017, 12:28:40 PM »

Link>Welcome!

  • What Hardware version is your DNS? Look at the sticker behind or under the device.
  • Link>What Firmware version is currently loaded? Found on the DNSs web page under status.
  • What region are you located?

There a link to this information?

Might check the user manual about this...There anything in advanced networking settings in regards to this?
Logged
Cable: 1Gb/50Mb>NetGear CM1200>DIR-882>HP 24pt Gb Switch. COVR-1202/2202/3902,DIR-2660/80,3xDGL-4500s,DIR-LX1870,857,835,827,815,890L,880L,868L,836L,810L,685,657,3x655s,645,628,601,DNR-202L,DNS-345,DCS-933L,936L,960L and 8000LH.

ivan

  • Level 8 Member
  • ***
  • Posts: 1480
Re: FTPES : how to remove SSLV3 protocol ? (because unsafe)
« Reply #2 on: September 22, 2017, 12:20:51 PM »

From what I have read the main concern is centered on security of web browsers which don't have good security at the best of times.

You are going to be using FTP and you should have a very strong password set and also limited access to your NAS.  For extra security you should have your network behind a good firewall that uses a hosts file to block suspect IP addresses and also only allow a very small subset of ports to be open to the web.
Logged