by father.mande » Sat Mar 21, 2020 7:40 pm
Hi,
In fact the problem is ALWAYS multiple ...
If you secure the Wifi ... but not secure end point (Access Point and client) ... it's as nothing
same if you add a VPN ... if the end point are not secure or routing from LAN / Wan is possible ... hacker can use your VPN in your place ...
After for each wifi you used, you must understand the configuration .. is it a private Wifi at your end point ... so which security management did you use ... ex. Wep it's like nothing when wpa2-pask (TKIP/AES) it's actually one of the best.
If it's a Public Wifi ... you don't have the hands on the Wifi itself ... so you MUST encrypt all data using the Wifi (SSH or VPN on WiFi for ex.)
Also you MUST analyse your local PC or workstation
... suppress any routing
... force VPN only exchange or SSH with strong encryption based ONLY on keys exchange.
... suppress any port open for listening
... don't accept SMB connection (for ex. in a LAN with multiple users)
... etc.
Now you must also understand the other end point (hope you control it) ... with same approach, remember that some VPN (including lot of pay service) are in fact open for remote access if a link is establish.
Prefer (if VPN is your choice) to be able to manage end point (ex. your PC and your NAS even using a VPN at router level (better to protect ALL your exchange)
forgot VPN using user/password, using PPTP, prefer OpenVPN or better for private network use Wireguard (even a kernel module is require ... but easy to create for Asustor NAS kernel).
So with the limited information ... not easy to said you ... solution is X ...
Philippe.