Using the HTTPS port for firmware downloads seems badly implemented to me.

Using the HTTPS port for firmware downloads seems badly implemented to me.

Using the HTTPS port for firmware downloads seems badly implemented to me.
Using the HTTPS port for firmware downloads seems badly implemented to me.
2025-06-22 22:20:56 - last edited 2025-06-24 06:56:59

I'm wonder if anyone can shed some light on what the thinking is behind moving firmware downloads behind the HTTPS port.  I have a couple of issues with it.

 

  1. We used to be able to lock admin access to our controller down really well.  It was only accessible from a couple of known-good, local machines.  Now that the HTTPS admin port is required to update devices, we have to leave the admin interface open to the whole world.
  2. It's extremely difficult / impossible to put the controller admin behind a reverse proxy because client devices appear to omit SNI.  In addition to that, it looks like client devices don't validate SSL.  I can expose the controller directly with a self-signed certificate and everything works.

 

From the little bit that I looked at it today, I'm left with the impression the SSL and security end of things aren't the best.  I'd really like to know how clients verify the payload they're getting to ensure it hasn't been tampered with.

 

I also want to emphasize how bad of an idea I think it is to comingle the admin interface with functionality required for client devices which forces us to expose the admin interface to the world.  If everything needs to be run on a single port, admin functionality should at least be segregated into a sub-path like /admin/ and the controller should work behind a reverse proxy so we can restrict the admin URLs.

  0      
  0      
#1
Options
1 Accepted Solution
Re:Using the HTTPS port for firmware downloads seems badly implemented to me.-Solution
2025-06-23 07:06:57 - last edited 2025-06-24 06:56:59

  @ryan5678 

 

There are a few ways to tackle the security concerns

 

1) Change the HTTPS port of the controller to something else, i use port 29818 - once changed it will inform all managed devices of the new port and continue to work fine

2) You dont have to expose the port forward to any WAN ip - you can set it to only accept incoming connections from known IPs - useful if the remote site has a static IP

3) You can create a Block > WAN IN > IP_Any gateway ACL rule based on a location group that you can add every country except your own to 

4) Just establish a site-to-site VPN between the routers and adopt the remote site inside the encrypted VPN - no need for exposing any ports

Main: ER8411 x1, SG3428X x1, SG3452 x1, SG2428LP x1, SG3210 x1, SG2218P x1, SG2008P x3, ES208G x1, EAP650 x6 Remote: ER7206 v2 x1, ER605 v2 x3, SG2008P x2, EAP650 x2, ES205G x1 Controller: OC300
Recommended Solution
  0  
  0  
#2
Options
1 Reply
Re:Using the HTTPS port for firmware downloads seems badly implemented to me.-Solution
2025-06-23 07:06:57 - last edited 2025-06-24 06:56:59

  @ryan5678 

 

There are a few ways to tackle the security concerns

 

1) Change the HTTPS port of the controller to something else, i use port 29818 - once changed it will inform all managed devices of the new port and continue to work fine

2) You dont have to expose the port forward to any WAN ip - you can set it to only accept incoming connections from known IPs - useful if the remote site has a static IP

3) You can create a Block > WAN IN > IP_Any gateway ACL rule based on a location group that you can add every country except your own to 

4) Just establish a site-to-site VPN between the routers and adopt the remote site inside the encrypted VPN - no need for exposing any ports

Main: ER8411 x1, SG3428X x1, SG3452 x1, SG2428LP x1, SG3210 x1, SG2218P x1, SG2008P x3, ES208G x1, EAP650 x6 Remote: ER7206 v2 x1, ER605 v2 x3, SG2008P x2, EAP650 x2, ES205G x1 Controller: OC300
Recommended Solution
  0  
  0  
#2
Options