Accepted 2 factor authentication
Accepted 2 factor authentication
If it is not available yet, perhaps incorporate 2 factor authentication to a mobile app. This way the router admin has to confirm access to whoever is trying to sign into the router ui. A little bit more security!
- Copy Link
- Subscribe
- Bookmark
- Report Inappropriate Content
KMTP wrote
My Internet Service Provider's (ISP) WAN IP continually receives a lot of DDOS attacks and Port Scans from malware producers. Recently a hacker team called Deadbolt hacked my NAS an encrypted all data. This was done behind a TP Link "firewall" /Secure Shield. Now I have bought a new updated router and I find out that not even this new TP Link router has two factor identification!!! It does not feel safe at all! I definately need two factor identification. How can I do this? Do I have to buy another SAFE router from another brand or does TP Link have a solution?
Hello @KMTP, thank you for reaching out to us, and welcome to the TP-Link community.
Can I have the model number of the TP-Link router? As far as I know, two-factor authentication is not available on the home router now, but there is already a plan to support it. Since we don't have any specific details that I can share around if it will come to all the home routers, or when it might, I'll suggest you return it if this really determines the purchase.
BTW, Omada Controller v5.0 already supports two-factor authentication, you may check if any of the business routers can match your requirements:
MFA / 2FA for Omada Cloud - Business Community (tp-link.com)
- Copy Link
- Report Inappropriate Content
A two-factor authentication won’t be a good idea as any of the types such as SMS or Google, authenticator needs internet to work and will make the router inaccessible in offline mode. For restricted access, the wifi router provides MAC address whitelisting where on first login, list of MAC addresses can be added from which login should be allowed.
However, the MAC addresses should be kept safe as it can easily be cloned and a malicious agent can easily act as authorized user if learns the address.
- Copy Link
- Report Inappropriate Content
Information
Helpful: 2
Views: 5355
Replies: 13