Template:Networking tswos manual administration: Difference between revisions

From Teltonika Networks Wiki
No edit summary
No edit summary
 
(14 intermediate revisions by 3 users not shown)
Line 1: Line 1:
{{Template: Networking_rutos_manual_fw_disclosure
{{Template: Networking_device_manual_fw_disclosure
| fw_version ={{Template: Networking_rutos_manual_latest_fw
| series = {{{series}}}
| name  = {{{name}}}
| fw_version ={{Template: Networking_device_manual_latest_fw
  | series = {{{series}}}
  | series = {{{series}}}
  | name  = {{{name}}}
  | name  = {{{name}}}
Line 14: Line 16:
The <b>General</b> section is used to set up some of device managerial parameters, such as changing device name. For more information on the General section, refer to figure and table below.
The <b>General</b> section is used to set up some of device managerial parameters, such as changing device name. For more information on the General section, refer to figure and table below.


[[File:Networking_tswos_manual_administration_general.png|border|class=tlt-border]]
[[File:Networking_tswos_manual_administration_general_v1.png|border|class=tlt-border]]


<table class="nd-mantable">
<table class="nd-mantable">
Line 21: Line 23:
       <th>Value</th>
       <th>Value</th>
       <th>Description</th>
       <th>Description</th>
    </tr>
    <tr>
      <th>General settings</th>
        <th></th>
        <th></th>   
    </tr>
    <tr>
      <td>Language</td>
      <td>English {{!}} Spanish {{!}} Japanese {{!}} Portuguese {{!}} Turkish {{!}} German; default: <b>English</b></td>
      <td>Currently active language of Web interface.</td>
    </tr>
    <tr>
      <td>Data analytics</td>
      <td>off {{!}} on; default: <b>off</b></td>
      <td>Enables the collection of data, which is used to improve the quality and user experience of our products. It includes sending information about the device and the usage of the Web interface. The data is collected in compliance with the [https://teltonika-networks.com/about-us/policies-certificates/privacy-policy Privacy policy].</td>
     </tr>
     </tr>
     <tr>
     <tr>
Line 43: Line 60:
     </tr>
     </tr>
     <tr>
     <tr>
  <td>Min time</td>
      <td>Action</td>
        <td></td>
        <td>The type of action when the reset button is triggered.</td>
    </tr>
    <tr>
      <td>Min time</td>
         <td>integer [0..60]; default: <b>none</b></td>
         <td>integer [0..60]; default: <b>none</b></td>
         <td>Minimum time (in seconds) the button needs to be held to perform an action.</td>
         <td>Minimum time (in seconds) the button needs to be held to perform an action.</td>
     </tr>
     </tr>
     <tr>
     <tr>
  <td>Max time</td>
    <td>Max time</td>
         <td>integer [1..60]; default: <b>none</b></td>
         <td>integer [1..60]; default: <b>none</b></td>
         <td>Maximum time (in seconds) the button can be held to perform an action, after which no action will be performed.</td>
         <td>Maximum time (in seconds) the button can be held to perform an action, after which no action will be performed.</td>
    </tr>
    <tr>
      <td>Enable</td>
        <td>off {{!}} on; default: <b>on</b></td>
        <td>Enables the action.</td>
     </tr>
     </tr>
</table>
</table>
Line 166: Line 193:
The <b>User settings</b> section is used to change the password of the current user.
The <b>User settings</b> section is used to change the password of the current user.


[[File:Networking_tswos_manual_administration_user_settings_change_password.png|border|class=tlt-border]]
[[File:Networking_tswos_manual_administration_user_settings_change_password_v1.png|border|class=tlt-border]]


===System Users===
===System Users===
Line 181: Line 208:
The <b>Groups</b> section lists available user groups of which there are three:
The <b>Groups</b> section lists available user groups of which there are three:


[[File:Networking_tswos_manual_administration_user_settings_groups.png|border|class=tlt-border]]
[[File:Networking_tswos_manual_administration_user_settings_groups_v1.png|border|class=tlt-border]]
----
----
<ul>
<ul>
Line 196: Line 223:
             <li>limited read access; by default, users belonging to this group cannot view these pages:
             <li>limited read access; by default, users belonging to this group cannot view these pages:
                 <ul>
                 <ul>
                     <li>System → Administration → [[{{{name}}} Administration|Users Settings]].</li>
                     <li>System → Administration → Users Settings → System Users</li>
                    <li>System → Maintenance → Backup</li>
                    <li>System → Firmware</li>
                    <li>System → Maintenance → CLI</li>
                </ul>
            </li>
            <li>limited write access; by default, users belonging to this group cannot view these pages:
                <ul>
                    <li>System → Administration Users Settings → System Users</li>
                    <li>System → Maintenance → Backup</li>
                    <li>System → Firmware</li>
                    <li>System → Maintenance → CLI</li>
                    <li>System → Administration → Access Control → General</li>
                 </ul>
                 </ul>
             </li>
             </li>
            <li>unlimited write access by default;</li>
             <li>access rights can be modified.</li>
             <li>access rights can be modified.</li>
         </ul><br>[[File:Networking_rutos_manual_users_admin_visualization.png]]
         </ul><br>[[File:Networking_rutos_manual_users_admin_visualization.png]]
Line 209: Line 247:
             <li>limited read access; by default, users belonging to this group cannot view these pages:
             <li>limited read access; by default, users belonging to this group cannot view these pages:
                 <ul>
                 <ul>
                     <li>System → Administration → [[{{{name}}} Users|Users Settings]];</li>
                     <li>System → Administration → Users Settings → System Users;</li>
                     <li>System → [[{{{name}}} Firmware|Firmware]];</li>
                     <li>System → Firmware</li>
                     <li>System → [[{{{name}}} Reboot|Reboot]].</li>
                     <li>System → Maintenance → Backup</li>
                    <li>System → Administration → Access Control</li>
                    <li>System → Maintenance → Troubleshoot</li>
                    <li>Network</li>
                 </ul>
                 </ul>
             </li>
             </li>
Line 225: Line 266:
A group's parameters can be set in its <b>Group Settings</b> page. To access the Groups Settings page, click the 'Edit' button next to the group's name. Below is an example of the Group Settings section:
A group's parameters can be set in its <b>Group Settings</b> page. To access the Groups Settings page, click the 'Edit' button next to the group's name. Below is an example of the Group Settings section:


[[File:Networking_tswos_manual_administration_user_settings_group_settings.png|border|class=tlt-border]]
[[File:Networking_tswos_manual_administration_user_settings_group_settings_v1.png|border|class=tlt-border]]


<table class="nd-mantable">
<table class="nd-mantable">
Line 236: Line 277:
       <td>Write action</td>
       <td>Write action</td>
       <td>Allow {{!}} Deny; default: <b>Allow</b></td>
       <td>Allow {{!}} Deny; default: <b>Allow</b></td>
       <td>Specifies whether to allow or deny write actions for users in the group. Write actions consist of changing configurations and performing certain actions (such as clicking buttons).<br>This field directly correlates with the "Write access" field below it, because the selected write action will apply to pages specified in that field.</td>
       <td>Specifies whether to deny or allow write access for users belonging the group.</td>
     </tr>
     </tr>
     <tr>
     <tr>
       <td>Write access</td>
       <td>Write access</td>
       <td>path(s) to page(s); default: <b>
       <td>path(s) to page(s); default: in the picture above</td>
            <ul>
       <td>Controls the ability of users to change and execute the contents (e.g. admin/network/lan).</td>
                <li><b>system/admin/multiusers/change_password</b></li>
            </ul>
        </b></td>
       <td>Path(s) to the page(s) to which the selected "Write action" will be applied. Click the plus symbol to add multiple entries.</td>
     </tr>
     </tr>
     <tr>
     <tr>
       <td>Read action</td>
       <td>Read action</td>
       <td>Allow {{!}} Deny; default: <b>Deny</b></td>
       <td>Allow {{!}} Deny; default: <b>Deny</b></td>
       <td>Specifies whether to allow or deny read actions for users in the group. Read actions consist of viewing pages on the WebUI.<br>This field directly correlates with the "Read access" field below it, because the selected read action will apply to pages specified in that field.</td>
       <td>Specifies whether to deny or allow read access for users belonging the group.</td>
     </tr>
     </tr>
     <tr>
     <tr>
       <td>Read access</td>
       <td>Read access</td>
         <td>path(s) to page(s); default:
         <td>path(s) to page(s); default: <b>in the picture above</b></td>
            <ul>
       <td>Controls the ability of users to navigate the contents (e.g. admin/network/*)</td>
                <li><b>system/admin/multiusers/users_configuration</b></li>
                <li><b>system/flashops</b></li>
                <li><b>system/maintenance/backup</b></li>
                <li><b>system/flashops/</b></li>
                <li><b>system/admin/access_control</b></li>
                <li><b>network/</b></li>
            </ul>
        </td>
       <td>Path(s) to the page(s) to which the selected "Read action" will be applied. Click the plus symbol to add more entries.</td>
     </tr>
     </tr>
</table>
</table>
Line 294: Line 322:
By default, there is only one user called "admin":
By default, there is only one user called "admin":


[[File:Networking_rutos_users_users_v2.png|border|class=tlt-border]]
[[File:Networking_rutos_users_users_v3.png|border|class=tlt-border]]


=====User Settings (edit user)=====
=====User Settings (edit user)=====
Line 300: Line 328:
Each user's password and group parameters can be set in their <b>User Settings</b> pages. To access the User Settings page, click the 'Edit' button next to the user's name.
Each user's password and group parameters can be set in their <b>User Settings</b> pages. To access the User Settings page, click the 'Edit' button next to the user's name.


<u>However</u>, you may want to add a new user at first. This can be done from the [[{{{name}}}_Users#Add_New_User|Add New User]] section below:
<u>However</u>, you may want to add a new user at first. This can be done from the [[{{{name}}}_Administration#User_Settings|Add New User]] section below:


[[File:Networking_rutos_users_add_new_user_example.png]]
[[File:Networking_rutos_users_add_new_user_example_v3.png]]


<ol>
<ol>
Line 313: Line 341:
Below is an example of a newly added user's settings page:
Below is an example of a newly added user's settings page:


[[File:Networking_rutos_users_user_settings.png|border|class=tlt-border]]
[[File:Networking_rutos_users_user_settings_v3.png|border|class=tlt-border]]


<table class="nd-mantable">
<table class="nd-mantable">
Line 329: Line 357:
       <td>New password</td>
       <td>New password</td>
       <td>string; default: <b>none</b></td>
       <td>string; default: <b>none</b></td>
       <td>Create a new password for the user. The password must contain at least 8 characters, including at least one upper case letter and one digit.</td>
       <td><li>Create a new password for the user. The password must contain at least 8 characters, including at least one upper case letter and one digit.</li><li>Another option is to use the 'Dice' icon, which generates random passwords.</li></td>
     </tr>
     </tr>
     <tr>
     <tr>
Line 340: Line 368:
       <td>admin {{!}} user; default: <b>user</b></td>
       <td>admin {{!}} user; default: <b>user</b></td>
       <td>The group to which the user belongs.</td>
       <td>The group to which the user belongs.</td>
    </tr>
    <tr>
      <td>Enable SSH access</td>
      <td>off {{!}} on; default: <b>off</b></td>
      <td>Enables SSH access (only for 'root' users).</td>
     </tr>
     </tr>
</table>
</table>
Line 345: Line 378:
====Add New User====
====Add New User====
----
----
The <b>Add New User</b> section is used to create additional users that can access the WebUI. After a new user is added, it will appear in the [[{{{name}}} Users#Users|Users]] section.
The <b>Add New User</b> section is used to create additional users that can access the WebUI. After a new user is added, it will appear in the [[{{{name}}} Administration#User_Settings|Users]] section.


[[File:Networking_rutos_users_add_new_user.png|border|class=tlt-border]]
[[File:Networking_rutos_users_add_new_user_v3.png|border|class=tlt-border]]


<table class="nd-mantable">
<table class="nd-mantable">
Line 363: Line 396:
       <td>Password</td>
       <td>Password</td>
       <td>string; default: <b>none</b></td>
       <td>string; default: <b>none</b></td>
       <td>A password for the new user. The password must contain at least 8 characters, including at least one upper case letter and one digit.</td>
       <td><li>A password for the new user. The password must contain at least 8 characters, including at least one upper case letter and one digit.</li><li>Another option is to use the 'Dice' icon, which generates random passwords.</li></td>
    </tr>
    <tr>
      <td>Group</td>
      <td>admin {{!}} user; default: <b>user</b></td>
      <td>The group to which the user belongs.</td>
     </tr>
     </tr>
</table>
</table>
Line 370: Line 408:
===General===
===General===
----
----
The <b>Access Control</b> page is used to manage local access to device.
The <b>Access Control</b> page is used to manage local access to device.
[[File:Networking tswos manual administration access control general.png|border|class=tlt-border]]
<b>Important</b>: turning on remote access leaves your device vulnerable to external attackers. Make sure you use a strong password.


====SSH====
====SSH====
----
----
[[File:Networking_tswos_manual_administration_access_control_general_ssh.png|border|class=tlt-border]]
 
[[File:Networking_tswos_manual_administration_access_control_general_ssh_v1.png|border|class=tlt-border]]


<table class="nd-mantable">
<table class="nd-mantable">
Line 381: Line 425:
       <th>Value</th>
       <th>Value</th>
       <th>Description</th>
       <th>Description</th>
    </tr>
    <tr>
        <td>PAM</td>
        <td>Disabled {{!}} Enabled; default: <b>Disabled</b></td>
        <td>You can change PAM configuration .</td>
     </tr>
     </tr>
     <tr>
     <tr>
Line 393: Line 442:
     </tr>
     </tr>
     <tr>
     <tr>
         <td>Enable key-based authentication</td>
         <td>Authentication type</td>
         <td>off {{!}} on; default: <b>off</b></td>
         <td>Password {{!}} <span style="color:blue">Key-based only</span> {{!}} <span style="color:blue">Use both</span>; default: <b>Password</b></td>
         <td>Use public keys for authentication.</td>
         <td>
            <li><b>Password</b> - SSH access with password for root user</li>
            <li><b>Key-based only</b> - enables key-based authentication only and disables password authentication for root user</li>
            <li><b>Use Both</b> - use both password and public keys for authentication</li>
        </td>
    </tr>
    <tr>
        <td><span style="color:blue">Public keys</span></td>
        <td>-(input field)</td>
        <td>Public keys for ssh key-based authentication. Each individual key must be specified on a new line.</td>
     </tr>
     </tr>
</table>
</table>


====WebUI====
====HTTP====
----
----
[[File:Networking_tswos_manual_administration_access_control_general_webui.png|border|class=tlt-border]]
 
[[File:Networking tswos manual administration access control general http.png|border|class=tlt-border]]


<table class="nd-mantable">
<table class="nd-mantable">
Line 408: Line 467:
       <th>Value</th>
       <th>Value</th>
       <th>Description</th>
       <th>Description</th>
    </tr>
    <tr>
        <td>PAM</td>
        <td>Disabled {{!}} Enabled; default: <b>Disabled</b></td>
        <td>You can change PAM configuration [[{{{name}}}_Administration#PAM|here]].</td>
     </tr>
     </tr>
     <tr>
     <tr>
Line 413: Line 477:
         <td>off {{!}} on; default: <b>on</b></td>
         <td>off {{!}} on; default: <b>on</b></td>
         <td>Turns HTTP access from the local network (LAN) to the device WebUI on or off.</td>
         <td>Turns HTTP access from the local network (LAN) to the device WebUI on or off.</td>
    </tr>
    <tr>
        <td>HTTP Port</td>
        <td>integer [0..65535]; default: <b>80</b></td>
        <td>Selects which port to use for HTTP access.</td>
    </tr>
</table>
====HTTPS====
----
[[File:Networking tswos manual administration access control general https.png|border|class=tlt-border]]
<table class="nd-mantable">
    <tr>
        <th>Field</th>
      <th>Value</th>
      <th>Description</th>
    </tr>
    <tr>
        <td>PAM</td>
        <td>Disabled {{!}} Enabled; default: <b>Disabled</b></td>
        <td>You can change PAM configuration [[{{{name}}}_Administration#PAM|here]].</td>
     </tr>
     </tr>
     <tr>
     <tr>
Line 423: Line 510:
         <td>off {{!}} on; default: <b>off</b></td>
         <td>off {{!}} on; default: <b>off</b></td>
         <td>Redirects connection attempts from HTTP to HTTPS.</td>
         <td>Redirects connection attempts from HTTP to HTTPS.</td>
    </tr>
    <tr>
        <td>HTTP Port</td>
        <td>integer [0..65535]; default: <b>80</b></td>
        <td>Selects which port to use for HTTP access.</td>
     </tr>
     </tr>
     <tr>
     <tr>
Line 433: Line 515:
         <td>integer [0..65535]; default: <b>443</b></td>
         <td>integer [0..65535]; default: <b>443</b></td>
         <td>Selects which port to use for HTTPS access.</td>
         <td>Selects which port to use for HTTPS access.</td>
    </tr>
    <tr>
        <td>Certificate file</td>
        <td>-(interactive button)</td>
        <td>Download certificate file from device. Used for browsers to reach HTTPS connection.</td>
     </tr>
     </tr>
</table>
</table>
Line 439: Line 526:
----
----


[[File:Networking_tswos_manual_administration_access_control_general_cli.png|border|class=tlt-border]]
[[File:Networking_tswos_manual_administration_access_control_general_cli_v1.png|border|class=tlt-border]]


<table class="nd-mantable">
<table class="nd-mantable">
Line 464: Line 551:
</table>
</table>


===Security===
===PAM===
----  
----
The <b>Security</b> tab provides the possibility to enable/disable blocking IP's service and delete blocked devices from the list.
 
[[File:Networking_rutos_manual_administration_access_control_pam_v3.png|border|class=tlt-border]]


<b>IP Block Settings</b>
====Modify PAM Auth====
----
----
[[File:Networking_tswos_manual_administration_access_control_security.png|border|class=tlt-border]]
[[File:Networking_rutos_manual_administration_access_control_pam_modify_pam_auth_v2.png|border|class=tlt-border]]
 
<table class="nd-mantable">
<table class="nd-mantable">
     <tr>
     <tr>
Line 480: Line 569:
         <td>Enable</td>
         <td>Enable</td>
         <td>off {{!}} on; default: <b>on</b></td>
         <td>off {{!}} on; default: <b>on</b></td>
         <td>Enable or disable blocking IP's if they have reached the set amount of failed times.</td>
         <td>Turns the PAM auth on or off.</td>
    </tr>
    <tr>
        <td>Module</td>
        <td><span style="color:blue">TACACS+</span> {{!}} <span style="color:red">Radius</span> {{!}} Local; default: <b>Local</b></td>
        <td>Specifies the PAM module that implements the service.</td>
    </tr>
    <tr>
        <td>Type</td>
        <td>Required {{!}} Requisite {{!}} Sufficient {{!}} Optional; default: <b>Optional </b></td>
        <td>Determines the continuation or failure behavior for the module</td>
    </tr>   
    <tr>
        <td><span style="color:teal">WebUI PAM auth option</span>: Enable for all users</td>
        <td>off {{!}} on; default: <b>off</b></td>
        <td>Turn on PAM authentication for all users. It will allow login with users that are not created on the device.</td>
     </tr>
     </tr>
     <tr>
     <tr>
         <td>Fail count</td>
         <td><span style="color:teal">WebUI PAM auth option</span>: Select users</td>
         <td>integer [1..1000]; default: <b>10</b></td>
         <td>-(list)</td>
         <td>An amount of times IP address can try to access SSH or WebUI before being blocked.</td>
         <td>Select users for PAM authentication.</td>
     </tr>
     </tr>
     <tr>
     <tr>
         <td>Clean after reboot</td>
         <td><span style="color:red">Radius</span>: Enable for all users</td>
         <td>off {{!}} on; default: <b>off</b></td>
         <td>off {{!}} on; default: <b>off</b></td>
         <td>If enabled, blocked loging attempts list will be cleared on device reboot.</td>
         <td>Turn on PAM authentication for all users. It will allow login with users that are not created on the device.</td>
    </tr>
    <tr>
        <td><span style="color:red">Radius</span>: Require Message-Authenticator</td>
        <td>off {{!}} on; default: <b>on</b></td>
        <td>Require and validate Message-Authenticator RADIUS attribute on Access-Request replies.</td>
    </tr>
    <tr>
        <td><span style="color:blue">TACACS+</span>/<span style="color:red">Radius</span>: Server</td>
        <td>ip4 {{!}} ip6; default: <b>none</b></td>
        <td>The IP address of the RADIUS server</td>
    </tr>
    <tr>
        <td><span style="color:blue">TACACS+</span>/<span style="color:red">Radius</span>: Secret</td>
        <td>string; default: <b>none</b></td>
        <td>RADIUS shared secret</td>
    </tr>
    <tr>
        <td><span style="color:blue">TACACS+</span>/<span style="color:red">Radius</span>: Port</td>
        <td>integer [0..65535]; default: <b><span style="color:blue">49</span>/<span style="color:red">1812</span></b></td>
        <td>RADIUS server authentication port</td>
    </tr>
    <tr>
        <td><span style="color:red">Radius</span>: Timeout</td>
        <td>integer [3..10]; default: <b>3</b></td>
        <td>Timeout in seconds waiting for RADIUS server reply.</td>
     </tr>
     </tr>
</table>
</table>


<b>Login Attempts</b>
===Security===
----
The <b>Security</b> tab provides the possibility to enable/disable blocking IP's service and delete blocked devices from the list.
 
<b>Login Attempts</b>  
----
----
[[File:Networking_tswos_manual_administration_access_control_security_login.png|border|class=tlt-border]]
[[File:Networking_tswos_manual_administration_access_control_security_v1.png|border|class=tlt-border]]
<table class="nd-mantable">
<table class="nd-mantable">
     <tr>
     <tr>
Line 504: Line 637:
     </tr>
     </tr>
     <tr>
     <tr>
         <td>Source address</td>
         <td>Source</td>
         <td>IP address</td>
         <td>IP address</td>
         <td>Shows the IP address from which the connection failed.</td>
         <td>Shows the IP address from which the connection failed.</td>
     </tr>
     </tr>
     <tr>
     <tr>
        <td>Device port</td>
         <td>Destination</td>
        <td>Port number</td>
        <td>Shows the port number from which the connection failed.</td>
    </tr>
    <tr>
         <td>Destination address</td>
         <td>IP address</td>
         <td>IP address</td>
         <td>Shows yours device IP adress</td>
         <td>Shows yours device IP adress</td>
     </tr>
     </tr>
     <tr>
     <tr>
         <td>Failed atempts</td>
         <td>Port (protocol)</td>
         <td>Number</td>
         <td>Port number</td>
         <td>Shows the number of failed attempts to connect to device.</td>
         <td>Shows the port number from which the connection failed.</td>
     </tr>
     </tr>
     <tr>
     <tr>
         <td>Status</td>
         <td>Status</td>
         <td>- {{!}} Blocked</td>
         <td>Attempt count {{!}} Blocked</td>
         <td>Indicates whether the source address is blocked or not.</td>
         <td>Shows the number of failed attempts to connect to device. Indicates whether the source address is blocked or not.</td>
     </tr>
     </tr>
        <tr>
    <tr>
         <td>Reset</td>
         <td>Reset</td>
         <td>Check box</td>
         <td>Check box</td>
         <td>Allows you to select multiple IP addresses.</td>
         <td>Allows you to select multiple IP addresses.</td>
     </tr>
     </tr>
         <tr>
    <tr>
         <td>Actions</td>
        <td>-(interactive button)</td>
        <td>Allows you to select multiple IP addresses.</td>
    </tr>
    <tr>
         <td>Unblock all</td>
         <td>Unblock all</td>
         <td>-(interactive button)</td>
         <td>-(interactive button)</td>
         <td>Unblocks all source adresses from the list.</td>
         <td>Deletes instance.</td>
     </tr>
     </tr>
        <tr>
    <tr>
         <td>Unblock selected</td>
         <td>Unblock selected</td>
         <td>-(interactive button)</td>
         <td>-(interactive button)</td>
         <td>Unblocks selected source adresses from the list.</td>
         <td>Unblocks selected source adresses from the list.</td>
    </tr>
</table>
<b>IP Block Settings</b>
----
<b>IP Block Settings</b> can be found by pressing 'Settings' button under security tab:
[[File:Networking tswos manual administration access control security settings ipblock button.png|border|class=tlt-border]]
[[File:Networking tswos manual administration access control security settings ipblock.png|border|class=tlt-border]]
<table class="nd-mantable">
    <tr>
        <th>Field</th>
      <th>Value</th>
      <th>Description</th>
    </tr>
    <tr>
        <td>Enable</td>
        <td>off {{!}} on; default: <b>on</b></td>
        <td>Enable or disable blocking IP's if they have reached the set amount of failed times.</td>
    </tr>
    <tr>
        <td>Type</td>
        <td>Timed blocking {{!}} Permanent blocking; default: <b>Timed blocking</b></td>
        <td>You can choose an option of a blocking type.</td>
    </tr>
    <tr>
        <td>Fail count</td>
        <td>integer [1..1000]; default: <b>10</b></td>
        <td>An amount of times IP address can try to access SSH or WebUI before being blocked.</td>
    </tr>
    <tr>
        <td>Clean after reboot</td>
        <td>off {{!}} on; default: <b>off</b></td>
        <td>If enabled, blocked loging attempts list will be cleared on device reboot.</td>
     </tr>
     </tr>
</table>
</table>

Latest revision as of 13:45, 25 October 2024

The information in this page is updated in accordance with firmware version .

Summary

This page is an overview of the Administration section of {{{name}}} devices.

General

The General section is used to set up some of device managerial parameters, such as changing device name. For more information on the General section, refer to figure and table below.

Field Value Description
General settings
Language English | Spanish | Japanese | Portuguese | Turkish | German; default: English Currently active language of Web interface.
Data analytics off | on; default: off Enables the collection of data, which is used to improve the quality and user experience of our products. It includes sending information about the device and the usage of the Web interface. The data is collected in compliance with the Privacy policy.
Device name and hostname
Device name string; default: {{{name}}} Device model name.
Hostname string; default: Teltonika-{{{name}}}.com Device hostname. This can be used for communication with other LAN hosts.
Reset Button Configuration
Action The type of action when the reset button is triggered.
Min time integer [0..60]; default: none Minimum time (in seconds) the button needs to be held to perform an action.
Max time integer [1..60]; default: none Maximum time (in seconds) the button can be held to perform an action, after which no action will be performed.
Enable off | on; default: on Enables the action.

Date & Time

Summary


Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. This chapter is an overview of the NTP section for {{{name}}} devices.

General


The Time Synchronization section lets you select time zone and synchronize the time.

The figure below is an example of the Time Synchronization section and the table below provides information about the fields contained in that section:

Field Value Description
Current system time time; default: none Current local time of the device.
Sync with browser -(interactive button) Click to synchronize device time and time zone to browsers, if your device time or time zone is not correct.
Time zone time zone; default: UTC The device will sync time in accordance with the selected time zone.

NTP


This section is used to configure NTP client and time servers.

Time Synchronization


This section is used to configure the device's time settings.

Field Value Description
Enable NTP Client off | on; default: on Turns NTP on or off.
Save time to flash off | on; default: off Saves last synchronized time to flash memory.
Force Servers off | on; default: off Forces unreliable NTP servers.
Update interval (in seconds) integer; default: 86400 How often the device will update the time.
Offset frequency integer; default: 0 Adjusts the minor drift of the clock so that it will run more accurately.
Count of time synchronizations integer; default: none The amount of times the device will perform time synchronizations. Leave empty in order to set to infinite.

Time Servers


This section is used to specify which time servers the device will use for time synchronization. To add more time servers to the list, click the 'Add' button.

Field Value Description
Hostname ip | url; default: 0.openwrt.pool.ntp.org NTP servers that this device uses to sync time.
Delete button -(interactive) button Deletes hostname.

User Settings

Change Password


The User settings section is used to change the password of the current user.

System Users

Summary


The System Users page is used to add new user accounts that can access the device with different user credentials than the default ones. The newly added users can be assigned to one of two groups, either of which can be modified to limit WebUI read/write access rights for users belonging to each specific group.

This page is unrelated to SSH users. By default, there is one SSH user named "root" and it shares the same password as the default WebUI user named "admin".

This manual page provides an overview of the Users page in {{{name}}} devices.

Groups


The Groups section lists available user groups of which there are three:


  • root - highest level of authority. Key elements that define this group:
    • has unlimited read/write access;
    • additional users cannot be added to this group;
    • access rights for this group cannot be modified.


  • admin - second highest level of authority. Key elements that define this group:
    • limited read access; by default, users belonging to this group cannot view these pages:
      • System → Administration → Users Settings → System Users
      • System → Maintenance → Backup
      • System → Firmware
      • System → Maintenance → CLI
    • limited write access; by default, users belonging to this group cannot view these pages:
      • System → Administration → Users Settings → System Users
      • System → Maintenance → Backup
      • System → Firmware
      • System → Maintenance → CLI
      • System → Administration → Access Control → General
    • access rights can be modified.


  • user - lowest level of authority. Key elements that define this group:
    • no write access;
    • limited read access; by default, users belonging to this group cannot view these pages:
      • System → Administration → Users Settings → System Users;
      • System → Firmware
      • System → Maintenance → Backup
      • System → Administration → Access Control
      • System → Maintenance → Troubleshoot
      • Network
    • access rights can be modified.


Additional note: you can view and/or edit settings for each group by clicking the 'Edit' button next to them. More on information on how to edit group access settings is located in the following section of this manual page.

Group Settings (edit group)

A group's parameters can be set in its Group Settings page. To access the Groups Settings page, click the 'Edit' button next to the group's name. Below is an example of the Group Settings section:

Field Value Description
Write action Allow | Deny; default: Allow Specifies whether to deny or allow write access for users belonging the group.
Write access path(s) to page(s); default: in the picture above Controls the ability of users to change and execute the contents (e.g. admin/network/lan).
Read action Allow | Deny; default: Deny Specifies whether to deny or allow read access for users belonging the group.
Read access path(s) to page(s); default: in the picture above Controls the ability of users to navigate the contents (e.g. admin/network/*)
Examples

The easiest way to master the syntax is to navigate to page that you want to generate a path for and the copy the path from the URL of that page.

For example, to specify the path to the Network → Mobile page, navigate to the page, copy the page's URL address starting from the symbol "#" and paste it into one of the access fields:


However, the VPN window contains links to many different types of VPN pages. If you want to specify only one of them, you can do it as well. For example, to to specify the path to the IPsec page, add "/ipsec" to the path string:

services/vpn/ipsec

An asterisk (*) in the path string means that the every page from that point on is included in that path. For example, to generate a path that includes pages in the Services menu tab:

services/*

Or to simply include everything in the entire WebUI (if this path is combined with Read action: Deny, users from that group will not be able to login to the WebUI):

*

Users


The Users section lists all created users and provides the possibility to change their passwords and the group they belong to (with the exception of the default user "admin" which always belongs to the root group).

By default, there is only one user called "admin":

User Settings (edit user)

Each user's password and group parameters can be set in their User Settings pages. To access the User Settings page, click the 'Edit' button next to the user's name.

However, you may want to add a new user at first. This can be done from the [[{{{name}}}_Administration#User_Settings|Add New User]] section below:

  1. create a username;
  2. create a password for the user (must contain at least 8 characters, including at least one upper case letter and one digit);
  3. click the 'Add' button;
  4. click the 'Edit' next to newly added user.

Below is an example of a newly added user's settings page:

Field Value Description
Username string; default: none Displays the user's name.
New password string; default: none
  • Create a new password for the user. The password must contain at least 8 characters, including at least one upper case letter and one digit.
  • Another option is to use the 'Dice' icon, which generates random passwords.
  • Confirm new password string; default: none Repeat the new password.
    Group admin | user; default: user The group to which the user belongs.
    Enable SSH access off | on; default: off Enables SSH access (only for 'root' users).

    Add New User


    The Add New User section is used to create additional users that can access the WebUI. After a new user is added, it will appear in the [[{{{name}}} Administration#User_Settings|Users]] section.

    Field Value Description
    Username string; default: none A custom name for the new user.
    Password string; default: none
  • A password for the new user. The password must contain at least 8 characters, including at least one upper case letter and one digit.
  • Another option is to use the 'Dice' icon, which generates random passwords.
  • Group admin | user; default: user The group to which the user belongs.

    Access Control

    General


    The Access Control page is used to manage local access to device.

    Important: turning on remote access leaves your device vulnerable to external attackers. Make sure you use a strong password.

    SSH


    Field Value Description
    PAM Disabled | Enabled; default: Disabled You can change PAM configuration .
    Enable SSH access off | on; default: on Turns SSH access from the local network (LAN) on or off.
    Port integer [0..65535]; default: 22 Selects which port to use for SSH access.
    Authentication type Password | Key-based only | Use both; default: Password
  • Password - SSH access with password for root user
  • Key-based only - enables key-based authentication only and disables password authentication for root user
  • Use Both - use both password and public keys for authentication
  • Public keys -(input field) Public keys for ssh key-based authentication. Each individual key must be specified on a new line.

    HTTP


    Field Value Description
    PAM Disabled | Enabled; default: Disabled You can change PAM configuration [[{{{name}}}_Administration#PAM|here]].
    Enable HTTP access off | on; default: on Turns HTTP access from the local network (LAN) to the device WebUI on or off.
    HTTP Port integer [0..65535]; default: 80 Selects which port to use for HTTP access.

    HTTPS


    Field Value Description
    PAM Disabled | Enabled; default: Disabled You can change PAM configuration [[{{{name}}}_Administration#PAM|here]].
    Enable HTTPS access off | on; default: on Turns HTTPS access from the local network (LAN) to the device WebUI on or off.
    Redirect to HTTPS off | on; default: off Redirects connection attempts from HTTP to HTTPS.
    HTTPS Port integer [0..65535]; default: 443 Selects which port to use for HTTPS access.
    Certificate file -(interactive button) Download certificate file from device. Used for browsers to reach HTTPS connection.

    CLI


    Field Value Description
    Enable CLI off | on; default: on Turns CLI access from the local network (LAN) on or off.
    Port range range of integers [0..65534]-[1..65535]; default: 4200-4220 Selects which ports to use for CLI access.
    Shell limit integer [1..10]; default: 5 Maximum number of active CLI connections.

    PAM


    Modify PAM Auth


    Field Value Description
    Enable off | on; default: on Turns the PAM auth on or off.
    Module TACACS+ | Radius | Local; default: Local Specifies the PAM module that implements the service.
    Type Required | Requisite | Sufficient | Optional; default: Optional Determines the continuation or failure behavior for the module
    WebUI PAM auth option: Enable for all users off | on; default: off Turn on PAM authentication for all users. It will allow login with users that are not created on the device.
    WebUI PAM auth option: Select users -(list) Select users for PAM authentication.
    Radius: Enable for all users off | on; default: off Turn on PAM authentication for all users. It will allow login with users that are not created on the device.
    Radius: Require Message-Authenticator off | on; default: on Require and validate Message-Authenticator RADIUS attribute on Access-Request replies.
    TACACS+/Radius: Server ip4 | ip6; default: none The IP address of the RADIUS server
    TACACS+/Radius: Secret string; default: none RADIUS shared secret
    TACACS+/Radius: Port integer [0..65535]; default: 49/1812 RADIUS server authentication port
    Radius: Timeout integer [3..10]; default: 3 Timeout in seconds waiting for RADIUS server reply.

    Security


    The Security tab provides the possibility to enable/disable blocking IP's service and delete blocked devices from the list.

    Login Attempts


    Field Value Description
    Source IP address Shows the IP address from which the connection failed.
    Destination IP address Shows yours device IP adress
    Port (protocol) Port number Shows the port number from which the connection failed.
    Status Attempt count | Blocked Shows the number of failed attempts to connect to device. Indicates whether the source address is blocked or not.
    Reset Check box Allows you to select multiple IP addresses.
    Actions -(interactive button) Allows you to select multiple IP addresses.
    Unblock all -(interactive button) Deletes instance.
    Unblock selected -(interactive button) Unblocks selected source adresses from the list.

    IP Block Settings


    IP Block Settings can be found by pressing 'Settings' button under security tab:

    Field Value Description
    Enable off | on; default: on Enable or disable blocking IP's if they have reached the set amount of failed times.
    Type Timed blocking | Permanent blocking; default: Timed blocking You can choose an option of a blocking type.
    Fail count integer [1..1000]; default: 10 An amount of times IP address can try to access SSH or WebUI before being blocked.
    Clean after reboot off | on; default: off If enabled, blocked loging attempts list will be cleared on device reboot.

    Profiles

    Summary

    Configuration profiles provide a way to create multiple distinct device configuration sets and apply them to the device based on current user requirements. This chapter is an overview of the Profiles page in {{{name}}} devices.

    Configuration Profiles

    This section displays user defined configuration profiles:


    To create a new profile, configure the device in accordance with your needs, go to this page, enter a custom name for the profile and click the 'Add' button. You can also choose to create a profile without any previous configurations. A new profile with the given name will appear in the "configuration profiles" list:

    The 'Apply' button applies the adjacent configuration on the device.

    Scheduler

    The Profile Scheduler provides a possibility to set up a schedule of when the device should use one profile configuration or another.

    Check Profile Scheduler Instance Example to get a better understanding at how Profile Scheduler Instances works.

    General Configuration


    The General Configuration section is used to enable the Scheduler itself. Created instances won't work unless this option is turned on.

    Profile Scheduler Instances


    The Profile Scheduler Instances section allows you to create profile Instances to be enabled during specific time intervals. To add a new Instance click Add button.

    Note: new Instance can only be created if there is at least one custom profile created.

    Profile Scheduler Instance Configuration

    This page is used to configure profile, time and day of selected scheduler instance. Refer to the figure and table below for information on the Profile Scheduler Instance Configuration fields:

    Field Value Description
    Enable off | on; default: off Enable selected instance for scheduler.
    Profile profiles; default: none Select profile which will be applied during specified time interval.
    Interval Type Weekdays | Month Days; default: Weekdays Depending on your needs select whether you want to configure weekdays or specific month days.
    Start Time time; default: 12:00 Enter time of the start of interval in which scheduler will switch profiles.
    End Time time; default: 12:00 Enter time of the end of interval in which scheduler will switch profiles back.
    Interval Type: Weekdays
    Start Day Weekday [Monday..Sunday]; default: Sunday Select a day of the start of interval in which scheduler will switch profiles.
    End Day Weekday [Monday..Sunday]; default: Sunday Select a day of the end of interval in which scheduler will switch profiles back.
    Interval Type: Month Days
    Start Day Day of month [1..31]; default: 1 Select a day of the start of interval in which scheduler will switch profiles.
    End Day Day of month [1..31]; default: 1 Select a day of the end of interval in which scheduler will switch profiles back.
    Force last day off | on; default: off Force intervals to accept last day of month as valid option if selected day doesn't exist in ongoing month.
    Profile Scheduler Instance Example

    Scheduler will use profile instance if it is enabled and it's time interval matches device's [[{{{name}}} Administration#Date_.26_Time|date]], otherwise default profile will be used.

    Example - we have 3 profiles in total:

    • default
    • Profile A
    • Profile B

    We create profile instances for Profiles A and B:

    • Profile A: 08:00 - 11:00
    • Profile B: 13:00 - 20:00

    During 11:00 - 13:00 and 20:00 - 08:00 default profile will be used.

    [[Category:{{{name}}} System section]]