^This. Switched to this from a Unifi platform 3 years ago. ProtectLi + OpnSense is probably the strongest "enterprise" grade router/firewall for the home. Yeah it's got a slight learning curve, but nothing that would daunt any arsian on these forums and the defaults out of the box are set for safety and simplicity. And for the technically adventurous, there is not a thing a Juniper/Cisco/Palo Alto can do that OpnSense cannot.If all you need is a true router (aka no built in WiFi) and are willing to put some work in, I recommend a Protectli https://protectli.com/product-comparison/ box running OPNsense. I've been running 2 for over 5 years now. The out-of-the box defaults work for the typical home setup, and you get all of the options and tweaking you could possibly want, with the downside of complexity.
If you're looking for a simple solution, though, OPNsense is probably not it.
That does matter, though. A US company that is manufacturing in China will still be able to resist demands by the CCP to install backdoors into their products, and they have an incentive to discover any that have surreptitiously been inserted at the point of manufacture.
A Chinese company must comply with any demands the CCP makes and also must lie about them (of course, a US company has the same obligations w/r/t the USG entities like the NSA).
That said, the current panic does seem a bit hypothetical. The problem with TP-Link routers is that they're cheap, and cheap devices don't get consistent firmware updates. It's probably not actively malicious on TP-Link's part; they're just low-end devices doing what low-end device manufactures do to keep prices low. The fact that they've got security vulnerabilities is just a nice benefit to hackers, including Chinese hackers.
But it's of course plausible that the CCP could be mandating certain backdoors or, more likely, weaknesses. After all, we know that the NSA bribed RSA to use a weakened cipher suite a decade ago; it's not unheard of.
Even if WiFi is needed, there are dedicated WiFi access points. Granted most of them are targeted at enterprises with enterprise pricing and configuration. The only reasonable option from what I've seen is Ubiquiti's APs, but they've pulled enough shady schenaniagains in the past that I'm not really comfortable recommending them. I do buy their networking gear, but that's only because I haven't found anything else at that price / feature point.Ah; sorry... I figured people were talking WiFi APs here. Yeah; if we're ignoring WiFi, I've built my own OpenBSD system with stateful inspection and no on-system TCP stack -- works great as a firewall/gateway, and can't be easily compromised, as the device itself doesn't actually speak TCP - it requires physical access to modify/update it, and is all about filtering/redirecting pass-through Ethernet data.
Despite your confident tone, you haven't provided a shred of evidence for your assertions.That said, the current panic does seem a bit hypothetical. The problem with TP-Link routers is that they're cheap, and cheap devices don't get consistent firmware updates. It's probably not actively malicious on TP-Link's part; they're just low-end devices doing what low-end device manufactures do to keep prices low. The fact that they've got security vulnerabilities is just a nice benefit to hackers, including Chinese hackers.
Funnily enough, TP-Link is the brand to compare against Ubiquiti. Specifically the Omada SMB line.Even if WiFi is needed, there are dedicated WiFi access points. Granted most of them are targeted at enterprises with enterprise pricing and configuration. The only reasonable option from what I've seen is Ubiquiti's APs, but they've pulled enough shady schenaniagains in the past that I'm not really comfortable recommending them. I do buy their networking gear, but that's only because I haven't found anything else at that price / feature point.
A dual NIC single board computer and a Unifi AP still comes in under $800.
Edit: just to be clear, all of this is a non-starter if you need something that just works out of the box.
The article said this but a few people here have said TP-Link is good at patching vulnerabilities, is the committee just doing the "China bad" thing?"TP-Link's unusual degree of vulnerabilities and required compliance with PRC [People's Republic of China] law are in and of themselves disconcerting," said an August 2024 letter to Raimondo from the Republican and Democratic leaders of the House Select Committee on the Chinese Communist Party.
A bunch of consumers don't update their routers.
TP-Link sells popular routers.
China uses them for botnets.
...and the government thinks banning a particular brand is going to do...what, exactly?
I hate this timeline. It's fucking dumb.
They put out frequent updates. I admit I haven't checked to see if those updates actually patch what they need to patch.The article said this but a few people here have said TP-Link is good at patching vulnerabilities, is the committee just doing the "China bad" thing?
This is nothing to do with how good or reliable-seeming the product is. The allegation is that the Chinese government mandates backdoors in the products and that TP-Link complies which is why Microsoft reported that the botnet is mostly made-up of TP-Link devices.This is horse shit.
I own a good number of pieces of TP Link gear. Their stuff is generally quite reliable, is priced competitively, and is updated frequently.
Instead we would legislate that some other firm who makes its gear in the exact same Chinese factories wins in the market. That'll definitely go well.
I would start with a 100% tariff on ALL their stuff and still work on a ban, 100%. Putting an office in the USA don't play if the stuff is made in China without USA inspection opportunity.
Trade wars should be hell for the bad guy, not a sweet profit point and espionage resource, too.
Asus and Netgear are made elsewhere. And there are Ubiquiti (Unifi) products. I have Netgear (Orbi) that has been pretty reliable and allows for enet backhaul...I use a TP-Link router. I landed on it after having issues with all the other mid-range router companies on the market. They're the only ones I know of who implement the security features I want, provide regular updates, fix flaws in the product when issues are reported (and provide ticket tracking to let reporters know when the issue has been addressed), and let you lock down your device such that there's not really much a threat actor outside the network can do to compromise the devices. AND, they come with a malicious content filter, intrusion prevention rules and an infected device quarantine, protecting not only the device itself, but anything inside the network that's been port forwarded.
TP-Link is also great in that they use a mostly open source Linux stack as the product base, so it's easy to understand what's going on inside the product. https://www.tp-link.com/us/support/download/archer-ax6000/v1/#GPL-Code
So does anyone have a suggestion for a sub-$800 router that isn't made in China and checks all those boxes? Anyone?
I have around 25 of the KP125 and EP25, and my only complaint are the constant attempts to contact NTP servers in China (aliyun dot com), which are being blocked by my firewall. Looking at the total blocks since June, they average 1200 per day.I don't use a TP-Link router but I do use TP-Link's KP125M switches on our Christmas Tree... just remember folks, these days there is no firewall.
They could optionally make the firmware/build chain open source- it would probably make them more popular.
I have a Deco mesh system as well. Was looking to upgrade now that I have a Gbps connection and quite a few more devices around the house. Super easy to set up, reliable, the app GUI is easy to navigate.
Probably would be easier to see which politicians pushing this (or their campaign donors) have interest/shareholder/stock in opposing networking companies.The article said this but a few people here have said TP-Link is good at patching vulnerabilities, is the committee just doing the "China bad" thing?
AIUI (please correct me if I'm wrong) GL.inet have made their own fork of OpenWRT and it seems they're not all supported by mainline. So what you get there is effectively China-OpenWRT and if the things in the article concern you then that doesn't address them. If vanilla Open WRT supports the device then you can reflash that. They aren't particularly unique - a number of vendors and ISPs base their firmware on OpenWRT but if there's no mainline support (eg proprietary hardware drivers) then you can't use an open source build or it's missing key features.So people are throwing the word OpenWRT around like water like it will solve all their issues. If you want to really go that route. Go buy another Chinese company GL.inet, you can flash OpenWRT onto them to your heart's content. Given that their claim to fame is they make decent travel sized routers and rather then build their own routing/firewall engine. They use OpenWRT and just make a proprietary Frontend. And they don't hide that fact.
Because TP link keeps pushing out garbage firmware and then just shrugs about fixing it once devices are hacked, they don't give a rats ass if they're products are being used for an active botnet, heck I almsot wouldn't be surprised if someone at the company is a CCP agent ensuring that it remains the caseA bunch of consumers don't update their routers.
TP-Link sells popular routers.
China uses them for botnets.
...and the government thinks banning a particular brand is going to do...what, exactly?
I hate this timeline. It's fucking dumb.
also wouldnt the obvious solution be to force manufacturers to enable software that allows consumers to update/replace the software easily using open source software like dd-wrtThis is horse shit.
I own a good number of pieces of TP Link gear. Their stuff is generally quite reliable, is priced competitively, and is updated frequently.
Instead we would legislate that some other firm who makes its gear in the exact same Chinese factories wins in the market. That'll definitely go well.
I keep dancing around Ubiquiti because of the price, and because my home network is complex enough that it's a pricey endeavor. I finally went with Omada which seemed to be similar functionality at about half the price, but now of course I'm debating if that was the wrong move...A UniFi Cloud Gateway, a U6- or U7-series AP (or two), and some Ethernet* are really all that’s needed for a solid setup with zippy speed and good coverage for most homes. Overkill? Maybe.
Their tools and apps are also pretty decent.
* = PoE+ switches are great here if PoE injectors are undesirable.
Uh, is any of the hardware you despise American-made?
Presents facts not in evidence. Dismissed.Because TP link keeps pushing out garbage firmware and then just shrugs about fixing it once devices are hacked, they don't give a rats ass if they're products are being used for an active botnet, heck I almsot wouldn't be surprised if someone at the company is a CCP agent ensuring that it remains the case
Hey, my Linksys WRT1900 is a great router. Well, became great after I evicted the factory firmware for OpenWRT, turned the WiFi radios off and unscrewed the antennae, then added Ubiquiti and later Aerohive APs with a PoE switch.I've fully bought into Ubiquiti as I like their management interface, don't force you to create a cloud account (but they do push it somewhat, but not to a degree that would turn me off), and I was able to move my UniFi Express config to my new Cloud Gateway Max along with easily turning my UniFi Express into an AP for my Cloud Gateway Max.
Honestly, out of all the manufacturers, I would only recommend Ubiquiti and TP-Link as I have several TP-Link switches still in use. The best Linksys router I ever had was a WRT-1200 I got at Goodwill for $20 that I could install OpenWRT on. Everything else was just hot garbage.
That's still the best router I've ever owned, period. I only replaced it when Internet speeds increased to the point that it bottlenecked on CPU.