wan0_dns
nvram set wan0_dns="8.8.8.8"
nvram set wan0_dnsenable_x="1"
nvram set dnsfilter_enable_x="0"
nvram commit
nvram show | grep -i "dns"
DO NOT change any settings you don't know about it, as this may cause your router to become a brick. finally, please always remember that good habit of disable the SSH after use.
The issue with telnet (and ftp for that matter) is that it sends all data in plain text over the wire, including user names and passwords.No disrepect intended but do you really disable SSH after each use? Do you not use it regularly? I know that was something said a lot about Telnet in the past but is it still necessary today when using SSH? Again, no disrespect intended and I am just curious what others are doing these days.
Hi, I have been regarding at vars that are affected when changing the dns in the web UI.You can changes that by using the nvram command.
This variable is the first DNS of WAN:
Set it like:Code:wan0_dns
Don't forget to enable that DNS for WAN:Code:nvram set wan0_dns="8.8.8.8"
If you enable the DNS filter, it may be invalid, you can use this one to disable the DNS filter:Code:nvram set wan0_dnsenable_x="1"
And when any nvram change is completed, you need enter this command to save your changes:Code:nvram set dnsfilter_enable_x="0"
There are a lot of DNS variable, if you want to know more please enter it in SSH:Code:nvram commit
Code:nvram show | grep -i "dns"
DO NOT change any settings you don't know about it, as this may cause your router to become a brick. finally, please always remember that good habit of disable the SSH after use.
wan0_dns1_x=8.8.8.8
wan0_dns2_x=8.8.4.4
wan0_dns=8.8.8.8 8.8.4.4
wan0_dnsenable_x=0
wan0_xdns=8.8.8.8 8.8.4.4
wan1_dns1_x=
wan1_dns2_x=
wan1_dns=
wan1_dnsenable_x=0
wan_dns1_x=8.8.8.8
wan_dns2_x=8.8.4.4
wan_dns=8.8.8.8 8.8.4.4
wan_dnsenable_x=0
The dnsenable_x settings reflect whether you’re enabling WAN DHCP DNS servers or not. If you select No on the WAN page, this setting will be 0.I can see that wan0_* and wan_* are affected. I have disabled dns filtering and the interested thing is that all *enable* are always disabled (0), it's correct? I suppose that yes, because it works. But make no sense...
It's normal to that it change wan0_* and wan_* vars?
As for SSH I'd say that's probably one of the most secure components on the router, more so than the web interface, media server, etc.
I can see that wan0_* and wan_* are affected.
It should be enabled. I don’t know if they recently changed the enabled variable or used new variables.I have disabled dns filtering and the interested thing is that all *enable* are always disabled (0),
I agree that nothing is the safest, and should be kept closed if not used, as this can reduce the attack surface.Note I'm commenting on only this part of what you've written. As well as the LAN only part.
Telnet - released as a standard in 1968. Secure enough for IBM to use.
Telnet - STILL being updated by IETF proposals. Now it's called "Virtual Telnet". I wouldn't even think of using it. Except maybe if it's in my LAN only... No, I wouldn't.
SSH - released as a standard in 2006.
SSH - Most recently updated in 2018. By including the use of SHA 256/512 RSA KEYS.
2066 - SSTVMS (super secure tunneling virtual machine shell). It's so secure I don't need to worry about using it. It's not like SSH used to be... I can't believe people even used it...
Pardon me if it sounds sarcastic. It's not meant to be at all. It's just the way these things go.
No, the wan_ variable is used by the gui. The gui then reads/writes to either wan0_ or wan1_ depending on which one you are configuring. That's how the same page can be used to configure either wan in a dual wan config.The WAN and WAN0 may be a duplicate variable caused by a variable added to nvram at different times, they do not want to remove it as perhaps to ensure backward compatibility.
Yesterday I was reading an article regarding using a Raspberry Pi combined with a reverse proxy (such as what CloudFlare provides) to host a website. It's all fully locked down in the setup instructions, in the detailed graphics used to visually explain how it's setup, etc. However, the author uses SSH to log in to the Pi to do most of the setup. It's a good, explanatory article. Expect for the fact that no where does it instruct the reader/s to a) use the strongest SSH key possible (password encrypted or not, depending on the capability of the system being logged into; 4096bit RSA / 512bit Elliptic Curve key / SHA512 hashed password etc (despite the fact that it takes a single command or any one of multiple online tools to reverse any hash)). And the author never states to even use key based auth. And they state that they access the remotely via SSH over port 22. Remotely. I wanted to ask the domain name, but there was nowhere to leave comments.I agree that nothing is the safest, and should be kept closed if not used, as this can reduce the attack surface.
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!