์ผ. 8์›” 17th, 2025

D: So you’ve installed OpenWrt on your routerโ€”congrats! ๐ŸŽ‰ But before you celebrate, thereโ€™s one crucial step left: securing your network. OpenWrt is powerful, but its default settings arenโ€™t always secure. Hackers love unsecured routers for attacks, snooping, or even hijacking your connection. ๐Ÿ˜ฑ

Donโ€™t worry! This guide covers essential OpenWrt security settings to lock down your network like a pro.


๐Ÿ” 1. Change the Default Password (ASAP!)

Why? OpenWrtโ€™s default password (admin) is public knowledge. Leaving it unchanged is like leaving your front door wide open.

How?

  1. Log in to LuCI (web interface).
  2. Go to System โ†’ Administration.
  3. Set a strong password (use a mix of letters, numbers, and symbols).
  4. Save & apply.

๐Ÿ’ก Pro Tip: Use a password manager (like Bitwarden or KeePass) to store complex passwords securely.


๐Ÿ”’ 2. Disable Remote SSH & Web Access

Why? If you donโ€™t need remote admin access, disable it to prevent external attacks.

How?

  • For SSH:
    • Go to System โ†’ Administration โ†’ SSH Access.
    • Set Interface to LAN (not WAN).
  • For Web Interface (LuCI):
    • Go to System โ†’ Administration โ†’ Web Interface.
    • Set Listen Interfaces to LAN.

๐Ÿšจ Warning: If you must allow remote access, use VPN + firewall rules instead of exposing SSH/LuCI directly.


๐Ÿ›ก๏ธ 3. Enable Firewall & Block Unwanted Traffic

OpenWrtโ€™s firewall (fw3) is powerful but needs tweaking.

Essential Rules:
โœ… Block WAN ping replies (prevents network scanning).
โœ… Drop invalid packets (stops malformed traffic).
โœ… Restrict UPnP (can be exploited by malware).

How?

  1. Go to Network โ†’ Firewall.
  2. Under General Settings, enable:
    • Drop invalid packets
    • Block ICMP ping on WAN
  3. Under Port Forwards, disable UPnP unless absolutely needed.

๐Ÿ”„ 4. Keep OpenWrt Updated

Why? Updates patch security flaws. An outdated router = easy target.

How?

  1. Check for updates:
    opkg update && opkg list-upgradable
  2. Upgrade packages:
    opkg upgrade <package-name>
  3. Or use LuCI:
    • System โ†’ Software โ†’ Update lists โ†’ Upgrade all.

๐Ÿ“… Set auto-updates (optional but recommended for security patches).


๐Ÿšซ 5. Disable Unused Services (Reduce Attack Surface)

Many default services (like Telnet, old SMB versions) are security risks.

Services to Disable:
โŒ Telnet (use SSH instead).
โŒ HTTP (non-HTTPS LuCI access).
โŒ Old SMB/CIFS (if not used for NAS).

How?

  • Go to System โ†’ Startup.
  • Disable unnecessary services.

๐Ÿ”‘ 6. Use Strong Wi-Fi Encryption (WPA3 or WPA2 AES)

Avoid:
โŒ WEP (broken encryption).
โŒ WPA-TKIP (vulnerable).

Best Choice:
โœ… WPA3 (if supported).
โœ… WPA2 + AES (fallback).

How?

  1. Go to Network โ†’ Wireless.
  2. Edit your Wi-Fi network.
  3. Set Encryption to WPA3-SAE or WPA2-PSK (AES).

๐ŸŒ 7. Enable DNS Encryption (DoT/DoH)

Why? ISP snooping & DNS hijacking are real threats.

Best Options:
๐Ÿ”’ DNS-over-TLS (DoT) โ€“ Encrypts DNS queries.
๐Ÿ”’ DNS-over-HTTPS (DoH) โ€“ Harder to block.

How?

  1. Install https-dns-proxy (for DoH):
    opkg install https-dns-proxy
  2. Configure in Network โ†’ DHCP and DNS โ†’ Advanced.

๐Ÿ Final Checklist

Before you go, ensure:
โœ” Changed default password.
โœ” Disabled remote SSH/LuCI.
โœ” Firewall rules active.
โœ” Updated OpenWrt.
โœ” Disabled unused services.
โœ” Strong Wi-Fi encryption.
โœ” DNS encryption enabled.

๐Ÿ” Your OpenWrt is now locked down! No more sleepless nights worrying about hackers. ๐Ÿš€

Need more? Check OpenWrtโ€™s official security docs. Stay safe! ๐Ÿ›ก๏ธ

๋‹ต๊ธ€ ๋‚จ๊ธฐ๊ธฐ

์ด๋ฉ”์ผ ์ฃผ์†Œ๋Š” ๊ณต๊ฐœ๋˜์ง€ ์•Š์Šต๋‹ˆ๋‹ค. ํ•„์ˆ˜ ํ•„๋“œ๋Š” *๋กœ ํ‘œ์‹œ๋ฉ๋‹ˆ๋‹ค