Line 22: |
Line 22: |
| | TCR1=[[File:Networking_rutos_manual_administration_general_tcr_v2.png|border|class=tlt-border]] | | | TCR1=[[File:Networking_rutos_manual_administration_general_tcr_v2.png|border|class=tlt-border]] |
| | TRB1|TRB2|TRB5=[[File:Networking_rutos_manual_administration_general_trb_v2.png|border|class=tlt-border]] | | | TRB1|TRB2|TRB5=[[File:Networking_rutos_manual_administration_general_trb_v2.png|border|class=tlt-border]] |
− | | #default=[[File:Networking_rutos_manual_administration_general_rut_v2.png|border|class=tlt-border]] | + | | #default=[[File:Networking_rutos_manual_administration_general_rut_V3.png|border|class=tlt-border]] |
| }} | | }} |
| <table class="nd-mantable"> | | <table class="nd-mantable"> |
Line 44: |
Line 44: |
| <td>Basic {{!}} Advanced; default: <b>Basic</b></td> | | <td>Basic {{!}} Advanced; default: <b>Basic</b></td> |
| <td>Mode determines what options and configurations are shown. In Basic mode only the essential configurations are shown. In Advanced mode there is greater freedom to configure and access more options.</td> | | <td>Mode determines what options and configurations are shown. In Basic mode only the essential configurations are shown. In Advanced mode there is greater freedom to configure and access more options.</td> |
− | </tr>}} | + | </tr> |
| + | <tr> |
| + | <td>Data Analytics</td> |
| + | <td>Off {{!}} On; default: <b>Off</b></td> |
| + | <td>Enables collecting usage data</td> |
| + | </tr> |
| + | }} |
| <tr> | | <tr> |
| <th>Device name and hostname</th> | | <th>Device name and hostname</th> |
Line 262: |
Line 268: |
| {{#switch:{{{series}}}|TAP100|TAP200=|#default=<b>Important</b>: turning on remote access leaves your device vulnerable to external attackers. Make sure you use a strong password. | | {{#switch:{{{series}}}|TAP100|TAP200=|#default=<b>Important</b>: turning on remote access leaves your device vulnerable to external attackers. Make sure you use a strong password. |
| <br><br>}} | | <br><br>}} |
− | <b>SSH</b>
| + | ====SSH==== |
| ----{{#switch:{{{series}}} | | ----{{#switch:{{{series}}} |
| |TAP100|TAP200 = [[File:Networking_rutos_manual_administration_access_control_general_ssh_tap100_v1.png|border|class=tlt-border]] | | |TAP100|TAP200 = [[File:Networking_rutos_manual_administration_access_control_general_ssh_tap100_v1.png|border|class=tlt-border]] |
Line 277: |
Line 283: |
| <td>off {{!}} on; default: <b>on</b></td> | | <td>off {{!}} on; default: <b>on</b></td> |
| <td>Turns SSH access from the local network (LAN) on or off.</td> | | <td>Turns SSH access from the local network (LAN) on or off.</td> |
− | </tr>{{#switch:{{{series}}}|TAP100|TAP200=|#default | + | </tr>{{#switch:{{{series}}}|TAP100|TAP200=|#default= |
| <tr> | | <tr> |
| <td>Remote SSH access</td> | | <td>Remote SSH access</td> |
Line 295: |
Line 301: |
| </table> | | </table> |
| <br> | | <br> |
− | <b>WebUI</b>
| + | ====WebUI==== |
| ----{{#switch:{{{series}}} | | ----{{#switch:{{{series}}} |
− | |TAP100|TAP200 = [[File:Networking_rutos_manual_administration_access_control_general_webui_tap100_v1.png|border|class=tlt-border]] | + | |TAP100|TAP200 = [[File:Networking_rutos_manual_administration_access_control_general_webui_tap100_v2.png|border|class=tlt-border]] |
− | |#default = [[File:Networking_rutos_manual_administration_access_control_general_webui_v1.png|border|class=tlt-border]]}} | + | |#default = [[File:Networking_rutos_manual_administration_access_control_general_webui_v2.png|border|class=tlt-border]]}} |
| | | |
| <table class="nd-mantable"> | | <table class="nd-mantable"> |
Line 327: |
Line 333: |
| </tr>}} | | </tr>}} |
| <tr> | | <tr> |
− | <td>Port</td> | + | <td>HTTP Port</td> |
| <td>integer [0..65535]; default: <b>80</b></td> | | <td>integer [0..65535]; default: <b>80</b></td> |
| <td>Selects which port to use for HTTP access.</td> | | <td>Selects which port to use for HTTP access.</td> |
Line 337: |
Line 343: |
| </tr>}} | | </tr>}} |
| <tr> | | <tr> |
− | <td>Port</td> | + | <td>HTTPS Port</td> |
| <td>integer [0..65535]; default: <b>443</b></td> | | <td>integer [0..65535]; default: <b>443</b></td> |
| <td>Selects which port to use for HTTPS access.</td> | | <td>Selects which port to use for HTTPS access.</td> |
Line 361: |
Line 367: |
| <td>Server key file.</td> | | <td>Server key file.</td> |
| </tr>}} | | </tr>}} |
| + | <tr> |
| + | <td>Certificate file</td> |
| + | <td><b>Download</b></td> |
| + | <td>Certificate file.</td> |
| + | </tr> |
| </table> | | </table> |
| <br> | | <br> |
− | <b>CLI</b>
| + | ====CLI==== |
| ----{{#switch:{{{series}}} | | ----{{#switch:{{{series}}} |
| |TAP100|TAP200 = [[File:Networking_rutos_manual_administration_access_control_general_cli_tap100.png|border|class=tlt-border]] | | |TAP100|TAP200 = [[File:Networking_rutos_manual_administration_access_control_general_cli_tap100.png|border|class=tlt-border]] |
Line 395: |
Line 406: |
| </tr> | | </tr> |
| </table> | | </table> |
− | <br>{{#switch:{{{series}}}|TAP100|TAP200=|#default= | + | <br> |
− | <b>Telnet</b>
| + | ====Telnet==== |
| ---- | | ---- |
− | [[File:Networking_rutos_manual_administration_access_control_general_telnet.png|border|class=tlt-border]] | + | <b>Note:</b> Telnet is additional software that can be installed from the <b>System → [[{{{name}}} Package Manager|Package Manager]]</b> page. |
| + | {{#switch:{{{series}}}|TAP100|TAP200=|#default= |
| + | [[File:Networking_rutos_manual_administration_access_control_general_telnet.png|border|class=tlt-border]]}} |
| | | |
| <table class="nd-mantable"> | | <table class="nd-mantable"> |
Line 451: |
Line 464: |
| <tr> | | <tr> |
| <td>Type</td> | | <td>Type</td> |
− | <td>Required {{!}} Requisite {{!}} Sufficient {{!}} Optional; default: <b>Required </b></td> | + | <td>Required {{!}} Requisite {{!}} Sufficient {{!}} Optional; default: <b>Optional </b></td> |
| <td>Determines the continuation or failure behavior for the module</td> | | <td>Determines the continuation or failure behavior for the module</td> |
| + | </tr> |
| + | <tr> |
| + | <td><span style="color:red">Radius</span>: Enable for all users</td> |
| + | <td>off {{!}} on; default: <b>off</b></td> |
| + | <td>Turn on PAM authentication for all users. It will allow login with users that are not created on the device.</td> |
| </tr> | | </tr> |
| <tr> | | <tr> |
Line 482: |
Line 500: |
| <b>IP Block Settings</b> | | <b>IP Block Settings</b> |
| ---- | | ---- |
− | [[File:Networking_rutos_manual_administration_access_control_security_v3.png|border|class=tlt-border]] | + | [[File:Networking_rutos_manual_administration_access_control_security_v4.png|border|class=tlt-border]] |
| <table class="nd-mantable"> | | <table class="nd-mantable"> |
| <tr> | | <tr> |
Line 493: |
Line 511: |
| <td>off {{!}} on; default: <b>on</b></td> | | <td>off {{!}} on; default: <b>on</b></td> |
| <td>Enable or disable blocking IP's if they have reached the set amount of failed times.</td> | | <td>Enable or disable blocking IP's if they have reached the set amount of failed times.</td> |
| + | </tr> |
| + | <tr> |
| + | <td>Type</td> |
| + | <td>Timed blocking {{!}} Permanent blocking; default: <b>Timed blocking</b></td> |
| + | <td>You can choose an option of a blocking type.</td> |
| </tr> | | </tr> |
| <tr> | | <tr> |
Line 503: |
Line 526: |
| <td>off {{!}} on; default: <b>off</b></td> | | <td>off {{!}} on; default: <b>off</b></td> |
| <td>If enabled, blocked loging attempts list will be cleared on device reboot.</td> | | <td>If enabled, blocked loging attempts list will be cleared on device reboot.</td> |
− | </tr>
| |
− | <tr>
| |
− | <td>Enable MAC blockig</td>
| |
− | <td>off {{!}} on; default: <b>off</b></td>
| |
− | <td>If enabled, MAC adresses wil be blocked.</td>
| |
| </tr> | | </tr> |
| </table> | | </table> |
Line 513: |
Line 531: |
| <b>Login Attempts</b> | | <b>Login Attempts</b> |
| ---- | | ---- |
− | [[File:Networking_rutos_manual_administration_access_control_security_login.png|border|class=tlt-border]] | + | [[File:Networking_rutos_manual_administration_access_control_security_login_v2.png|border|class=tlt-border]] |
| <table class="nd-mantable"> | | <table class="nd-mantable"> |
| <tr> | | <tr> |
Line 521: |
Line 539: |
| </tr> | | </tr> |
| <tr> | | <tr> |
− | <td>Source address</td> | + | <td>Source</td> |
| <td>IP address</td> | | <td>IP address</td> |
| <td>Shows the IP address from which the connection failed.</td> | | <td>Shows the IP address from which the connection failed.</td> |
| </tr> | | </tr> |
| <tr> | | <tr> |
− | <td>Device port</td>
| + | <td>Destination</td> |
− | <td>Port number</td>
| |
− | <td>Shows the port number from which the connection failed.</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td>Destination address</td> | |
| <td>IP address</td> | | <td>IP address</td> |
| <td>Shows yours device IP adress</td> | | <td>Shows yours device IP adress</td> |
| </tr> | | </tr> |
| <tr> | | <tr> |
− | <td>Protocol</td> | + | <td>Port (protocol)</td> |
− | <td>Connection protocol</td> | + | <td>Port number</td> |
− | <td>Displays the connection protocol used for connection.</td> | + | <td>Shows the port number from which the connection failed.</td> |
| </tr> | | </tr> |
| <tr> | | <tr> |
− | <td>Failed atempts</td> | + | <td>Status</td> |
− | <td>Number</td> | + | <td>Attempt count {{!}} Blocked</td> |
− | <td>Shows the number of failed attempts to connect to device.</td> | + | <td>Shows the number of failed attempts to connect to device. Indicates whether the source address is blocked or not.</td> |
| </tr> | | </tr> |
| <tr> | | <tr> |
− | <td>Status</td>
| |
− | <td>- {{!}} Blocked</td>
| |
− | <td>Indicates whether the source address is blocked or not.</td>
| |
− | </tr>
| |
− | <tr>
| |
| <td>Reset</td> | | <td>Reset</td> |
| <td>Check box</td> | | <td>Check box</td> |
| <td>Allows you to select multiple IP addresses.</td> | | <td>Allows you to select multiple IP addresses.</td> |
| </tr> | | </tr> |
− | <tr> | + | <tr> |
| + | <td>Actions</td> |
| + | <td>-(interactive button)</td> |
| + | <td>Allows you to select multiple IP addresses.</td> |
| + | </tr> |
| + | <tr> |
| <td>Unblock all</td> | | <td>Unblock all</td> |
| <td>-(interactive button)</td> | | <td>-(interactive button)</td> |
− | <td>Unblocks all source adresses from the list.</td> | + | <td>Deletes instance.</td> |
| </tr> | | </tr> |
− | <tr>
| + | <tr> |
| <td>Unblock selected</td> | | <td>Unblock selected</td> |
| <td>-(interactive button)</td> | | <td>-(interactive button)</td> |
Line 604: |
Line 617: |
| After clicking 'Edit' you should be redirected to that phone group's configuration page where you can start adding phone numbers to it. | | After clicking 'Edit' you should be redirected to that phone group's configuration page where you can start adding phone numbers to it. |
| | | |
− | [[File:Networking_rutos_manual_administration_recipients_phone_groups_modify_phone_group.png|border|class=tlt-border]] | + | [[File:Networking_rutos_manual_administration_recipients_phone_groups_modify_phone_group_v2.png|border|class=tlt-border]] |
| | | |
| <table class="nd-mantable"> | | <table class="nd-mantable"> |
Line 708: |
Line 721: |
| The <b>Certificate Generation</b> tab provides the possibility to generate TLS certificates required for secure authentication and communication encryption used by some of the devices services. | | The <b>Certificate Generation</b> tab provides the possibility to generate TLS certificates required for secure authentication and communication encryption used by some of the devices services. |
| | | |
− | There are five distinct generation methods (denoted by the selected 'File Type'). | + | There are six distinct generation methods (denoted by the selected 'File Type'). |
| | | |
| <ol> | | <ol> |
Line 723: |
Line 736: |
| <li><b>Client</b> - generates a client certificate and key. A client certificate validates a client's identity to the server that it's connecting to, while a key is responsible for encryption.</li> | | <li><b>Client</b> - generates a client certificate and key. A client certificate validates a client's identity to the server that it's connecting to, while a key is responsible for encryption.</li> |
| <li><b>DH Parameters</b> - generates a Diffie-Hellman (DH) parameters file. DH parameters are used in symmetric encryption to protect and define how OpenSSL key exchange is performed.</li> | | <li><b>DH Parameters</b> - generates a Diffie-Hellman (DH) parameters file. DH parameters are used in symmetric encryption to protect and define how OpenSSL key exchange is performed.</li> |
| + | <li><b>Let's encrypt</b> - generates SSL certificate.</li> |
| </ol> | | </ol> |
| | | |