Changes

Line 1: Line 1:  
<!--- {{{series}}}, {{{name}}} --->
 
<!--- {{{series}}}, {{{name}}} --->
{{Template: Networking_rutos_manual_fw_disclosure
+
{{Template: Networking_device_manual_fw_disclosure
| fw_version ={{Template: Networking_rutos_manual_latest_fw
+
| series = {{{series}}}
 +
| name  = {{{name}}}
 +
| fw_version ={{Template: Networking_device_manual_latest_fw
 
  | series = {{{series}}}
 
  | series = {{{series}}}
 
  | name  = {{{name}}}
 
  | name  = {{{name}}}
 
  }}
 
  }}
 
}}
 
}}
{{#ifeq: {{{series}}} | RUT9 |<br><i><b>Note</b>: <b>[[{{{name}}} Administration (legacy WebUI)|click here]]</b> for the old style WebUI (FW version {{Template: Networking_rutos_manual_latest_fw | series = RUT9XX}} and earlier) user manual page.</i>|}}
+
{{#ifeq: {{{series}}} | RUT9 |<br><i><b>Note</b>: <b>[[{{{name}}} Administration (legacy WebUI)|click here]]</b> for the old style WebUI (FW version {{Template: Networking_device_manual_latest_fw | series = RUT9XX}} and earlier) user manual page.</i>|}}
{{#ifeq: {{{series}}} | RUT2 |<br><i><b>Note</b>: <b>[[{{{name}}} Administration (legacy WebUI)|click here]]</b> for the old style WebUI (FW version {{Template: Networking_rutos_manual_latest_fw | series = RUT2XX}} and earlier) user manual page.</i>|}}
+
{{#ifeq: {{{series}}} | RUT2 |<br><i><b>Note</b>: <b>[[{{{name}}} Administration (legacy WebUI)|click here]]</b> for the old style WebUI (FW version {{Template: Networking_device_manual_latest_fw | series = RUT2XX}} and earlier) user manual page.</i>|}}
 +
__TOC__
 
==Summary==
 
==Summary==
   Line 16: Line 19:  
The <b>General</b> section is used to set up some of device managerial parameters, such as changing device name. For more information on the General section, refer to figure and table below.
 
The <b>General</b> section is used to set up some of device managerial parameters, such as changing device name. For more information on the General section, refer to figure and table below.
 
{{#switch:{{{series}}}
 
{{#switch:{{{series}}}
  | TAP100=[[File:Networking_rutos_manual_administration_general_tap100_v1.png|border|class=tlt-border]]
+
  | TAP100|TAP200=[[File:Networking_rutos_manual_administration_general_tap100_v2.png|border|class=tlt-border]]
  | TCR1=[[File:Networking_rutos_manual_administration_general_tcr_v2.png|border|class=tlt-border]]
+
  | TCR1=[[File:Networking_rutos_manual_administration_general_tcr_v3.png|border|class=tlt-border]]
  | TRB1|TRB2|TRB5=[[File:Networking_rutos_manual_administration_general_trb_v2.png|border|class=tlt-border]]
+
  | TRB1|TRB2|TRB5=[[File:Networking_rutos_manual_administration_general_trb_v3.png|border|class=tlt-border]]
  | #default=[[File:Networking_rutos_manual_administration_general_rut_v2.png|border|class=tlt-border]]
+
  | #default=[[File:Networking_rutos_manual_administration_general_rut_v4.png|border|class=tlt-border]]
 
}}
 
}}
 
<table class="nd-mantable">
 
<table class="nd-mantable">
Line 26: Line 29:  
       <th>Value</th>
 
       <th>Value</th>
 
       <th>Description</th>
 
       <th>Description</th>
     </tr>{{#ifeq:{{{series}}}|TAP100||
+
     </tr>{{#switch:{{{series}}}|TAP100|TAP200=|#default=
 
     <tr>
 
     <tr>
 
       <th>General Settings</th>
 
       <th>General Settings</th>
Line 41: Line 44:  
       <td>Basic {{!}} Advanced; default: <b>Basic</b></td>
 
       <td>Basic {{!}} Advanced; default: <b>Basic</b></td>
 
       <td>Mode determines what options and configurations are shown. In Basic mode only the essential configurations are shown. In Advanced mode there is greater freedom to configure and access more options.</td>
 
       <td>Mode determines what options and configurations are shown. In Basic mode only the essential configurations are shown. In Advanced mode there is greater freedom to configure and access more options.</td>
     </tr>}}
+
     </tr>
 +
    <tr>
 +
      <td>Data Analytics</td>
 +
      <td>Off {{!}} On; default: <b>Off</b></td>
 +
      <td>Enables the collection of data, which is used to improve the quality and user experience of our products. It includes sending information about the device and the usage of the Web interface. The data is collected in compliance with the Privacy policy.</td>
 +
    </tr>
 +
    }}
 
     <tr>
 
     <tr>
 
       <th>Device name and hostname</th>
 
       <th>Device name and hostname</th>
Line 84: Line 93:  
</table>
 
</table>
   −
{{#ifeq:{{{series}}}|TAP100||<span class="asterisk">*</span> Different language packages can be downloaded separately from the <b>Services → [[{{{name}}} Package Manager|Package Manager]]</b> page.}}
+
{{#switch:{{{series}}}|TAP100|TAP200=|#default=<span class="asterisk">*</span> Different language packages can be downloaded separately from the <b>System → [[{{{name}}} Package Manager|Package Manager]]</b> page.}}
    
==Date & Time==
 
==Date & Time==
Line 98: Line 107:  
provides information about the fields contained in that section:
 
provides information about the fields contained in that section:
   −
[[File:Networking_rutos_ntp_general_gps_{{{gps}}}.png|border|class=tlt-border]]
+
[[File:Networking_rutos_ntp_general_gps_{{{gps}}}_v2.png|border|class=tlt-border]]
    
<table class="nd-mantable">
 
<table class="nd-mantable">
Line 114: Line 123:  
       <td>Sync with browser</td>
 
       <td>Sync with browser</td>
 
       <td>-(interactive button)</td>
 
       <td>-(interactive button)</td>
       <td>Click to synchronize device time and time zone to browsers, if your device time or time zone is not correct.<br>
+
       <td>Click to synchronize device time and time zone to browsers, if your device time or time zone is not correct.<br></td>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
Line 126: Line 135:  
         <td>off {{!}} on; default: <b>off</b></td>
 
         <td>off {{!}} on; default: <b>off</b></td>
 
         <td>Enables periodic time synchronization for the system using the GPS module which does not require an Internet connection.</td>
 
         <td>Enables periodic time synchronization for the system using the GPS module which does not require an Internet connection.</td>
     </tr>
+
     </tr>|}}
|}}
   
</table>
 
</table>
 +
 
===NTP===
 
===NTP===
 
----
 
----
Line 190: Line 199:  
This section is used to specify which time servers the device will use for time synchronization. To add more time servers to the list, click the 'Add' button.
 
This section is used to specify which time servers the device will use for time synchronization. To add more time servers to the list, click the 'Add' button.
   −
{{#ifeq:{{{series}}}|TAP100|[[File:Networking_rutos_ntp_ntp_time_servers_tap100.png|border|class=tlt-border]]|[[File:Networking_rutos_ntp_ntp_time_servers.png|border|class=tlt-border]]}}
+
{{#switch:{{{series}}}|TAP100|TAP200=[[File:Networking_rutos_ntp_ntp_time_servers_tap100_v2.png|border|class=tlt-border]]|#default=[[File:Networking_rutos_ntp_ntp_time_servers_v2.png|border|class=tlt-border]]}}
 
<table class="nd-mantable">
 
<table class="nd-mantable">
 
     <tr>
 
     <tr>
Line 204: Line 213:  
</table>
 
</table>
   −
{{#ifeq:{{{series}}}|TAP100||====NTP Server====
+
{{#switch:{{{series}}}|TAP100|TAP200=|#default= ====NTP Server====
 
----
 
----
 
The device can also act as an <b>NTP Server</b>, providing clock synchronization to other devices in the network. From this section you can turn this feature on or off:
 
The device can also act as an <b>NTP Server</b>, providing clock synchronization to other devices in the network. From this section you can turn this feature on or off:
    
[[File:Networking_rutos_ntp_ntp_server.png|border|class=tlt-border]]}}
 
[[File:Networking_rutos_ntp_ntp_server.png|border|class=tlt-border]]}}
{{#ifeq:{{{series}}}|TAP100||===NTPD===
+
{{#switch:{{{series}}}|TAP100|TAP200=|#default= ===NTPD===
 
----
 
----
 
The <b>NTPD</b> program is an operating system daemon that synchronizes the system clock to remote NTP time servers or local reference clocks. NTPD includes the ability to use this to keep your clock in sync and will run more accurately than a clock on a device not running NTPD. NTPD will also use several servers to improve accuracy. It is a complete implementation of NTP version 4 defined by RFC-5905, but also retains compatible with version 3 defined by RFC-1305 and versions 1 and 2, defined by RFC-1059 and RFC-1119, respectively.
 
The <b>NTPD</b> program is an operating system daemon that synchronizes the system clock to remote NTP time servers or local reference clocks. NTPD includes the ability to use this to keep your clock in sync and will run more accurately than a clock on a device not running NTPD. NTPD will also use several servers to improve accuracy. It is a complete implementation of NTP version 4 defined by RFC-5905, but also retains compatible with version 3 defined by RFC-1305 and versions 1 and 2, defined by RFC-1059 and RFC-1119, respectively.
   −
<b>Note:</b> NTPD is additional software that can be installed from the <b>Services → [[{{{name}}} Package Manager|Package Manager]]</b> page.
+
<b>Note:</b> NTPD is additional software that can be installed from the <b>System → [[{{{name}}} Package Manager|Package Manager]]</b> page.
[[File:Networking_rutos_ntp_ntpd.png|border|class=tlt-border]]
+
[[File:Networking_rutos_ntp_ntpd_v2.png|border|class=tlt-border]]
    
<table class="nd-mantable">
 
<table class="nd-mantable">
Line 251: Line 260:  
==User Settings==
 
==User Settings==
   −
{{Template: Networking_rutos_manual_users | series = {{{series}}} | name = {{{name}}}}}
+
{{Template: Networking_rutos_manual_users | series = {{{series}}} | name = {{{name}}} | wifi = {{{wifi}}} | mobile = {{{mobile}}}}}
    
==Access Control==
 
==Access Control==
 
===General===
 
===General===
 
----
 
----
The <b>Access Control</b> page is used to manage {{#ifeq:{{{series}}}|TAP100||remote and}} local access to device.
+
The <b>Access Control</b> page is used to manage {{#switch:{{{series}}}|TAP100|TAP200=|#default= remote and}} local access to device.
   −
{{#ifeq:{{{series}}}|TAP100||<b>Important</b>: turning on remote access leaves your device vulnerable to external attackers. Make sure you use a strong password.
+
{{#switch:{{{series}}}
 +
|TAP100|TAP200 = [[File:Networking rutos manual administration access control general tap v1.png|border|class=tlt-border]]
 +
|#default = [[File:Networking rutos manual administration access control general v1.png|border|class=tlt-border]]}}
 +
 
 +
{{#switch:{{{series}}}|TAP100|TAP200=|#default=<b>Important</b>: turning on remote access leaves your device vulnerable to external attackers. Make sure you use a strong password.
 
<br><br>}}
 
<br><br>}}
 
<b>SSH</b>
 
<b>SSH</b>
 
----{{#switch:{{{series}}}
 
----{{#switch:{{{series}}}
|TAP100 = [[File:Networking_rutos_manual_administration_access_control_general_ssh_tap100_v1.png|border|class=tlt-border]]
+
|TAP100|TAP200 = [[File:Networking_rutos_manual_administration_access_control_general_ssh_tap100_v3.png|border|class=tlt-border]]
|#default = [[File:Networking_rutos_manual_administration_access_control_general_ssh_v1.png|border|class=tlt-border]]}}
+
|#default = [[File:Networking_rutos_manual_administration_access_control_general_ssh_v3.png|border|class=tlt-border]]}}
    
<table class="nd-mantable">
 
<table class="nd-mantable">
Line 275: Line 288:  
         <td>off {{!}} on; default: <b>on</b></td>
 
         <td>off {{!}} on; default: <b>on</b></td>
 
         <td>Turns SSH access from the local network (LAN) on or off.</td>
 
         <td>Turns SSH access from the local network (LAN) on or off.</td>
     </tr>{{#ifeq:{{{series}}}|TAP100||
+
     </tr>{{#switch:{{{series}}}|TAP100|TAP200=|#default=
 
     <tr>
 
     <tr>
 
         <td>Remote SSH access</td>
 
         <td>Remote SSH access</td>
Line 287: Line 300:  
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
         <td>Enable key-based authentication</td>
+
         <td>Authentication type</td>
         <td>off {{!}} on; default: <b>off</b></td>
+
         <td>Password {{!}} <span style="color:blue">Key-based only</span> {{!}} <span style="color:blue">Use both</span>; default: <b>Password</b></td>
         <td>Use public keys for authentication.</td>
+
         <td>
 +
            <li><b>Password</b> - SSH access with password for root user</li>
 +
            <li><b>Key-based only</b> - enables key-based authentication only and disables password authentication for root user</li>
 +
            <li><b>Use Both</b> - use both password and public keys for authentication</li>
 +
        </td>
 +
    </tr>
 +
    <tr>
 +
        <td><span style="color:blue">Public keys</span></td>
 +
        <td>-(input field)</td>
 +
        <td>Public keys for ssh key-based authentication. Each individual key must be specified on a new line.</td>
 
     </tr>
 
     </tr>
 
</table>
 
</table>
 
<br>
 
<br>
<b>WebUI</b>
+
<b>HTTP</b>
 
----{{#switch:{{{series}}}
 
----{{#switch:{{{series}}}
|TAP100 = [[File:Networking_rutos_manual_administration_access_control_general_webui_tap100_v1.png|border|class=tlt-border]]
+
|TAP100|TAP200 = [[File:Networking rutos manual administration access control general http tap v1.png|border|class=tlt-border]]
|#default = [[File:Networking_rutos_manual_administration_access_control_general_webui_v1.png|border|class=tlt-border]]}}
+
|#default = [[File:Networking rutos manual administration access control general http v1.png|border|class=tlt-border]]}}
    
<table class="nd-mantable">
 
<table class="nd-mantable">
Line 308: Line 330:  
         <td>off {{!}} on; default: <b>on</b></td>
 
         <td>off {{!}} on; default: <b>on</b></td>
 
         <td>Turns HTTP access from the local network (LAN) to the device WebUI on or off.</td>
 
         <td>Turns HTTP access from the local network (LAN) to the device WebUI on or off.</td>
 +
    </tr>{{#switch:{{{series}}}|TAP100|TAP200=|#default=
 +
    <tr>
 +
        <td>Enable remote HTTP access</td>
 +
        <td>off {{!}} on; default: <b>off</b></td>
 +
        <td>Turns HTTP access from remote networks (WAN) to the device WebUI on or off.</td>
 +
    </tr>}}
 +
    <tr>
 +
        <td>HTTP Port</td>
 +
        <td>integer [0..65535]; default: <b>80</b></td>
 +
        <td>Selects which port to use for HTTP access.</td>
 +
    </tr>{{#switch:{{{series}}}|TAP100|TAP200=|#default=
 +
    <tr>
 +
        <td>Ignore private IPs on public interface</td>
 +
        <td>off {{!}} on; default: <b>on</b></td>
 +
        <td>Prevent access from private (RFC1918) IPs on an interface if it has an public IP address.</td>
 +
    </tr>}}
 +
</table>
 +
 +
<br>
 +
<b>HTTPS/b>
 +
----{{#switch:{{{series}}}
 +
|TAP100|TAP200 = [[File:Networking rutos manual administration access control general https tap v1.png|border|class=tlt-border]]
 +
|#default = [[File:Networking rutos manual administration access control general https v1.png|border|class=tlt-border]]}}
 +
 +
<table class="nd-mantable">
 +
    <tr>
 +
        <th>Field</th>
 +
      <th>Value</th>
 +
      <th>Description</th>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
Line 318: Line 369:  
         <td>off {{!}} on; default: <b>off</b></td>
 
         <td>off {{!}} on; default: <b>off</b></td>
 
         <td>Redirects connection attempts from HTTP to HTTPS.</td>
 
         <td>Redirects connection attempts from HTTP to HTTPS.</td>
     </tr>{{#ifeq:{{{series}}}|TAP100||
+
     </tr>{{#switch:{{{series}}}|TAP100|TAP200=|#default=
    <tr>
  −
        <td>Enable remote HTTP access</td>
  −
        <td>off {{!}} on; default: <b>off</b></td>
  −
        <td>Turns HTTP access from remote networks (WAN) to the device WebUI on or off.</td>
  −
    </tr>}}
  −
    <tr>
  −
        <td>Port</td>
  −
        <td>integer [0..65535]; default: <b>80</b></td>
  −
        <td>Selects which port to use for HTTP access.</td>
  −
    </tr>{{#ifeq:{{{series}}}|TAP100||
   
     <tr>
 
     <tr>
 
         <td>Enable remote HTTPS access</td>
 
         <td>Enable remote HTTPS access</td>
Line 335: Line 376:  
     </tr>}}
 
     </tr>}}
 
     <tr>
 
     <tr>
         <td>Port</td>
+
         <td>HTTPS Port</td>
 
         <td>integer [0..65535]; default: <b>443</b></td>
 
         <td>integer [0..65535]; default: <b>443</b></td>
 
         <td>Selects which port to use for HTTPS access.</td>
 
         <td>Selects which port to use for HTTPS access.</td>
     </tr>{{#ifeq:{{{series}}}|TAP100||
+
     </tr>{{#switch:{{{series}}}|TAP100|TAP200=|#default=
 
     <tr>
 
     <tr>
 
         <td>Ignore private IPs on public interface</td>
 
         <td>Ignore private IPs on public interface</td>
 
         <td>off {{!}} on; default: <b>on</b></td>
 
         <td>off {{!}} on; default: <b>on</b></td>
 
         <td>Prevent access from private (RFC1918) IPs on an interface if it has an public IP address.</td>
 
         <td>Prevent access from private (RFC1918) IPs on an interface if it has an public IP address.</td>
     </tr>}}{{#ifeq:{{{series}}}|TAP100||
+
     </tr>}}{{#switch:{{{series}}}|TAP100|TAP200=|#default=
 
     <tr>
 
     <tr>
 
         <td>Certificate files from device</td>
 
         <td>Certificate files from device</td>
 
         <td>off {{!}} on; default: <b>on</b></td>
 
         <td>off {{!}} on; default: <b>on</b></td>
 
         <td>Choose this option if you want to select certificate files from device. Certificate files can be generated in [[{{{name}}} Administration#Certificates|Certificates]] section.</td>
 
         <td>Choose this option if you want to select certificate files from device. Certificate files can be generated in [[{{{name}}} Administration#Certificates|Certificates]] section.</td>
     </tr>}}{{#ifeq:{{{series}}}|TAP100||
+
     </tr>}}{{#switch:{{{series}}}|TAP100|TAP200=|#default=
 
     <tr>
 
     <tr>
 
         <td>Server certificate</td>
 
         <td>Server certificate</td>
 
         <td>.crt; default: <b>uhttpd.crt</b></td>
 
         <td>.crt; default: <b>uhttpd.crt</b></td>
 
         <td>Server certificate file.</td>
 
         <td>Server certificate file.</td>
     </tr>}}{{#ifeq:{{{series}}}|TAP100||
+
     </tr>}}{{#switch:{{{series}}}|TAP100|TAP200=|#default=
 
     <tr>
 
     <tr>
 
         <td>Server key</td>
 
         <td>Server key</td>
Line 359: Line 400:  
         <td>Server key file.</td>
 
         <td>Server key file.</td>
 
     </tr>}}
 
     </tr>}}
 +
    <tr>
 +
        <td>Certificate file</td>
 +
        <td>.crt; default: <b>uhttpd.crt</b></td>
 +
        <td>Download certificate file from device. Used for browsers to reach HTTPS connection.</td>
 +
    </tr>
 
</table>
 
</table>
 +
 
<br>
 
<br>
 
<b>CLI</b>
 
<b>CLI</b>
 
----{{#switch:{{{series}}}
 
----{{#switch:{{{series}}}
|TAP100 = [[File:Networking_rutos_manual_administration_access_control_general_cli_tap100.png|border|class=tlt-border]]
+
|TAP100|TAP200 = [[File:Networking_rutos_manual_administration_access_control_general_cli_tap100_v2.png|border|class=tlt-border]]
|#default = [[File:Networking_rutos_manual_administration_access_control_general_cli.png|border|class=tlt-border]]}}
+
|#default = [[File:Networking_rutos_manual_administration_access_control_general_cli_v2.png|border|class=tlt-border]]}}
    
<table class="nd-mantable">
 
<table class="nd-mantable">
Line 376: Line 423:  
         <td>off {{!}} on; default: <b>on</b></td>
 
         <td>off {{!}} on; default: <b>on</b></td>
 
         <td>Turns CLI access from the local network (LAN) on or off.</td>
 
         <td>Turns CLI access from the local network (LAN) on or off.</td>
     </tr>{{#ifeq:{{{series}}}|TAP100||
+
     </tr>{{#switch:{{{series}}}|TAP100|TAP200=|#default=
 
     <tr>
 
     <tr>
 
         <td>Enable remote CLI</td>
 
         <td>Enable remote CLI</td>
Line 393: Line 440:  
     </tr>
 
     </tr>
 
</table>
 
</table>
<br>{{#ifeq:{{{series}}}|TAP100||
+
<br>{{#switch:{{{series}}}|TAP100|TAP200=|#default=
 
<b>Telnet</b>
 
<b>Telnet</b>
 
----
 
----
[[File:Networking_rutos_manual_administration_access_control_general_telnet.png|border|class=tlt-border]]
+
[[File:Networking_rutos_manual_administration_access_control_general_telnet v2.png|border|class=tlt-border]]
    
<table class="nd-mantable">
 
<table class="nd-mantable">
Line 423: Line 470:  
===PAM===
 
===PAM===
 
----
 
----
<b>Note:</b> PAM is additional software that can be installed from the <b>Services → [[{{{name}}} Package Manager|Package Manager]]</b> page.
+
<b>Note:</b> PAM is additional software that can be installed from the <b>System → [[{{{name}}} Package Manager|Package Manager]]</b> page.
   −
[[File:Networking_rutos_manual_administration_access_control_pam_v1.png|border|class=tlt-border]]
+
[[File:Networking_rutos_manual_administration_access_control_pam_v3.png|border|class=tlt-border]]
    
====Modify PAM Auth====
 
====Modify PAM Auth====
 
----
 
----
[[File:Networking_rutos_manual_administration_access_control_pam_modify_pam_auth_v1.png|border|class=tlt-border]]
+
[[File:Networking_rutos_manual_administration_access_control_pam_modify_pam_auth_v2.png|border|class=tlt-border]]
    
<table class="nd-mantable">
 
<table class="nd-mantable">
Line 449: Line 496:  
     <tr>
 
     <tr>
 
         <td>Type</td>
 
         <td>Type</td>
         <td>Required {{!}} Requisite {{!}} Sufficient {{!}} Optional; default: <b>Required </b></td>
+
         <td>Required {{!}} Requisite {{!}} Sufficient {{!}} Optional; default: <b>Optional </b></td>
 
         <td>Determines the continuation or failure behavior for the module</td>
 
         <td>Determines the continuation or failure behavior for the module</td>
 +
    </tr>
 +
    <tr>
 +
        <td><span style="color:red">Radius</span>: Enable for all users</td>
 +
        <td>off {{!}} on; default: <b>off</b></td>
 +
        <td>Turn on PAM authentication for all users. It will allow login with users that are not created on the device.</td>
 +
    </tr>
 +
    <tr>
 +
        <td><span style="color:red">Radius</span>: Require Message-Authenticator</td>
 +
        <td>off {{!}} on; default: <b>on</b></td>
 +
        <td>Require and validate Message-Authenticator RADIUS attribute on Access-Request replies.</td>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
Line 463: Line 520:  
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
         <td><span style="color:red">Radius</span>: Port</td>
+
         <td><span style="color:blue">TACACS+</span>/<span style="color:red">Radius</span>: Port</td>
         <td>integer [0..65535]; default: <b>1812</b></td>
+
         <td>integer [0..65535]; default: <b><span style="color:blue">49</span>/<span style="color:red">1812</span></b></td>
 
         <td>RADIUS server authentication port</td>
 
         <td>RADIUS server authentication port</td>
 
     </tr>
 
     </tr>
Line 480: Line 537:  
<b>IP Block Settings</b>  
 
<b>IP Block Settings</b>  
 
----
 
----
[[File:Networking_rutos_manual_administration_access_control_security_v3.png|border|class=tlt-border]]
+
[[File:Networking rutos manual administration access control security settings v1.png|border|class=tlt-border]]
 
<table class="nd-mantable">
 
<table class="nd-mantable">
 
     <tr>
 
     <tr>
Line 491: Line 548:  
         <td>off {{!}} on; default: <b>on</b></td>
 
         <td>off {{!}} on; default: <b>on</b></td>
 
         <td>Enable or disable blocking IP's if they have reached the set amount of failed times.</td>
 
         <td>Enable or disable blocking IP's if they have reached the set amount of failed times.</td>
 +
    </tr>
 +
    <tr>
 +
        <td>Type</td>
 +
        <td>Timed blocking {{!}} Permanent blocking; default: <b>Timed blocking</b></td>
 +
        <td>You can choose an option of a blocking type.</td>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
Line 501: Line 563:  
         <td>off {{!}} on; default: <b>off</b></td>
 
         <td>off {{!}} on; default: <b>off</b></td>
 
         <td>If enabled, blocked loging attempts list will be cleared on device reboot.</td>
 
         <td>If enabled, blocked loging attempts list will be cleared on device reboot.</td>
    </tr>
  −
    <tr>
  −
        <td>Enable MAC blockig</td>
  −
        <td>off {{!}} on; default: <b>off</b></td>
  −
        <td>If enabled, MAC adresses wil be blocked.</td>
   
     </tr>
 
     </tr>
 
</table>
 
</table>
Line 511: Line 568:  
<b>Login Attempts</b>
 
<b>Login Attempts</b>
 
----
 
----
[[File:Networking_rutos_manual_administration_access_control_security_login.png|border|class=tlt-border]]
+
[[File:Networking_rutos_manual_administration_access_control_security_login_v2.png|border|class=tlt-border]]
 
<table class="nd-mantable">
 
<table class="nd-mantable">
 
     <tr>
 
     <tr>
Line 519: Line 576:  
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
         <td>Source address</td>
+
         <td>Source</td>
 
         <td>IP address</td>
 
         <td>IP address</td>
 
         <td>Shows the IP address from which the connection failed.</td>
 
         <td>Shows the IP address from which the connection failed.</td>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
        <td>Device port</td>
+
         <td>Destination</td>
        <td>Port number</td>
  −
        <td>Shows the port number from which the connection failed.</td>
  −
    </tr>
  −
    <tr>
  −
         <td>Destination address</td>
   
         <td>IP address</td>
 
         <td>IP address</td>
 
         <td>Shows yours device IP adress</td>
 
         <td>Shows yours device IP adress</td>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
         <td>Protocol</td>
+
         <td>Port (protocol)</td>
         <td>Connection protocol</td>
+
         <td>Port number</td>
         <td>Displays the connection protocol used for connection.</td>
+
         <td>Shows the port number from which the connection failed.</td>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
         <td>Failed atempts</td>
+
         <td>Status</td>
         <td>Number</td>
+
         <td>Attempt count {{!}} Blocked</td>
         <td>Shows the number of failed attempts to connect to device.</td>
+
         <td>Shows the number of failed attempts to connect to device. Indicates whether the source address is blocked or not.</td>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
        <td>Status</td>
  −
        <td>- {{!}} Blocked</td>
  −
        <td>Indicates whether the source address is blocked or not.</td>
  −
    </tr>
  −
        <tr>
   
         <td>Reset</td>
 
         <td>Reset</td>
 
         <td>Check box</td>
 
         <td>Check box</td>
 
         <td>Allows you to select multiple IP addresses.</td>
 
         <td>Allows you to select multiple IP addresses.</td>
 
     </tr>
 
     </tr>
         <tr>
+
    <tr>
 +
         <td>Actions</td>
 +
        <td>-(interactive button)</td>
 +
        <td>Allows you to select multiple IP addresses.</td>
 +
    </tr>
 +
    <tr>
 
         <td>Unblock all</td>
 
         <td>Unblock all</td>
 
         <td>-(interactive button)</td>
 
         <td>-(interactive button)</td>
         <td>Unblocks all source adresses from the list.</td>
+
         <td>Deletes instance.</td>
 
     </tr>
 
     </tr>
        <tr>
+
    <tr>
 
         <td>Unblock selected</td>
 
         <td>Unblock selected</td>
 
         <td>-(interactive button)</td>
 
         <td>-(interactive button)</td>
Line 565: Line 617:  
</table>
 
</table>
   −
{{#ifeq:{{{series}}}|TAP100|===Device Pairing===
+
{{#switch:{{{series}}}|TAP100|TAP200= ===Device Pairing===
 
----
 
----
[[File:Networking_rutos_manual_administration_access_control_pairing_v2.png|border|class=tlt-border]]
+
[[File:Networking_rutos_manual_administration_access_control_pairing_v3.png|border|class=tlt-border]]
 
<table class="nd-mantable">
 
<table class="nd-mantable">
 
     <tr>
 
     <tr>
Line 579: Line 631:  
         <td>Enable or disable device pairing.</td>
 
         <td>Enable or disable device pairing.</td>
 
     </tr>
 
     </tr>
</table>|}}
+
</table>|#default=}}
   −
{{#ifeq:{{{series}}}|TAP100||
+
{{#switch:{{{series}}}|TAP100|TAP200=|#default=
 
==Recipients==
 
==Recipients==
   Line 596: Line 648:  
     <li>Enter a custom name for the phone group into the 'Name' field.</li>
 
     <li>Enter a custom name for the phone group into the 'Name' field.</li>
 
     <li>Click the 'Add' button.</li>
 
     <li>Click the 'Add' button.</li>
    <li>Click the 'Edit' button next to the newly added phone group.</li>
   
</ol>
 
</ol>
   −
[[File:Networking_rutos_manual_administration_recipients_phone_groups_add_button_edit_button.png|border|class=tlt-border]]
+
[[File:Networking_rutos_manual_administration_recipients_phone_groups_add_button.png|border|class=tlt-border]]
    
After clicking 'Edit' you should be redirected to that phone group's configuration page where you can start adding phone numbers to it.
 
After clicking 'Edit' you should be redirected to that phone group's configuration page where you can start adding phone numbers to it.
   −
[[File:Networking_rutos_manual_administration_recipients_phone_groups_modify_phone_group.png|border|class=tlt-border]]
+
[[File:Networking_rutos_manual_administration_recipients_phone_groups_modify_phone_group_v2.png|border|class=tlt-border]]
    
<table class="nd-mantable">
 
<table class="nd-mantable">
Line 623: Line 674:  
</table>
 
</table>
   −
===Email Accounts===
+
===Email Users===
 
----
 
----
 
When email related services{{#ifeq:{{{events_reporting}}}|0|&nbsp;|&nbsp;(such as [[{{{name}}} Events Reporting|Events Reporting]])&nbsp;}}are used, the device logs in to the specified email account and reads the inbox (e.g., Email to SMS) or sends out a message (e.g., SMS to Email) depending on the configured service. In this context, an <b>Email Account</b> is an configuration instance that contains the necessary data required in order to log into an email account.
 
When email related services{{#ifeq:{{{events_reporting}}}|0|&nbsp;|&nbsp;(such as [[{{{name}}} Events Reporting|Events Reporting]])&nbsp;}}are used, the device logs in to the specified email account and reads the inbox (e.g., Email to SMS) or sends out a message (e.g., SMS to Email) depending on the configured service. In this context, an <b>Email Account</b> is an configuration instance that contains the necessary data required in order to log into an email account.
Line 632: Line 683:  
     <li>Enter a custom name for the email account into the 'Name' field.</li>
 
     <li>Enter a custom name for the email account into the 'Name' field.</li>
 
     <li>Click the 'Add' button.</li>
 
     <li>Click the 'Add' button.</li>
    <li>Click the 'Edit' button next to the newly added email account.</li>
   
</ol>
 
</ol>
   −
[[File:Networking_rutos_manual_administration_recipients_email_accounts_groups_add_button_edit_button.png|border|class=tlt-border]]
+
[[File:Networking_rutos_manual_administration_recipients_email_accounts_groups_add_button_v1.png|border|class=tlt-border]]
   −
After clicking 'Edit' you should be redirected to that email account's settings page where you can start configuring the account.
+
After clicking 'Add' you should be redirected to that email account's settings page where you can start configuring the account.
   −
[[File:Networking_rutos_manual_administration_recipients_email_accounts_modify_email_account_v2.png|border|class=tlt-border]]
+
[[File:Networking_rutos_manual_administration_recipients_email_accounts_modify_email_account_v3.png|border|class=tlt-border]]
    
<table class="nd-mantable">
 
<table class="nd-mantable">
Line 649: Line 699:  
     <tr>
 
     <tr>
 
       <td>Secure connection</td>
 
       <td>Secure connection</td>
       <td>off <nowiki>|</nowiki> on; default: <b>off</b></td>
+
       <td>off {{!}} on; default: <b>off</b></td>
 
       <td>Use if your SMTP server supports TLS or SSL encryption.</td>
 
       <td>Use if your SMTP server supports TLS or SSL encryption.</td>
 
     </tr>
 
     </tr>
Line 664: Line 714:  
     <tr>
 
     <tr>
 
       <td>Credentials</td>
 
       <td>Credentials</td>
       <td>off {{!}} on; default: <b>off</b></td>
+
       <td>off {{!}} <span style="color: blue;">on</span>; default: <b>off</b></td>
 
       <td>This options allows you to set username and password of email account.</td>
 
       <td>This options allows you to set username and password of email account.</td>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
       <td>Username</td>
+
       <td><span style="color: blue;">Username</span></td>
 
       <td>string; default: <b>none</b></td>
 
       <td>string; default: <b>none</b></td>
       <td>Username used to authenticate to the email service.</td>
+
       <td>Username for authentication on SMTP (Simple Mail Transfer Protocol) server. All characters are allowed except `' and space.</td>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
       <td>Password</td>
+
       <td><span style="color: blue;">Password</span></td>
 
       <td>string; default: <b>none</b></td>
 
       <td>string; default: <b>none</b></td>
       <td>Password used to authenticate to the email service..</td>
+
       <td>Password for authentication on SMTP (Simple Mail Transfer Protocol) server. All characters are allowed except `' and space.</td>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
 
       <td>Sender's email address</td>
 
       <td>Sender's email address</td>
 
       <td>string; default: <b>none</b></td>
 
       <td>string; default: <b>none</b></td>
       <td>Configured SMTP server user's email address.</td>
+
       <td>An address that will be used to send your email from. Allowed characters (a-zA-Z0-9._%+-@).</td>
 +
    </tr>
 +
    <tr>
 +
      <td>Do not verify authenticity</td>
 +
      <td><span style="color: red;">off</span> {{!}} on; default: <b>off</b></td>
 +
      <td>When enabled peer's certificate authenticity will not be verified.</td>
 +
    </tr>
 +
    <tr>
 +
      <td><span style="color: red;">Server's CA file</span></td>
 +
      <td> - (interactive button)</td>
 +
      <td>Upload server's CA file.</td>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
Line 689: Line 749:  
</table>}}}}
 
</table>}}}}
   −
{{#ifeq:{{{series}}}|TAP100||
+
{{#switch:{{{series}}}|TAP100|TAP200=|#default=
 
==Certificates==
 
==Certificates==
   Line 698: Line 758:  
The <b>Certificate Generation</b> tab provides the possibility to generate TLS certificates required for secure authentication and communication encryption used by some of the devices services.
 
The <b>Certificate Generation</b> tab provides the possibility to generate TLS certificates required for secure authentication and communication encryption used by some of the devices services.
   −
There are five distinct generation methods (denoted by the selected 'File Type').  
+
There are six distinct generation methods (denoted by the selected 'File Type').  
    
<ol>
 
<ol>
Line 713: Line 773:  
     <li><b>Client</b> - generates a client certificate and key. A client certificate validates a client's identity to the server that it's connecting to, while a key is responsible for encryption.</li>
 
     <li><b>Client</b> - generates a client certificate and key. A client certificate validates a client's identity to the server that it's connecting to, while a key is responsible for encryption.</li>
 
     <li><b>DH Parameters</b> - generates a Diffie-Hellman (DH) parameters file. DH parameters are used in symmetric encryption to protect and define how OpenSSL key exchange is performed.</li>
 
     <li><b>DH Parameters</b> - generates a Diffie-Hellman (DH) parameters file. DH parameters are used in symmetric encryption to protect and define how OpenSSL key exchange is performed.</li>
 +
    <li><b>Let's encrypt</b> - generates SSL certificate.</li>
 
</ol>
 
</ol>
    
====Generation Parameters====
 
====Generation Parameters====
 
----
 
----
Generating each type of file (excluding 'Simple') requires setting some parameters. This section provides an overview for parameters used in TLS certificate generation.
+
Generating each type of file requires setting some parameters. This section provides an overview for parameters used in Simple and TLS certificate generation.
 
----
 
----
<b>Core parameters</b> or simply parameters that apply to each file type are the size and common name of the generated file(s).
+
<b>Simple file parameters</b>
 +
 
 +
[[File:Networking_rutos_manual_administartion_certificates_certificates_generation_simple_parameters.png|border|class=tlt-border]]
 +
 
 +
<table class="nd-mantable">
 +
    <tr>
 +
        <th>Field</th>
 +
      <th>Value</th>
 +
      <th>Description</th>
 +
    </tr>
 +
    <tr>
 +
      <td>Hosts</td>
 +
      <td>string; default: <b>none</b></td>
 +
      <td>Appends hostnames to certificates.</td>
 +
    </tr>
 +
    <tr>
 +
      <td>IP addresses</td>
 +
      <td>IPv4 address; default: <b>none</b></td>
 +
      <td>Appends IPv4 addresses to certificates.</td>
 +
    </tr>
 +
</table>
 +
----
 +
<b>TLS parameters</b> or simply parameters that apply to each (CA, Server, Client, DH) file type are the size and common name of the generated file(s).
    
[[File:Networking_rutos_manual_administartion_certificates_certificates_generation_core_parameters_v1.png|border|class=tlt-border]]
 
[[File:Networking_rutos_manual_administartion_certificates_certificates_generation_core_parameters_v1.png|border|class=tlt-border]]
Line 781: Line 864:  
[[File:Networking_rutos_manual_administartion_certificates_certificates_generation_private_key_decryption_password_v1.png|border|class=tlt-border]]
 
[[File:Networking_rutos_manual_administartion_certificates_certificates_generation_private_key_decryption_password_v1.png|border|class=tlt-border]]
   −
===Certificate Signing===
+
====Certificate Signing====
 
----
 
----
 
The <b>Certificate Signing</b> section is used to validate (sign) unsigned certificates.
 
The <b>Certificate Signing</b> section is used to validate (sign) unsigned certificates.
   −
[[File:Networking_rutos_manual_administartion_certificates_certificates_generation_certificate_signing_v2.png|border|class=tlt-border]]
+
[[File:Networking_rutos_manual_administartion_certificates_certificates_generation_certificate_signing_v3.png|border|class=tlt-border]]
    
<table class="nd-mantable">
 
<table class="nd-mantable">
Line 827: Line 910:  
       <td>off {{!}} on; default: <b>off</b></td>
 
       <td>off {{!}} on; default: <b>off</b></td>
 
       <td>Generation creates additional 'signing request' files (which appear under the [[#Certificate_Manager|Certificate Manager]] tab) that are later used to sign the generated certificates. When this option is set to 'on', the device deletes the signing request files after the signing process is complete.</td>
 
       <td>Generation creates additional 'signing request' files (which appear under the [[#Certificate_Manager|Certificate Manager]] tab) that are later used to sign the generated certificates. When this option is set to 'on', the device deletes the signing request files after the signing process is complete.</td>
 +
    </tr>
 +
    <tr>
 +
      <td>Hosts</td>
 +
      <td>string; default: <b>none</b></td>
 +
      <td>Appends hostnames to certificates.</td>
 +
    </tr>
 +
    <tr>
 +
      <td>IP addresses</td>
 +
      <td>IPv4 address; default: <b>none</b></td>
 +
      <td>Appends IPv4 addresses to certificates.</td>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
Line 843: Line 936:  
The <b>Certificate Import</b> section provides the possibility to import certificates and files generated on another machine. To upload such a file simply click 'Browse' and locate the file on your computer, it should then start uploading automatically.
 
The <b>Certificate Import</b> section provides the possibility to import certificates and files generated on another machine. To upload such a file simply click 'Browse' and locate the file on your computer, it should then start uploading automatically.
   −
[[File:Networking_rutos_manual_administartion_certificates_certificates_manager_certificate_import_v2.png|border|class=tlt-border]]
+
[[File:Networking_rutos_manual_administartion_certificates_certificates_manager_certificate_import_v3.png|border|class=tlt-border]]
    
====Certificates, Keys & Requests====
 
====Certificates, Keys & Requests====
 
----
 
----
The <b>Certificates</b>, <b>Keys</b> and </b>Requests</b> section display files generated on or imported to the device along with the most important information related to them.  
+
The <b>Certificates</b>, <b>Keys</b> and <b>Requests</b> section display files generated on or imported to the device along with the most important information related to them.  
    
By default, the lists are empty. A set certificates generated using 'Simple' file type would look something like this:
 
By default, the lists are empty. A set certificates generated using 'Simple' file type would look something like this:
   −
[[File:Networking_rutos_manual_administartion_certificates_certificates_manager_certificate_list_v1.png|border|class=tlt-border]]
+
[[File:Networking_rutos_manual_administartion_certificates_certificates_manager_certificate_list_v2.png|border|class=tlt-border]]
    
The 'Export' buttons are used to download the files from the device onto your local machine. The 'X' buttons located to the right of each entry are used to delete related files.
 
The 'Export' buttons are used to download the files from the device onto your local machine. The 'X' buttons located to the right of each entry are used to delete related files.
Line 857: Line 950:  
===Root CA===
 
===Root CA===
 
----
 
----
The <b>Root CA</b> section is used to add a root CA certificate file to the device. There is a default file already preloaded on the device which will be overwritten by any uploaded file. The certificates must be in .pem format, maximum file size is 300 KB. These certificates are only needed if you want to use HTTPS for your services and the default file should be sufficient in most cases.
+
The <b>Root CA</b> section is used to add a root CA certificate file to the device. There is a default file already preloaded on the device which will be overwritten by any uploaded file. The certificates must be in .pem format, maximum file size is 10 KB. These certificates are only needed if you want to use HTTPS for your services and the default file should be sufficient in most cases.
   −
[[File:Networking_rutos_manual_administration_access_control_root_ca_v1.png|border|class=tlt-border]]}}
+
[[File:Networking_rutos_manual_administration_access_control_root_ca_v2.png|border|class=tlt-border]]}}
    
==Profiles==
 
==Profiles==
Line 865: Line 958:  
{{Template: Networking_rutos_manual_profiles | series = {{{series}}} | name = {{{name}}}}}
 
{{Template: Networking_rutos_manual_profiles | series = {{{series}}} | name = {{{name}}}}}
   −
{{#ifeq: {{{serires}}} | TAP100 ||
+
{{#switch:{{{series}}}|TAP100|TAP200=|#default=
 
==Storage Memory Expansion==
 
==Storage Memory Expansion==