This page is not fully translated, yet. Please help completing the translation.
(remove this paragraph once the translation is finished)
要在Web管理GUI上初始设置（或稍后更改）“root”管理帐户密码，请转到http://192.168.1.1 → 系统/管理
opkg install luci-ssl
Handle firewall rules with care:
If you have already performed various firewall changes on your LEDE device and now lost overview of your custom rules, you can always reset all your LEDE settings back to the to the initial default (see trouble shooting section).
Not so fast…
Did you notice that even LEDE firmware gets updated from time to time?
As with your former vendor firmware, you should check regularly, whether LEDE has released new firmware and apply these updates to your device. There is even a configuration backup and restore feature, such that you do not have to start from scratch after each update.
As with the firmware you should also keep an eye on the custom packages you install. There are several hundreds of optional packages. Not all security problems of those packages get addressed by LEDE system upgrades, but instead require you to manually upgrade the packages as well.
If you are using custom packages, you should run a
opkg update;opkg list-upgradable from time to time. This shows your installed packages that have available updates.
You then install package upgrades manually by running
opkg upgrade SOMEPACKAGENAME.
Note that not every listed package upgrade is due to security issues, it can also be a harmless bug fix or feature extension.
An update will continue to use your existing service configuration, but for critical LEDE environments, a manual config backup never hurts as safety precaution before upgrading packages…
Note: LEDE uses a read-only root file system plus a differential extension partition for all package installs and upgrades. When wanting to maximize usage of your precious flash space, it tends to be a better approach, to applying up-to-date LEDE firmware and then reinstall your packages instead of only upgrading packages, when expecting larger volumes of upgrades.
LEDE devices have 2-4 common services running, which kind of mark high-value targets for malware (even when only available in your LAN-zone): Any harmless looking web site, you have visited in your browser, could use cross site request forgery tricks, abusing an unpached security flaw in one of these services.
These high-value services in particular are:
It is up to your personal responsibility, to counter such weak points on your LEDE device(s):