NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
M4RM
Nov 14, 2018Aspirant
Can not connect to ReadyNAS via Browser(s) SSL CIPHER errors
Please Advise, I can not connect to ReadyNAS units from browsers, SSL error.
This started this morning, as I could connect fine yesterday.
Work arounds tried:
When I put in http adress, co...
- Nov 25, 2018
I had the exact same issue as you have and tried similar things. Worth checking your antivirus. I've got Bitdefender, and it is causing the problem.
Under online threat prevention, there is a toggle for 'Encrypted Web Scan' flick that off and I was able to access as normal. I tried adding the address as an exception in Bitdefender but that didn't work.
Either way it would be nice if Netgear recognised that when Antivirus and browsers are all considering their remote access solution is unsafe it is probably a hint that they need to update things.
M4RM
Nov 20, 2018Aspirant
At the time, I found that I could connect via phone browser, and another computer (with same browser version) so everything was pointing at my computer. As I mentioned before I cleared cache, flushed DNS, etc all to no avail.
When I received your comment, I went back and tried again, and connected without any issue.
The only changes I see is a .net update on 11/14 (KB4459942) (I do not believe this to be the resolution as it was still not working on this date), and two microsoft windows security updates on Thursday 11/15 (KB4467107 and KB4459934). I did not make any other changes to get this working again.
TikTok90
Nov 25, 2018Star
I had the exact same issue as you have and tried similar things. Worth checking your antivirus. I've got Bitdefender, and it is causing the problem.
Under online threat prevention, there is a toggle for 'Encrypted Web Scan' flick that off and I was able to access as normal. I tried adding the address as an exception in Bitdefender but that didn't work.
Either way it would be nice if Netgear recognised that when Antivirus and browsers are all considering their remote access solution is unsafe it is probably a hint that they need to update things.
- Padg_UKNov 29, 2018Initiate
Many thanks for your help re Bitdefender and accessing my NAS drive.
Much appreciated.
- kenwneillDec 07, 2018Initiate
Thanks for the solution via Bitdefender. Worked for me after days of headscratching!
- schumakuDec 07, 2018Guru - Experienced User
TikTok90 wrote:
Either way it would be nice if Netgear recognised that when Antivirus and browsers are all considering their remote access solution is unsafe it is probably a hint that they need to update things.
Impossible. This has not much to do with the browsers or Antivirus - much more these are randomly applied security policies some Internet "Security" products, without real documentation, and without considering simple solutions to keep compliance for legacy devices.
- StephenBDec 08, 2018Guru - Experienced User
schumaku wrote:
Impossible. This has not much to do with the browsers or Antivirus - much more these are randomly applied security policies some Internet "Security" products, without real documentation, and without considering simple solutions to keep compliance for legacy devices.I agree. Though perhaps providing a way to disable https in the OS-6 ReadyNAS might be good idea. The self-cert issues are getting more annoying over time, and https probably isn't needed for most home users.
- SandsharkDec 08, 2018Sensei - Experienced User
Removing or commenting out these lines in /etc/frontview/apache/http-redirect.conf allows HTTP access to the admin page.
RewriteRule ^/admin/(.*)$ https://%{SERVER_NAME}/admin/$1 [R,L] RewriteRule ^/admin$ https://%{SERVER_NAME}/admin
Of course, doing this removes encryption from the commands sent to the admin page, including user name and password. So it should only be done in cases where there is no access via the internet and all parties on the intranet are trusted.
Any additional consequences to removing these re-directs? .
They are also in /etc/default/config/etc/frontview/apache/http-redirect.conf, and I'm not sure what triggers copying the defaults back to the active directory. OS re-install, I suspect, but anything else?
I'm sure it would have to be re-done after an OS update unless there was a script that did it every time the system booted.
- IgorParisJan 06, 2019Initiate
Great answer! Worked like a charm for me.
Thank you TikTok90!
- SandsharkJan 07, 2019Sensei - Experienced User
In OS4.2.28 (which is what's on my virtual machine), the rewrite rules that control this are in /etc/frontview/apache/Virtual.conf. Tested it on my VM and it works. Typically, 4.1.x and 4.2.x follow similar structures, so I expect that's the same location for the SPARC units. It's likely in a similar location on OS 5.x.
Related Content
NETGEAR Academy

Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology!
Join Us!