D-Link Forums

The Graveyard - Products No Longer Supported => D-Link Storage => DNS-323 => Topic started by: robc.yk on February 11, 2011, 08:02:20 AM

Title: Make the DNS-323 as secure as possible
Post by: robc.yk on February 11, 2011, 08:02:20 AM
I would like to configure one of these units in a remote site on a remote network.
This is to be used for off-site backups of our files, only to be restored in the event of a disaster, (We have on site backups for the, 'my file is missing, and I didnt do anything' calls)..

My question is this, is the 'Allow SSL/TLS connection only' that is on firmware v9 secure enough for this device, or should I use something like Fun_Plug to enable SSH.

So, for all you experts...

What is the most secure way to host files on this device on a remote network and transfer these files via. schedule to be transfered from local network server to this remote device.

I dont have a tonne of experience with Unix, but if am given some solid direction can figure it all out.

Thanks for your advice.

Rob C.
Title: Re: Make the DNS-323 as secure as possible
Post by: HSishi on February 11, 2011, 02:58:38 PM
If the NAS is behind a router then it's already a pretty safe setup.

You need to configure port forwardings if you want to *push* the files to your NAS or access the config.

If the NAS should *pull* the files from the network you just have to make the files accessible from the NAS.

//HSishi
Title: Re: Make the DNS-323 as secure as possible
Post by: McPillager on February 12, 2011, 07:01:46 AM
You are probably talking about FTP security.
As I posted in previous thread, the default FTP server is Pure-FTPd.

You can find details at their site: http://www.pureftpd.org/project/pure-ftpd (http://www.pureftpd.org/project/pure-ftpd)