This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| basic_hardening [2025/12/25 23:14] – [WiFi Settings] hogwild | basic_hardening [2026/01/09 23:50] (current) – [VPN Connections] -Condense hogwild | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== Basic Steps to Harden FreshTomato ====== | ====== Basic Steps to Harden FreshTomato ====== | ||
| - | This HOWTO will provide some basic steps toward hardening your Freshtomato router. It is not intended to be a thorough or complete reference on securing your network, only a starting point. | + | This HOWTO will provide some basic steps toward hardening your Freshtomato router. It is not intended to be a thorough or complete reference on securing your network. It is only a starting point. |
| Each small step will reduce your network' | Each small step will reduce your network' | ||
| Line 12: | Line 12: | ||
| * Change the password to a strong, unique one. \\ This is crucial. Many attacks rely on default credentials. | * Change the password to a strong, unique one. \\ This is crucial. Many attacks rely on default credentials. | ||
| - | * Enable HTTPS for router access: Secure the web interface by setting local access to use secure HTTPS instead of HTTP FIXME | + | * Enable HTTPS for router access: Secure the web interface by setting local access to use secure HTTPS instead of HTTP. |
| Line 25: | Line 25: | ||
| * Disable UPnP in the [[forward-upnp|UPnP IGD & PCP]] menu. Universal Plug and Play is known to be insecure and should be disabled, unless absolutely required. | * Disable UPnP in the [[forward-upnp|UPnP IGD & PCP]] menu. Universal Plug and Play is known to be insecure and should be disabled, unless absolutely required. | ||
| - | * In the [[admin_access|Admin Access]] menu, set a low value in the "// | + | * In the [[admin_access|Admin Access]] menu, set a low value in the "// |
| Line 38: | Line 38: | ||
| * Consider changing the Group Key Renewal setting to a lower value, such as 1800. \\ Rotating the client-router encryption keys more often will reduce the chances strangers will gain WiFi access. | * Consider changing the Group Key Renewal setting to a lower value, such as 1800. \\ Rotating the client-router encryption keys more often will reduce the chances strangers will gain WiFi access. | ||
| - | * Reduce WiFi signal strength in the the / | + | * Reduce WiFi signal strength in the the / |
| * Randomize MAC address: Use MAC address randomization to prevent tracking or spoofing risks. | * Randomize MAC address: Use MAC address randomization to prevent tracking or spoofing risks. | ||
| Line 61: | Line 61: | ||
| * Set " | * Set " | ||
| * Enable "Use Stubby" | * Enable "Use Stubby" | ||
| - | * Select " | + | * Select " |
| - | * | + | |
| * Set " | * Set " | ||
| Line 77: | Line 76: | ||
| * Disable NAT loopback. | * Disable NAT loopback. | ||
| + | * Unless you're using an IPSEC VPN, disable IPSEC Passthrough in the Conntrack/ | ||
| - | ===== Use Adblock ===== | + | |
| + | ===== Use Adblock/DNS Filtering | ||
| Go to the [[adblock_dns_filtering|Adblock]] menu and enable this feature. If not completed already, add Domain blacklist URLs from the wiki list to choose which content to filter. | Go to the [[adblock_dns_filtering|Adblock]] menu and enable this feature. If not completed already, add Domain blacklist URLs from the wiki list to choose which content to filter. | ||
| Line 94: | Line 95: | ||
| ===== VPN Connections ===== | ===== VPN Connections ===== | ||
| - | * Use a website to check for IP leaks. Recommended websites include: [[https:// | + | * Use a website to check for IP leaks. Recommended websites include: [[https:// |
| - | * Use a website to check for DNS leaks. | + | * Use a website to check for DNS leaks. |
| - | * Configure a kill switch. | + | * Configure a kill switch. |
| - | * Consider using a Stubby server for DNS resolution. Stubby | + | * Consider using a Stubby server for DNS resolution. Stubby |