What's new

Deleted content

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

(I have added the input rejection rule on <netcore_backdoor_port>)
That's pointless because a) as pointed out way back in post #2 your router is not susceptible to that attack, b) there is already a drop all rule that would match that anyway, and c) AiProtection was already blocking those in the kernel. But if it makes you feel better...
 
picard.gif
 
I registered for and used the DDNS at asuscomm.com when I used AiCloud, AiDisk, etc. with my then new Asus router. I also had my security cams accessible from the WAN.
But there were many dubious people trying to access my network via my IP, so I disabled WAN access.
I tested with GRC ShieldsUp, and the IP looks secure now.
My DDNS entry still resolves to my current WAN IP address, but AiProtection is not reporting exploit attempts like it used to.

So I'd say the Asus DDNS lookup was not the security loophole; leaving my IP address accessible from the WAN was.

Sent using Tapatalk
 

Latest threads

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top