Buffalo Forums

Products => Storage => Topic started by: Steerpike58 on November 10, 2016, 09:51:12 AM

Title: Restricting admin site access - seems wide open
Post by: Steerpike58 on November 10, 2016, 09:51:12 AM
I'm new to Buffalo, and about to deploy a solution to a client involving multiple Buffalo NAS devices. They were very happy with their existing Buffalo NAS and insisted I stick with the brand, so here we are! I just bought a couple of the same devices for myself to play with.

So far, I've set up the NAS (Buffalo LS410D) on the network and it's performing fine.

My first question / observation is - I can access the admin interface using simple http to port 80 on the device's address - ie, 'http://192.168.10.20'.   On this page, without ANY authentication (page is showing 'Nog Logged In'), I can choose 'restart'. Thus, anyone in the organization who knows the IP address can restart the device, which seems risky to me. Further, I planned to expose the admin interface to the internet, at least during setup, so I could remotely administer it, but having that restart action exposed at the 'not logged in' level really worries me.   So - is there a way to remove 'restart' from the main, un-authenticated web site?  And if not, is there some other way to 'protect' the device?  I just don't want my users being able to casually browse to that location and have that ability.

Second - when I try to do any configuration on the device - eg, by clicking on 'Advanced Settings', I'm prompted for the admin password (thankfully!). I see also that there's an option there for 'secure connection', and it puts me on an encrypted connection (https://....). Is there a way to disable the 'normal' connection entirely (port 80) and only allow encrypted connection?

Thanks!
Title: Re: Restricting admin site access - seems wide open
Post by: Texturtle on November 10, 2016, 11:33:36 AM
There is no way to restrict what shows up on the page, but if you actually attempt to restart the unit it should ask for a password.
Title: Re: Restricting admin site access - seems wide open
Post by: Steerpike58 on November 10, 2016, 12:47:58 PM
Perfect - thanks! I guess I didn't catch that.

so - any answer to the second question - is there any way to disable port 80 / unencrypted access altogether, thus requiring the use of SSL?
Title: Re: Restricting admin site access - seems wide open
Post by: Texturtle on November 10, 2016, 04:08:16 PM
No, there isn't I'm afraid. I could talk to developers but we don't get a lot of requests on this so it is unlikely to become a priority, especially on the LinkStation series as those units are designed as consumer systems, not really business oriented.
Browser ID: smf (is_webkit)
Templates: 1: Printpage (default).
Sub templates: 4: init, print_above, main, print_below.
Language files: 1: index+Modifications.english (default).
Style sheets: 0: .
Hooks called: 60 (show)
Files included: 27 - 1055KB. (show)
Memory used: 735KB.
Tokens: post-login.
Queries used: 10.

[Show Queries]