You took a look at the event log of the Fritzbox: You are amazed to see that regular attempts to access a user account are made, which the Fritzbox refuses. What’s behind it?
Access of an Amazon user account to the Fritzbox
You created the account for voice control of smart home components via Amazon’s voice service Alexa. However, the Fritzbox claims that this user wanted to log on to the router user interface and therefore failed. An IP address also appears in the Fritzbox message. If you research their origin on the Internet, you will find that it belongs to AWS (Amazon Web Services), Amazon’s cloud service provider. This fits the error message of the Fritzbox: Because in order for a smart home device in the home network, such as a switch socket, to be controlled via Alexa, the router must be accessible from the Amazon cloud. The voice service works on an AWS server: it analyzes the spoken words and sends the appropriate control commands back to the Fritzbox. Since there is no Alexa support from AVM itself, bring Fritzbox and Alexa together using one skill, for example “FB Smart Home”. To do this, create a user in the Fritzbox to whom you must allow access from the Internet. However, it is very important that you restrict his authorizations to the smart home functions. Accordingly, only the “Smart Home” option should be selected in the user properties in the Fritzbox.
If the Fritzbox refuses access to a user account that has been set up for smart home functions, it may be due to a changed IP address.
The Amazon skill regularly contacts the Fritzbox. Usually you don’t notice this, because the access to the approved user account is given. The Fritzbox assigns a so-called session ID for this access: This allows the Alexa skill to authenticate itself when it is accessed again without having to log in again. However, the external IP address from which the skill accesses may change. The session ID then loses its validity. Accordingly, the Fritzbox rejects the access and records this process in the event log.
Fritzbox hacks: unlock hidden functions