Synology SRM 1.3 Review – General Security & Safety
Regardless of whether you are a home or business user, the security of your network is going to be one of your priorities very early on. Both internal network security with the devices that are exchanging packets of data via the router, right the way to how the router governs and manages the stream of data coming from your internet connection, if a router isn’t particularly secure, you will all too quickly find out! Worse still, if you are an inexperienced network technology user or a business lacking in-house IT support, then the ease of configuring a router to be as secure as possible within your specific network environment is going to be even more of an uphill battle. SRM 1.3 tackles this in several very clear ways. First off, despite its incredibly user-friendly browser GUI, the majority of its more potentially insecure architecture elements (i.e those that if you mishandle them or let them open could be disastrous in the wrong hands) are either disabled by default or are locked behind more advanced configuration windows/portals. Some are more obvious than others, such as port forwarding (common to all routers and not something anyone should touch without reason) settings and IP/Mac address blocking, which are all quite useful, but common. However, there are little things of note that are impressively specific to SRM 1.3, such as the power-use admin account being disabled by default. Something that even now in 2022 is still not the case for many routers (including ISP ones) and with those same power user crenedtials printed on the base of the router.
- - -
Check out FREE NAS advice section on nascompares.com