This month only – get free shipping with no minimum purchase! Order early to avoid holiday shipping delays. Shop now
Find the perfect storage for your loved ones with our holiday gift guide! Shop now
Open

Business Storage NAS - Increasing Security

A security vulnerability has been identified on the Seagate Business Storage NAS products referred to as the “Zero Day Vulnerability.” This article covers several ways to ensure that your device is secure.


Ensure You Have the Latest Updates

Firmware updates are now available to resolve the “Zero Day Vulnerability”.  The latest available updates for your product can be found using the links below:  Protect Your Device from Remote Hacking

Some customers are concerned about the risk of having their NAS remotely hacked through the Internet.  Some actions that a Seagate Business Storage NAS user can take to avoid exposing the NAS are listed below.

Note:  Remote Access using Global Access/TappIn will still work after following these steps.

Disable UPnP Port Forwarding in the Business Storage NAS Manager Page
  1. Use the Seagate NAS Discovery Software to launch the Business Storage NAS Manager page in a browser. The NAS Hostname or IP Address may also be used with a browser to launch the NAS Manager page.
  2. Login to the NAS Manager Page as an Administrator.
  3. On the left side, click Network then Web Services.
  4. Disable “UPnP Port Forwarding for Web Access & FTP Service.”
  5. Click on Submit.
 If Port Forwarding was Set up Manually in the Router.
  1. Log into your router’s setup web page.
    Note: Please consult the router manufacturer’s documentation for help with this process.

  2. Navigate to the port forwarding section.

  3. Disable mapping for HTTP and HTTPS protocols related to the Seagate NAS box.
    The default ports are 80 for HTTP and 443 for HTTPS.

  4. Save the settings.

Secure Network with Firewall

Ensure that you have a firewall set up to secure your network and that it is configured to allow only trusted systems to communicate to the NAS via HTTP and HTTPS.

Protect Your Device within Your Local Network or Intranet
  • Physically secure the NAS by ensuring it is stored in room or area where only NAS admins have access to the device.

  • Ensure that you have a firewall set up to secure your network and that it is configured to allow only trusted systems to communicate to the NAS via HTTP and HTTPS