What setting do I change to REMOTE access the router?
Thanks
But a better method is to use a VPN back to your network instead.
Well that may be true but in the enterprise world it is all about cloud controlling devices - which is essentially the same thing. Cisco Meraki, Ubiquiti Unifi etc. is all about exposing the devices on the WAN to a central cloud administration. Taken into account how security always is top priority in this field, it seems strange that they would build their entire products up on this – if it is indeed so insecure?Concur - if anything, that might be a good reason for VPN (and there are knock-on benefits)
Exposing an Admin interface to the WAN side - these days - not recommended in the slightest - there's been too many security issues found across different Router/AP's, and the speed to fix is too long as well... if a fix is even pending at that...
As long these devices can be accessed and/or controlled by a cloud service they are all basically just as exposed as an Asus router with WAN administrator access (with https). Maybe even more since they do not have an open source community that contributes with security fixes as usually seen in firmware updates from Asus.
I see your point. It is a good security policy to prevent root access everywhere but even this does not make things secure without patching. Take Android as an example. I principle it is also encapsulated by not allowing root access to apps but still something like "Stagefright" could happen because it was not persistently implemented. Such thing happens and patching is the only solution.Yes and no...
When we look at Cloud Architectures like OpenStack, security is built in with regards to levels of trust extended inside and outside... trust me, this is stuff I do these days - working on OpenStack development in a large scale environment with many partner networks - so security is an absolute must... it cannot be patched in after the fact.
The challenge with the "big honking routers" such as what Asus, Netgear, Linksys, DLink, etc. in the consumer market is that most are actually built off a platform that has it's genesis in a GPL drop from Linksys back in the WRT54G days.
Within that drop - functionality is there - but everything basically runs as root - the web server, the various configuration scripts, add-on daemons like Samba and OpenVPN, along with uPNP and miniDLNA (and others, but these are typical). The HTTP and uPNP interfaces are common and easily exploited targets, and since there is no privilege separation, once that interface is broken, one basically has root and owns the box...
So when exposing "big honking routers" to the public internet - it is unwise at best, and foolhardy to expose interfaces without a true understanding of the risks involved.
These days - consumer routers are a primary target for many security focused groups - the blackhats looking for openings to exploit and further their objectives, and the white hats that do research and try to find the holes before the blackhat's do..
The "cloud" oriented consumer vendors need to be wary of this, as they can become a very large target, and exploits there have massive leverage if they're cracked open.
Hence my recommendation - only open up threat surfaces as a necessity, e.g. a must-have need, and consider if this is just a "want" because it's nice to have... esp. on the gateway itself - forwarding ports, then the concern is the security and stability of that application, but one must consider the Gateway as something to protect, esp. since the basic architecture is fairly insecure in the first place...
Just my thoughts...
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!