NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
https
7 TopicsInstalling third party SSL certificate?
I searched far (Google) and wide (NETGEAR forum), but could not find the answer to this question for our beloved R7000. Is there any way to install a proper PKI-chained SSL certificate from a third party like Comodo or StartCom SSL? Currently, when enabling HTTPS access for remote management, my/all browsers get angry because the R7000 is using a self-signed certificate: I have a free StartCom SSL cert all generated and ready to install. The problem is, I cannot find a way to share this certificate, intermediate cert, and private key, with my router. Thanks! - DaveSolved14KViews0likes5CommentsBlocking HTTPS sites, truth vs lies.
Let me be clear and say that my knowledge is limited, no one knows everything about computers. I am fairly new, I have only been programming since the 1980's. Yes, I did look and yes, I see that the same issue has been brought up many times. I also keep seeing the same lame excuse that, quite frankly seams like a lie. I am going to call BS on this, ask the question again, and see if we can't get somewhere with it. The lie: "HTTPS pages are encrypted and the router can't see the content, hence, it can't block access to HTTPS pages." This same excuse keeps being used. This tired statement starts out true, about being encrypted and not seeing page content. It is also true that the ability to block the page, based on a scan of the page content, could not function. However; that claim fails to be true when it is used as an excuse for not blocking a domain name. The truth: The URL of an encrypted page is NOT encrypted or it couldn't be routed to its destination. Currently, there is no reason this router shouldn't be able to block HTTPS pages by applying the filter to the domain name. I understand that a URL mask can be applied server-side and HTTPS encryption used to hide the true destination. Yes, I know there are work-arounds for crafty programmers/hackers. That said, applying the filters to the known URL would allow a significantly effective block for many things. When we are looking at router level filters, we are not talking about national defense or stopping a truly determined expert hacker. Given a little opportunity, I doubt 1 out of 10,000 people would be able to keep a novice hacker out of their personal computer. That said, it would be most helpful to many of us if Netgear would simply apply the filters, we have already input, to the URL and stop the average person from simply typing https://facebook.com and getting what they want when we told you to block facebook.com. Ok so the next suggestion at this point might be to use the Genie app with the parental controls. That simply isn't an option. For reasons I will rant about in a future post, the Genie app is itself a security breach and not viable in its current design. So, no more lies please, even if you can't filter HTTPS pages by content scan, at least implement the filters on the URL so we can effectively block most of the things we don't want getting through. I do feel strongly about this and will not apologize for my tone. I am not a networking expert. If there is something I am missing, will someone PLEASE explain it to me because I have yet to read an explanation here that made any sence. Thank you for your consideration.13KViews5likes7CommentsHow to run Koken on https?
What is a good way to make the Koken content management system run on https, without browsers complaining about the self-signed certificate? I experimented with creating a self-signed certificate and adding a virtual host to /apps/koken/http.conf (based on tutorials, like https://www.digitalocean.com/community/tutorials/how-to-create-a-ssl-certificate-on-apache-for-debian-7 ). This will make koken run on https. However, browsers will complain about the certificate not being trusted. Guess I need a certificate / key issued by a Certificate Authority? What is a good CA? Does anyone have experience with using a free CA? What steps would I have to take to get the key/certificate?SolvedOwnCloud 9.1 WebDAV, Permissions and HTTP Issue
Hey everyone, I installed lastest OwnCloud 9.1 on my Ready NAS (RN214,FW6.5.1). Not the Addon, but normally on the webserver using MySQL. So only apps installed are PHP, MySQL and phpMyAdmin. Port 80 is forwarded, it works. But I read 3 security notifications in OwnCloud administration. And I can't find anyting to help me. 1) Your web server is not yet set up properly to allow file synchronization because the WebDAV interface seems to be broken. I set WebDAV enabled on folder setting in Share admin page, but still... Should I configure someting else? 2) Your data directory and your files are probably accessible from the Internet. The .htaccess file is not working. We strongly suggest that you configure your web server in a way that the data directory is no longer accessible or you move the data directory outside the web server document root. Unfortunatelly I have no idea how to do that. 3) You are accessing this site via HTTP. We strongly suggest you configure your server to require using HTTPS instead as described in our security tips. I'd like to. I followed security tips, but I did't got what exactly I have to do. HTTPS in ReadyNAS Services is enabled, but it takes no effect. I'll be glad for any advice and sorry for my poor english Thank you MikeXR500 internet time setup and SSH access
Hi experts. Couple of questions for you. I recently bought the XR500 as I got seduced by the DumaOS screens. I previsouly had a Netgear R7000 which I had flashed with DD-WRT Kongo. Liked it a lot but to be honnest the idea of having fancy bandwidth graphs pushed me to the XR500. While the interface is really neat, there are number of features I miss from DD-WRT, and some other upgrades I am hoping for (more icons for the devices e.g. switches, the ability to disconnect a device from the network as the blocking feature works only if the device tries to connect...). I am running version V2.2.1.10 which I believe is the latest one. To the questions: - I must be a little tired or something... how do we change the timezone ? Programming the wifi ON/OFF on specific hours would be much easier if the router was set on my timezone... - is SSH connection blocked ? putty tells me "connection refused"? - I seem to be able to access the interface thru HTTP or HTTPS... how do I limit to HTTPS? thanks much! Arnaud5.2KViews0likes4CommentsM7100-24X - No support for TLS 1.2 on management connections?
New poster here so hi everyone. :smileyhappy: Just wanted run a question by the experts here. My company has just aquired a wildcard certificate from Digicert which we're planning to use for HTTPS management connections to each of our network devices and various servers. After some trial and error, I managed to get the certificate installed on one of our M7100-24X switches and I can make a properly secured connection to its web console. However, I noticed in the HTTPS settings and in the subsequent connection information that the most up-to-date cipher suite it can use is TLS 1.0. As we are in the process of making our organisation PCI DSS compliant, I would like to be able to use TLS 1.2. Have any of you got experience in this area? Does anyone know whether it is possible to enable TLS 1.2 on Netgear switches? Pehaps Netgear are aware that this needs addressing and are working on it for a future firmware release. I've opened a support ticket but any advice from the community would be helpful in the meantime. Thanks.3.2KViews0likes3Comments