ROUTER_SECURITY
Secure your home network. FritzBox, AVM, and general router hardening. WiFi security, firewall, remote access.
WHY ROUTER SECURITY IS YOUR FIRST DEFENSE
Your router is the gateway to your entire network. If compromised, attackers can:
-
Monitor all traffic: See every website you visit, even with HTTPS
-
Inject malware: Replace downloads with malicious versions
-
Access devices: Exploit vulnerable devices on your network
-
Use your network: Route illegal activity through your connection
STEP 1: ROUTER BASICS (ALL ROUTERS)
CHANGE DEFAULT CREDENTIALS IMMEDIATELY
Routers ship with default passwords like "admin/admin" or "admin/password". These are publicly known and the first thing attackers try.
Common defaults to change:
- • admin/admin
- • admin/password
- • admin/1234
- • root/admin
UPDATE FIRMWARE
Router firmware contains security updates. Outdated firmware = known vulnerabilities.
AUTOMATIC UPDATES
- • Enable if available
- • Set to check daily
- • Reboot when prompted
MANUAL UPDATES
- • Check manufacturer site monthly
- • Download from official source only
- • Verify checksums
DISABLE REMOTE MANAGEMENT
Remote management lets you access router settings from outside your network. It's rarely needed and often exploitable.
-
✓
Disable: "Remote Admin", "Web Access from WAN", "Remote Management"
-
✓
If needed, use VPN + LAN access instead
-
✓
Never enable telnet (use SSH if needed)
STEP 2: WIFI SECURITY
USE WPA3 (OR WPA2-AES)
WPA3 is the latest WiFi security protocol. If unavailable, WPA2-AES is minimum.
WPA3
Best. Use if available.
WPA2-AES
Acceptable minimum.
WEP/WPA-TKIP
Broken. Never use.
ENABLE GUEST NETWORK
Guest WiFi isolates visitors from your main network. They get internet but no access to your devices.
- • Separate password for guests
- • Isolates guest devices from LAN
- • Use for IoT devices when possible
- • Can be on timer (disable when not in use)
SHOULD YOU HIDE YOUR SSID?
Short answer: No. Hiding your SSID doesn't add security.
- • Hidden networks are still visible to anyone with WiFi tools
- • Devices "probe" for hidden networks, revealing them anyway
- • Can cause connection issues
- • Your security comes from WPA3 + strong password, not hiding
STEP 3: FRITZBOX HARDENING (AVM)
FritzBox routers are popular in DACH regions. They're generally secure out of the box, but these settings improve security:
FRITZBOX SECURITY SETTINGS
Access via fritz.box or router IP
Home → Network → Network Settings
- • Enable "Airtime Fairness" (prevents WiFi hogging)
- • Disable WPS (push button has vulnerabilities)
Home → System → FRITZ!OS Users
- • Change default "fritz" password
- • Create separate user for guests
- • Disable unwanted services (NAS, media server)
Home → Internet → Permit Access
- • Disable "MyFRITZ" if not used
- • Review port forwarding rules
- • Disable incoming connections unless required
Home → Home Network → Mesh
- • Review mesh/repeater settings
- • Only allow known devices
MYFRITZ REMOTE ACCESS
MyFRITZ allows remote access to your router. It's convenient but adds attack surface.
- • If you don't need remote access: DISABLE IT
- • If needed: Use unique, strong password
- • Consider VPN instead of MyFRITZ
KEEP FRITZ!OS UPDATED
FritzBox updates are automatic but check manually:
Home → System → Update
- • Check for new FRITZ!OS
- • Enable automatic updates
- • Review changelog for security fixes
STEP 4: DNS SETTINGS IN ROUTER
Change your router's DNS to block ads/malware at the network level. All devices benefit.
CLOUDFLARE
1.1.1.1
1.0.0.1
QUAD9
9.9.9.9
149.112.112.112
ADGUARD
94.140.14.14
94.140.15.15
Set in: Internet → DNS Settings (varies by router)
STEP 5: FIREWALL RULES
Most routers have SPI firewall enabled by default. Verify and configure:
- • Ensure "SPI Firewall" or "Stateful Packet Inspection" is ON
- • Block incoming ICMP ping requests (prevents network discovery)
- • Review port forwarding - only forward what's absolutely necessary
- • Enable "Stealth Mode" if available (drops unsolicited packets)
STEP 6: IOT DEVICE ISOLATION
IoT devices (smart bulbs, cameras, speakers) are notoriously insecure. Isolate them:
GUEST NETWORK
Put IoT on guest WiFi. Can't access main network.
VLAN (if supported)
Create VLAN for IoT. Advanced but more flexible.
SECURITY CHECKLIST
ADVANCED: CUSTOM FIRMWARE
For advanced users, custom firmware like OpenWrt or DD-WRT provides more control:
OPENWRT
- • Full Linux environment
- • Active development
- • Supports many routers
- • Steep learning curve
DD-WRT
- • User-friendly interface
- • Broad hardware support
- • VPN server/client built-in
- • Check compatibility first
WARNING: Installing custom firmware can brick your router. Only attempt if you know what you're doing and your router is supported.