3) You can allow or restrict access to the management protocols in this menu.
- If access to a specific protocol from the WAN is to be enabled, then select allowed in the drop-down menu.
- If access from the WAN is not allowed, then select denied.
- If the router should only be accessible via VPN, then select only via VPN.
- By default, access to all of the management protocols from the WAN is denied.
Section 2: Restricting access to the router from specific IP addresses and/or IP networks only
1) Open the router configuration in LANconfig and go to the menu Management → Admin → Access settings.
2) Go to the menu Access stations.
3) Enter the networks and the IP addresses, which should have access to the router. For a network, enter the asscociated subnetmask. For a single IP address, enter the subnetmask 255.255.255.255.
Section 3: Deactivating the web server services from the WAN interface
1) Open the router configuration in LANconfig and go to the menu Management → Admin → Access settings.
2) Click on HTTP access and select the option From a WAN interface.
3) For the HTTP port select the option Disabled. In doing so, the web server is closed for all services. This is only practical in scenarios, where no access to the router should be possible from the WAN via HTTP/HTTPS (also not via VPN) and no services should be available on the WAN interface which require the web server (e.g. the OCSP server/responder).
Section 4: Configuration login lock
When management protocols are accessible from the WAN, you should expect frequent Internet-based brute force attacks attempting to gain access to the router. This is where brute-force protection comes into effect.
The relevant setting can be found under Management → Admin → Configuration login lock. With default settings, 5 failed logins cause the management protocol to be locked globally for 5 minutes.