Changes

no edit summary
Line 22: Line 22:  
  | TCR1=[[File:Networking_rutos_manual_administration_general_tcr_v2.png|border|class=tlt-border]]
 
  | TCR1=[[File:Networking_rutos_manual_administration_general_tcr_v2.png|border|class=tlt-border]]
 
  | TRB1|TRB2|TRB5=[[File:Networking_rutos_manual_administration_general_trb_v2.png|border|class=tlt-border]]
 
  | TRB1|TRB2|TRB5=[[File:Networking_rutos_manual_administration_general_trb_v2.png|border|class=tlt-border]]
  | #default=[[File:Networking_rutos_manual_administration_general_rut_v2.png|border|class=tlt-border]]
+
  | #default=[[File:Networking_rutos_manual_administration_general_rut_V3.png|border|class=tlt-border]]
 
}}
 
}}
 
<table class="nd-mantable">
 
<table class="nd-mantable">
Line 44: Line 44:  
       <td>Basic {{!}} Advanced; default: <b>Basic</b></td>
 
       <td>Basic {{!}} Advanced; default: <b>Basic</b></td>
 
       <td>Mode determines what options and configurations are shown. In Basic mode only the essential configurations are shown. In Advanced mode there is greater freedom to configure and access more options.</td>
 
       <td>Mode determines what options and configurations are shown. In Basic mode only the essential configurations are shown. In Advanced mode there is greater freedom to configure and access more options.</td>
     </tr>}}
+
     </tr>
 +
    <tr>
 +
      <td>Data Analytics</td>
 +
      <td>Off {{!}} On; default: <b>Off</b></td>
 +
      <td>Enables collecting usage data</td>
 +
    </tr>
 +
    }}
 
     <tr>
 
     <tr>
 
       <th>Device name and hostname</th>
 
       <th>Device name and hostname</th>
Line 262: Line 268:  
{{#switch:{{{series}}}|TAP100|TAP200=|#default=<b>Important</b>: turning on remote access leaves your device vulnerable to external attackers. Make sure you use a strong password.
 
{{#switch:{{{series}}}|TAP100|TAP200=|#default=<b>Important</b>: turning on remote access leaves your device vulnerable to external attackers. Make sure you use a strong password.
 
<br><br>}}
 
<br><br>}}
<b>SSH</b>
+
====SSH====
 
----{{#switch:{{{series}}}
 
----{{#switch:{{{series}}}
 
|TAP100|TAP200 = [[File:Networking_rutos_manual_administration_access_control_general_ssh_tap100_v1.png|border|class=tlt-border]]
 
|TAP100|TAP200 = [[File:Networking_rutos_manual_administration_access_control_general_ssh_tap100_v1.png|border|class=tlt-border]]
Line 277: Line 283:  
         <td>off {{!}} on; default: <b>on</b></td>
 
         <td>off {{!}} on; default: <b>on</b></td>
 
         <td>Turns SSH access from the local network (LAN) on or off.</td>
 
         <td>Turns SSH access from the local network (LAN) on or off.</td>
     </tr>{{#switch:{{{series}}}|TAP100|TAP200=|#default
+
     </tr>{{#switch:{{{series}}}|TAP100|TAP200=|#default=
 
     <tr>
 
     <tr>
 
         <td>Remote SSH access</td>
 
         <td>Remote SSH access</td>
Line 295: Line 301:  
</table>
 
</table>
 
<br>
 
<br>
<b>WebUI</b>
+
====WebUI====
 
----{{#switch:{{{series}}}
 
----{{#switch:{{{series}}}
|TAP100|TAP200 = [[File:Networking_rutos_manual_administration_access_control_general_webui_tap100_v1.png|border|class=tlt-border]]
+
|TAP100|TAP200 = [[File:Networking_rutos_manual_administration_access_control_general_webui_tap100_v2.png|border|class=tlt-border]]
|#default = [[File:Networking_rutos_manual_administration_access_control_general_webui_v1.png|border|class=tlt-border]]}}
+
|#default = [[File:Networking_rutos_manual_administration_access_control_general_webui_v2.png|border|class=tlt-border]]}}
    
<table class="nd-mantable">
 
<table class="nd-mantable">
Line 327: Line 333:  
     </tr>}}
 
     </tr>}}
 
     <tr>
 
     <tr>
         <td>Port</td>
+
         <td>HTTP Port</td>
 
         <td>integer [0..65535]; default: <b>80</b></td>
 
         <td>integer [0..65535]; default: <b>80</b></td>
 
         <td>Selects which port to use for HTTP access.</td>
 
         <td>Selects which port to use for HTTP access.</td>
Line 337: Line 343:  
     </tr>}}
 
     </tr>}}
 
     <tr>
 
     <tr>
         <td>Port</td>
+
         <td>HTTPS Port</td>
 
         <td>integer [0..65535]; default: <b>443</b></td>
 
         <td>integer [0..65535]; default: <b>443</b></td>
 
         <td>Selects which port to use for HTTPS access.</td>
 
         <td>Selects which port to use for HTTPS access.</td>
Line 361: Line 367:  
         <td>Server key file.</td>
 
         <td>Server key file.</td>
 
     </tr>}}
 
     </tr>}}
 +
    <tr>
 +
        <td>Certificate file</td>
 +
        <td><b>Download</b></td>
 +
        <td>Certificate file.</td>
 +
    </tr>
 
</table>
 
</table>
 
<br>
 
<br>
<b>CLI</b>
+
====CLI====
 
----{{#switch:{{{series}}}
 
----{{#switch:{{{series}}}
 
|TAP100|TAP200 = [[File:Networking_rutos_manual_administration_access_control_general_cli_tap100.png|border|class=tlt-border]]
 
|TAP100|TAP200 = [[File:Networking_rutos_manual_administration_access_control_general_cli_tap100.png|border|class=tlt-border]]
Line 395: Line 406:  
     </tr>
 
     </tr>
 
</table>
 
</table>
<br>{{#switch:{{{series}}}|TAP100|TAP200=|#default=
+
<br>
<b>Telnet</b>
+
====Telnet====
 
----
 
----
[[File:Networking_rutos_manual_administration_access_control_general_telnet.png|border|class=tlt-border]]
+
<b>Note:</b> Telnet is additional software that can be installed from the <b>System → [[{{{name}}} Package Manager|Package Manager]]</b> page.
 +
{{#switch:{{{series}}}|TAP100|TAP200=|#default=
 +
[[File:Networking_rutos_manual_administration_access_control_general_telnet.png|border|class=tlt-border]]}}
    
<table class="nd-mantable">
 
<table class="nd-mantable">
Line 451: Line 464:  
     <tr>
 
     <tr>
 
         <td>Type</td>
 
         <td>Type</td>
         <td>Required {{!}} Requisite {{!}} Sufficient {{!}} Optional; default: <b>Required </b></td>
+
         <td>Required {{!}} Requisite {{!}} Sufficient {{!}} Optional; default: <b>Optional </b></td>
 
         <td>Determines the continuation or failure behavior for the module</td>
 
         <td>Determines the continuation or failure behavior for the module</td>
 +
    </tr>
 +
    <tr>
 +
        <td><span style="color:red">Radius</span>: Enable for all users</td>
 +
        <td>off {{!}} on; default: <b>off</b></td>
 +
        <td>Turn on PAM authentication for all users. It will allow login with users that are not created on the device.</td>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
Line 482: Line 500:  
<b>IP Block Settings</b>  
 
<b>IP Block Settings</b>  
 
----
 
----
[[File:Networking_rutos_manual_administration_access_control_security_v3.png|border|class=tlt-border]]
+
[[File:Networking_rutos_manual_administration_access_control_security_v4.png|border|class=tlt-border]]
 
<table class="nd-mantable">
 
<table class="nd-mantable">
 
     <tr>
 
     <tr>
Line 493: Line 511:  
         <td>off {{!}} on; default: <b>on</b></td>
 
         <td>off {{!}} on; default: <b>on</b></td>
 
         <td>Enable or disable blocking IP's if they have reached the set amount of failed times.</td>
 
         <td>Enable or disable blocking IP's if they have reached the set amount of failed times.</td>
 +
    </tr>
 +
    <tr>
 +
        <td>Type</td>
 +
        <td>Timed blocking {{!}} Permanent blocking; default: <b>Timed blocking</b></td>
 +
        <td>You can choose an option of a blocking type.</td>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
Line 503: Line 526:  
         <td>off {{!}} on; default: <b>off</b></td>
 
         <td>off {{!}} on; default: <b>off</b></td>
 
         <td>If enabled, blocked loging attempts list will be cleared on device reboot.</td>
 
         <td>If enabled, blocked loging attempts list will be cleared on device reboot.</td>
    </tr>
  −
    <tr>
  −
        <td>Enable MAC blockig</td>
  −
        <td>off {{!}} on; default: <b>off</b></td>
  −
        <td>If enabled, MAC adresses wil be blocked.</td>
   
     </tr>
 
     </tr>
 
</table>
 
</table>
Line 513: Line 531:  
<b>Login Attempts</b>
 
<b>Login Attempts</b>
 
----
 
----
[[File:Networking_rutos_manual_administration_access_control_security_login.png|border|class=tlt-border]]
+
[[File:Networking_rutos_manual_administration_access_control_security_login_v2.png|border|class=tlt-border]]
 
<table class="nd-mantable">
 
<table class="nd-mantable">
 
     <tr>
 
     <tr>
Line 521: Line 539:  
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
         <td>Source address</td>
+
         <td>Source</td>
 
         <td>IP address</td>
 
         <td>IP address</td>
 
         <td>Shows the IP address from which the connection failed.</td>
 
         <td>Shows the IP address from which the connection failed.</td>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
        <td>Device port</td>
+
         <td>Destination</td>
        <td>Port number</td>
  −
        <td>Shows the port number from which the connection failed.</td>
  −
    </tr>
  −
    <tr>
  −
         <td>Destination address</td>
   
         <td>IP address</td>
 
         <td>IP address</td>
 
         <td>Shows yours device IP adress</td>
 
         <td>Shows yours device IP adress</td>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
         <td>Protocol</td>
+
         <td>Port (protocol)</td>
         <td>Connection protocol</td>
+
         <td>Port number</td>
         <td>Displays the connection protocol used for connection.</td>
+
         <td>Shows the port number from which the connection failed.</td>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
         <td>Failed atempts</td>
+
         <td>Status</td>
         <td>Number</td>
+
         <td>Attempt count {{!}} Blocked</td>
         <td>Shows the number of failed attempts to connect to device.</td>
+
         <td>Shows the number of failed attempts to connect to device. Indicates whether the source address is blocked or not.</td>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
        <td>Status</td>
  −
        <td>- {{!}} Blocked</td>
  −
        <td>Indicates whether the source address is blocked or not.</td>
  −
    </tr>
  −
        <tr>
   
         <td>Reset</td>
 
         <td>Reset</td>
 
         <td>Check box</td>
 
         <td>Check box</td>
 
         <td>Allows you to select multiple IP addresses.</td>
 
         <td>Allows you to select multiple IP addresses.</td>
 
     </tr>
 
     </tr>
         <tr>
+
    <tr>
 +
         <td>Actions</td>
 +
        <td>-(interactive button)</td>
 +
        <td>Allows you to select multiple IP addresses.</td>
 +
    </tr>
 +
    <tr>
 
         <td>Unblock all</td>
 
         <td>Unblock all</td>
 
         <td>-(interactive button)</td>
 
         <td>-(interactive button)</td>
         <td>Unblocks all source adresses from the list.</td>
+
         <td>Deletes instance.</td>
 
     </tr>
 
     </tr>
        <tr>
+
    <tr>
 
         <td>Unblock selected</td>
 
         <td>Unblock selected</td>
 
         <td>-(interactive button)</td>
 
         <td>-(interactive button)</td>
Line 604: Line 617:  
After clicking 'Edit' you should be redirected to that phone group's configuration page where you can start adding phone numbers to it.
 
After clicking 'Edit' you should be redirected to that phone group's configuration page where you can start adding phone numbers to it.
   −
[[File:Networking_rutos_manual_administration_recipients_phone_groups_modify_phone_group.png|border|class=tlt-border]]
+
[[File:Networking_rutos_manual_administration_recipients_phone_groups_modify_phone_group_v2.png|border|class=tlt-border]]
    
<table class="nd-mantable">
 
<table class="nd-mantable">
Line 708: Line 721:  
The <b>Certificate Generation</b> tab provides the possibility to generate TLS certificates required for secure authentication and communication encryption used by some of the devices services.
 
The <b>Certificate Generation</b> tab provides the possibility to generate TLS certificates required for secure authentication and communication encryption used by some of the devices services.
   −
There are five distinct generation methods (denoted by the selected 'File Type').  
+
There are six distinct generation methods (denoted by the selected 'File Type').  
    
<ol>
 
<ol>
Line 723: Line 736:  
     <li><b>Client</b> - generates a client certificate and key. A client certificate validates a client's identity to the server that it's connecting to, while a key is responsible for encryption.</li>
 
     <li><b>Client</b> - generates a client certificate and key. A client certificate validates a client's identity to the server that it's connecting to, while a key is responsible for encryption.</li>
 
     <li><b>DH Parameters</b> - generates a Diffie-Hellman (DH) parameters file. DH parameters are used in symmetric encryption to protect and define how OpenSSL key exchange is performed.</li>
 
     <li><b>DH Parameters</b> - generates a Diffie-Hellman (DH) parameters file. DH parameters are used in symmetric encryption to protect and define how OpenSSL key exchange is performed.</li>
 +
    <li><b>Let's encrypt</b> - generates SSL certificate.</li>
 
</ol>
 
</ol>