Enabling authentication for a device with an open web interface, when using remote access via the KeenDNS service

Sometimes it may be necessary to remotely access a home network device with an open web interface that does not know how to perform authorization by login and password.
It is not safe to open remote access to such a device using KeenDNS. Therefore, the operating system KeeneticOS has the ability to enable authorization for such devices with remote access.
Information on how to use the KeenDNS service and level 4 domain names can be found in the following instructions 'An example of remote access to home network resources with KeenDNS'.

This authorization is enabled through command-line interface (CLI) of Keenetic with commands:

ip http proxy {name} auth — enable authorization, where {name} – the level 4 domain name you specified in the KeenDNS access configuration.

user {name} tag http-proxy — allow user {name} to login to the http proxy (which the Keenetic acts as).

For example, the name 'qnap' is used as the name of a level 4 domain (qnap.myrouter01.keenetic.pro). We will use the Keenetic administrator account (admin) for authorization. In this case, to enable authorization for remote access to the web interface using Keenetic, you need to execute the following commands:

ip http proxy qnap auth
user admin tag http-proxy
system configuration save — to save the settings

Now when you open the address qnap.myrouter01.keenetic.pro in your web browser you will see the same authorization window as when you log on to Keenetic at the address myrouter01.keenetic.pro. Keenetic will forward your request to the web interface of the device only after you enter your admin name and password. In this example, you will gain access to a network storage QNAP.

You can use this authorization not only for remote access to a home network device with an open web interface, but also for devices that are protected by their own authorization system. In this case, dual authorization to the device will be used, increasing security for remote access.


Have more questions? Submit a request



Please sign in to leave a comment.