This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

SQL Injection - Admin Portal IP Restricted - How?

Hi there

We had the notification on our XG 210 to say that it was Partially Cleaned (ie compromised) etc.

The User Portal is disabled on WAN, never used it.

The Admin Portal is enabled on WAN, but access is restricted to our head office trusted IP only. It's not usually something I would ever enable, but the device sits in a secure datacentre and remote access is essential.

I've seen a lot of people here ask a similar question, but nobody has given an actual answer.

How can the device be potentially compromised if it's only accessible from one trusted IP? This restriction DOES work by the way, I have tested thoroughly.

The admin portal login page doesn't even appear for anyone to carry out a SQL injection attack... anyone enlighten me?

Thanks! 



This thread was automatically locked due to age.
Parents Reply
  • IT-Support-247 said:

    Hi Viken

    User Portal completely disabled on all interfaces, including WAN. We've never used it.

    Admin Portal available on WAN, but only allowing connection from our main IP at our head office. I have tested this several times and it works. It's been in place for over a year now. We also have Geo-IP filtering enabled for inbound as well, excluding all countries except for a few that we need.

    So... I am a bit confused. Maybe the fact that WAN was enabled, was enough for the Hotfix to trigger a "compromised" message..?

     

    Hello,

    How did you configure your Geo-IP filtering on the WAN Admin Portal? Did you allow directly countries in the ACL Exceptions?

Children