Template:Networking rut manual administration: Difference between revisions
No edit summary |
Gytispieze (talk | contribs) m (Text replacement - "\{\{Template: Networking_rutos_manual_fw_disclosure (.*) (.*) (.*) \}\}" to "{{Template: Networking_device_manual_fw_disclosure | series = {{{series}}} | name = {{{name}}} | fw_version ={{Template: Networking_device_manual_latest_fw | series = {{{series}}} | name = {{{name}}} }} }}") Tags: Mobile edit Mobile web edit |
||
(9 intermediate revisions by 5 users not shown) | |||
Line 1: | Line 1: | ||
{{Template: | {{Template: Networking_device_manual_fw_disclosure | ||
| | | series = {{{series}}} | ||
| name = {{{name}}} | |||
| fw_version ={{Template: Networking_device_manual_latest_fw | |||
| series = {{{series}}} | |||
| name = {{{name}}} | |||
}} | |||
}} | }} | ||
==Summary== | ==Summary== | ||
Line 452: | Line 455: | ||
<td>Fail count</td> | <td>Fail count</td> | ||
<td>integer; default: <b>5</b></td> | <td>integer; default: <b>5</b></td> | ||
<td>Maximum login fail count after which the device's address is blocked and | <td>Maximum login fail count after which the device's address is blocked and added to the <i>List Of Blocked Addresses</i>.</td> | ||
</tr> | </tr> | ||
</table> | </table> |
Latest revision as of 11:24, 24 October 2023
The information in this page is updated in accordance with firmware version .
Summary
This chapter of the user manual provides an overview of the Administration page for {{{name}}} devices.
General
The General section is used to set up some of the router's managerial parameters, such as password, name, language, etc. For more information on the General section, refer to figure and table below.
Field | Value | Description |
---|---|---|
Router name | string; default: {{{name}}} | The router's model name. |
Host name | string; default: Teltonika-{{{name}}}.com | The router's hostname. This can be used for communication with other LAN hosts. |
Current password | string; default: none | The router's current password. |
New password | Confirm new password | string; default: none | A new password for the router. The password must be comprised of 8-32 characters, including at least one upper case letter, one lower case letter and one digit. |
Language | English | Deutsch | Français | Turkish; default: English | Selects the router's WebUI language. |
IPv6 Support | yes | no; default: no | Turns IPv6 support on or off. |
Show mobile info at login page | yes | no; default: no | Shows mobile data connection information (signal strength, state, service mode) at login page. |
Show WAN IP at login page | yes | no; default: no | Shows the router's WAN IP address at login page. |
LEDs Indication | yes | no; default: yes | Turns the router's LED indications on or off. |
Action | Reboot|User's defaults configuration|Factory defaults configuration; default:Reboot | The action to be performed when this rule is met. |
Restore to User's default | -(interactive button) | Restores the router to custom configuration set by the user. |
Restore to Factory default's | -(interactive button) | Restores the router to manufacturer default settings. |
Troubleshoot
The Troubleshoot section is used to download various files that contain information used for troubleshooting the router. Refer to the figure and table below for information on the Troubleshoot page.
[[File:{{{file_troubleshoot}}}]]
Field | Value | Description |
---|---|---|
System log level | Debug | Info | Notice | Warning | Error | Critical | Alert | Emergency; default: debug | Specifies the information output level of the system log.
|
Save log in | RAM memory | Flash memory; default: RAM memory | Specifies which type of memory to use for storing system logs. |
Include GSMD information | yes | no; default: yes | When checked, includes the router's GSMD information in the log file. |
Include PPPD information | yes | no; default: no | When checked, includes the router's PPPD information in the log file. |
Include chat script information | yes | no; default: yes | When checked, includes the router's chat script information in log file. |
System log | - (interactive button) | Displays the contents of the router's system log file. The system log contains records of various system related events, such as starts/stops of various services, errors, reboots, etc. |
Kernel log | - (interactive button) | Displays the contents of the router's kernel log file. The kernel log contains records of various events related to the processes of the operating system (OS). |
Troubleshoot file | - (interactive button) | Downloads the router's Troubleshoot file. It contains the router's configuration information, logs and some other files. When requesting support, it is recommended to always provide the router's Troubleshoot file to Teltonika engineers for analysis. |
TCP dump file | - (interactive button) | Downloads the router's TCP dump file. TCP dump is a program used to capture packets moving through network interfaces. By default, the router does not store TCP dump information. You must enable TCP dump and save the changes before you can download the file. |
Enable TCP dump* | yes | no; default: no | Turns TCP dump packets capture on or off. |
* More on TCP dump in the next section.
TCP dump
TCP dump is a program used to capture packets moving through network interfaces. By default, the router does not store TCP dump information. You must enable TCP dump and save the changes before you can download the file.
If you enable TCP dump, you will notice additional configuration fields appear. Refer to the figure and table below for realted information.
[[File:{{{file_tcpdump}}}]]
Field | Value | Description |
---|---|---|
Enable TCP dump | yes | no; default: no | Turns TCP dump packet capture on or off. |
Select interface | network interface; default: any | Only captures packets that move through the specified network interface. |
Select protocol filter | all | icmp | tcp | udp | arp; default: all | Only captures packets that match the specified protocol. |
Select packets direction | IN/OUT | Incoming | Outgoing; default: IN/OUT | Only captures packets coming from the specified direction. |
Host | ip | host; default: none | Only captures packets related to the specified host. |
Port | integer [0..65335]; default: none | Only captures packets related to the specified communication port. |
Select storage | Internal storage; default: Internal storage | Specifies where the TCP dump file will be stored. |
Backup
The Backup page is used to generate the user's defaults configuration and download or upload backup files to the router.
Backup and Restore Configuration
The Backup and Restore Configuration sections are used to download or upload configuration backup files to the router. Backup files can be uploaded only from identical devices with identical or older firmware. Once a backup file is uploaded to a router, that router will have identical configuration as the router from which the backup file originated (was downloaded from).
- Backup Configuration - generates and downloads the router's backup file based on the current configuration. Section also contains MD5, SHA256 checksum fields generated from latest downloaded backup.
- Restore Configuration - uploads a configuration backup file to the router. Once uploaded you will be redirected to backup security check page.
Important: backup files can be uploaded only when taken from a device with identical Product code, which can be checked in Status → [[{{{name}}} Device|Device]], and identical or older firmware.
Backup Security Check
After uploading backup you will be redirected to the following page to verify if the checksums of uploaded backup matches any of your downloaded backups.
Access Control
The Access Control page is used to manage remote and local access to the router.
Important: turning on remote access leaves the router vulnerable to external attackers. Make sure you use a strong password.
General
The General section is used to manage SSH, HTTP(S) and CLI access to the router.
SSH
[[File:{{{file_access_ssh}}}]]
Field | Value | Description |
---|---|---|
Enable SSH access | yes | no; default: yes | Turns SSH access from the local network (LAN) on or off. |
Remote SSH access | yes | no; default: no | Turns SSH access from remote networks (WAN) on or off. |
Port | integer [0..65535]; default: 22 | Selects which port to use for SSH access. |
WebUI
Field | Value | Description |
---|---|---|
Enable HTTP access | yes | no; default: yes | Turns HTTP access from the local network (LAN) to the router's WebUI on or off. |
Enable HTTPS access | yes | no; default: yes | Turns HTTPS access from the local network (LAN) to the router's WebUI on or off. |
Redirect to HTTPS | yes | no; default: no | Redirects connection attempts from HTTP to HTTPS. |
Enable remote HTTP access | yes | no; default: no | Turns HTTP access from remote networks (WAN) to the router's WebUI on or off. |
Port | integer [0..65535]; default: 80 | Selects which port to use for HTTP access. |
Enable remote HTTPS access | yes | no; default: no | Turns HTTPS access from remote networks (WAN) to the router's WebUI on or off. |
Port | integer [0..65535]; default: 443 | Selects which port to use for HTTPS access. |
uhttpd certificate | - (interactive button) | In order to reach the router using HTTPS, you should first download the uhttpd certificate and add it to your trusted CA list. |
Enable JSON RPC | yes | no; default: yes | Turns JSON-RPC access via ubus on or off. |
RFC1918 Filter | yes | no; default: yes | Turns Address Allocation for Private Internets on or off. |
CLI
[[File:{{{file_access_cli}}}]]
Field | Value | Description |
---|---|---|
Enable CLI | yes | no; default: yes | Turns CLI access from the local network (LAN) on or off. |
Enable remote CLI | yes | no; default: no | Turns CLI access from remote networks (WAN) on or off. |
Port range | range of integers [0..65534]-[1..65535]; default: 4200-4220 | Selects which ports to use for CLI access. |
Shell limit | integer [1..10]; default: 5 | Maximum number of active CLI connections. |
Safety
The Safety section is used to manage the List Of Blocked Addresses. After a user attempts to login to this devices via SSH/HTTP, he will have a limited amount of retries in case of unsuccessful login attempts. This limit is called Fail count and is set in this page. After the user exhausts the maximum number of attempts, his IP address will be blocked from making more attempts and added to the List Of Blocked Addresses.
Block Unwanted Access
[[File:{{{file_access_unwanted}}}]]
Field | Value | Description |
---|---|---|
Enable | yes | no; default: yes | Turns secure SSH/HTTP access on or off. If this is checked, devices logging in have a limited amount of tries specified in the Fail count field to log in to the router via SSH/HTTP. |
Clean after reboot | yes | no; default: no | If this field is checked, addresses are removed from the List Of Blocked Addresses after every router reboot. |
Fail count | integer; default: 5 | Maximum login fail count after which the device's address is blocked and added to the List Of Blocked Addresses. |
List Of Blocked Addresses
[[File:{{{file_access_list}}}]]
The screenshot above is of a list that contains one blocked address. If you or someone you know gets blocked accidentally, you can unblock users from this section by deleting their IP addresses from the list.
Note: the list gets cleared after a factory reset.
Diagnostics
The Diagnostics section is used to execute simple network diagnostic tests, including ping, traceroute and nslookup.
[[File:{{{file_diagnostics}}}]]
Enter an address in the Host field and execute one of the following actions:
- Ping - sends ICMP requests to the specified address.
- Traceroute - displays the path that packets have to take in order to reach the specified address.
- Nslookup - obtains domain name address and IP address mapping information.
MAC Clone
The MAC Clone section is used to change the router's WAN MAC address. You can change the MAC address by entering a new custom value in the WAN MAC address field or click the 'Get PC MAC address' button to obtain your PC's MAC address and use it to fill the field.
[[File:{{{file_mac_clone}}}]]
In some cases access to a local network is protected by a MAC filter. For example, your company's main router may bind the MAC addresses of devices to the physical Internet sockets they usually connect to. In these cases only the device that is bound to the socket may gain access to the network. You can use MAC Clone to "clone" your PCs address and apply it to your router's WAN Ethernet port to gain access to such networks.
Overview
The Overview section is used to select which widgets should be visible in the Status → [[{{{name}}} Overview|Overview]] page.
[[File:{{{file_overview}}}]]
Simply select the widgets that you would like to view in the Overview page and click the 'Save' button.
RMS
RMS (Remote Management System) is a cloud system designed by Teltonika and intended for remote monitoring and management of Teltonika-Networks products.
In order to add a device(s) to RMS, get yourself acquainted by watching this instructional video and register an account by clicking here. Each unique device receives a free month-long RMS license when added to RMS for the first time.
The figure below is a screenshot of the RMS section taken from a device which has been connected to RMS:
[[File:{{{file_rms_connected}}}]]
Field | Value | Description |
---|---|---|
Connection type | Enabled | Standby | Disabled; default: Enabled | Defines how the device will connect to RMS:
|
Hostname | host | ip; default: rms.teltonika.lt | Address of the RMS server. If you're using regular RMS, just leave the default address (rms.teltonika.lt). |
Port | integer [0..65535]; default: 15009 | Port number for connecting to RMS. If you're using regular RMS, just leave the default port (15009). |
The RMS server waits for incoming connections. Since the device attempts to connect at a fixed interval, it may not connect instantly after you add it to RMS. While it is disconnected, you can check how much time is left until the next connection attempt in the Status section:
[[File:{{{file_rms_disconnected}}}]]
To speed up the process by initiating an immediate connection attempt, click the 'Connect' button.
For more information on Teltonika's Remote Management System (RMS) refer to the RMS Manual or RMS FAQ pages.
Root CA
The Root CA section is used to add a root CA certificate file to the router. There is a default file already preloaded on the device which will be overwritten by any uploaded file. The certificates must be in .pem format, maximum file size is 300 KB. These certificates are only needed if you want to use HTTPS for your services and the default file should be sufficient in most cases.
[[File:{{{file_root_ca}}}]]
[[Category:{{{name}}} System section]]