D-Link Wireless Routers for Home and Small Business > COVR-3902-US

Beefing up Wireless security

<< < (4/6) > >>

FurryNutz:
You could if you wanted too. Set the systemlog to email you on any notifications to see if any WAN IP addresses show up. IF the logs show attempted WAN side IP addresses, maybe then you can set a rule to block that IP address then.

I've never seen or had any issues from the WAN side on any of my D-Link routers. Been safe and secure using router default settings and configuring SSID and PWs. I do keep FW up to date unless I'm testing something out.  ::)

Gattsu:
Any inbound traffic from the WAN side are blocked by default. The only way in is through remote management if enabled, but that is protected with a password.

The other way they can get in, is through the LAN ports but that secured in your house. Just make sure the doors and windows are locked. =)

The third way is wireless but it is already hidden and protected with WPA2 Authentication.

So far no known vulnerabilities with COVR system.

02ebz06:

--- Quote from: FurryNutz on September 14, 2017, 11:23:41 AM ---You could if you wanted too. Set the systemlog to email you on any notifications to see if any WAN IP addresses show up. IF the logs show attempted WAN side IP addresses, maybe then you can set a rule to block that IP address then.

I've never seen or had any issues from the WAN side on any of my D-Link routers. Been safe and secure using router default settings and configuring SSID and PWs. I do keep FW up to date unless I'm testing something out.  ::)

--- End quote ---

Right now, I have it going to my Syslog server.  Guess I could write a script to scan it.

Speaking of firmware...

Router says
Current Firmware Version:    1.00, Fri 02 Jun 2017
Current Firmware Date:      2017-06-02 05:20:00

Web site (and in another thread here, says latest is 1.00B19 / 1.00B11 for Ext) with a date of Aug 17, 2017
Since firmware dates are different, I told the router to check for new firmware.
Said I was running the latest.

So, is it newer or not is the question...

=====================================================================================================================================================================


--- Quote from: Gattsu on September 14, 2017, 11:56:23 AM ---Any inbound traffic from the WAN side are blocked by default. The only way in is through remote management if enabled, but that is protected with a password.

The other way they can get in, is through the LAN ports but that secured in your house. Just make sure the doors and windows are locked. =)

The third way is wireless but it is already hidden and protected with WPA2 Authentication.

So far no known vulnerabilities with COVR system.

--- End quote ---

Good to know, thanks

FurryNutz:
You can manually download the latest from the web site in case it hasn't been posted to the update server...

GreenBay42:
It should be the same firmware (shipping). 

You can see the exact version on the router - 192.168.0.1/version.txt or dlinkrouter.local./version.txt

Navigation

[0] Message Index

[#] Next page

[*] Previous page

Go to full version