Changes

no edit summary
Line 277: Line 277:  
         <td>off {{!}} on; default: <b>on</b></td>
 
         <td>off {{!}} on; default: <b>on</b></td>
 
         <td>Turns SSH access from the local network (LAN) on or off.</td>
 
         <td>Turns SSH access from the local network (LAN) on or off.</td>
     </tr>{{#switch:{{{series}}}|TAP100|TAP200=|#default
+
     </tr>{{#switch:{{{series}}}|TAP100|TAP200=|#default=
 
     <tr>
 
     <tr>
 
         <td>Remote SSH access</td>
 
         <td>Remote SSH access</td>
Line 451: Line 451:  
     <tr>
 
     <tr>
 
         <td>Type</td>
 
         <td>Type</td>
         <td>Required {{!}} Requisite {{!}} Sufficient {{!}} Optional; default: <b>Required </b></td>
+
         <td>Required {{!}} Requisite {{!}} Sufficient {{!}} Optional; default: <b>Optional </b></td>
 
         <td>Determines the continuation or failure behavior for the module</td>
 
         <td>Determines the continuation or failure behavior for the module</td>
 +
    </tr>
 +
    <tr>
 +
        <td><span style="color:red">Radius</span>: Enable for all users</td>
 +
        <td>off {{!}} on; default: <b>off</b></td>
 +
        <td>Turn on PAM authentication for all users. It will allow login with users that are not created on the device.</td>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
Line 482: Line 487:  
<b>IP Block Settings</b>  
 
<b>IP Block Settings</b>  
 
----
 
----
[[File:Networking_rutos_manual_administration_access_control_security_v3.png|border|class=tlt-border]]
+
[[File:Networking_rutos_manual_administration_access_control_security_v4.png|border|class=tlt-border]]
 
<table class="nd-mantable">
 
<table class="nd-mantable">
 
     <tr>
 
     <tr>
Line 493: Line 498:  
         <td>off {{!}} on; default: <b>on</b></td>
 
         <td>off {{!}} on; default: <b>on</b></td>
 
         <td>Enable or disable blocking IP's if they have reached the set amount of failed times.</td>
 
         <td>Enable or disable blocking IP's if they have reached the set amount of failed times.</td>
 +
    </tr>
 +
    <tr>
 +
        <td>Type</td>
 +
        <td>Timed blocking {{!}} Permanent blocking; default: <b>Timed blocking</b></td>
 +
        <td>You can choose an option of a blocking type.</td>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
Line 503: Line 513:  
         <td>off {{!}} on; default: <b>off</b></td>
 
         <td>off {{!}} on; default: <b>off</b></td>
 
         <td>If enabled, blocked loging attempts list will be cleared on device reboot.</td>
 
         <td>If enabled, blocked loging attempts list will be cleared on device reboot.</td>
    </tr>
  −
    <tr>
  −
        <td>Enable MAC blockig</td>
  −
        <td>off {{!}} on; default: <b>off</b></td>
  −
        <td>If enabled, MAC adresses wil be blocked.</td>
   
     </tr>
 
     </tr>
 
</table>
 
</table>
Line 513: Line 518:  
<b>Login Attempts</b>
 
<b>Login Attempts</b>
 
----
 
----
[[File:Networking_rutos_manual_administration_access_control_security_login.png|border|class=tlt-border]]
+
[[File:Networking_rutos_manual_administration_access_control_security_login_v2.png|border|class=tlt-border]]
 
<table class="nd-mantable">
 
<table class="nd-mantable">
 
     <tr>
 
     <tr>
Line 521: Line 526:  
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
         <td>Source address</td>
+
         <td>Source</td>
 
         <td>IP address</td>
 
         <td>IP address</td>
 
         <td>Shows the IP address from which the connection failed.</td>
 
         <td>Shows the IP address from which the connection failed.</td>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
        <td>Device port</td>
+
         <td>Destination</td>
        <td>Port number</td>
  −
        <td>Shows the port number from which the connection failed.</td>
  −
    </tr>
  −
    <tr>
  −
         <td>Destination address</td>
   
         <td>IP address</td>
 
         <td>IP address</td>
 
         <td>Shows yours device IP adress</td>
 
         <td>Shows yours device IP adress</td>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
         <td>Protocol</td>
+
         <td>Port (protocol)</td>
         <td>Connection protocol</td>
+
         <td>Port number</td>
         <td>Displays the connection protocol used for connection.</td>
+
         <td>Shows the port number from which the connection failed.</td>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
         <td>Failed atempts</td>
+
         <td>Status</td>
         <td>Number</td>
+
         <td>Attempt count {{!}} Blocked</td>
         <td>Shows the number of failed attempts to connect to device.</td>
+
         <td>Shows the number of failed attempts to connect to device. Indicates whether the source address is blocked or not.</td>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
        <td>Status</td>
  −
        <td>- {{!}} Blocked</td>
  −
        <td>Indicates whether the source address is blocked or not.</td>
  −
    </tr>
  −
        <tr>
   
         <td>Reset</td>
 
         <td>Reset</td>
 
         <td>Check box</td>
 
         <td>Check box</td>
 
         <td>Allows you to select multiple IP addresses.</td>
 
         <td>Allows you to select multiple IP addresses.</td>
 
     </tr>
 
     </tr>
         <tr>
+
    <tr>
 +
         <td>Actions</td>
 +
        <td>-(interactive button)</td>
 +
        <td>Allows you to select multiple IP addresses.</td>
 +
    </tr>
 +
    <tr>
 
         <td>Unblock all</td>
 
         <td>Unblock all</td>
 
         <td>-(interactive button)</td>
 
         <td>-(interactive button)</td>
         <td>Unblocks all source adresses from the list.</td>
+
         <td>Deletes instance.</td>
 
     </tr>
 
     </tr>
        <tr>
+
    <tr>
 
         <td>Unblock selected</td>
 
         <td>Unblock selected</td>
 
         <td>-(interactive button)</td>
 
         <td>-(interactive button)</td>
Line 604: Line 604:  
After clicking 'Edit' you should be redirected to that phone group's configuration page where you can start adding phone numbers to it.
 
After clicking 'Edit' you should be redirected to that phone group's configuration page where you can start adding phone numbers to it.
   −
[[File:Networking_rutos_manual_administration_recipients_phone_groups_modify_phone_group.png|border|class=tlt-border]]
+
[[File:Networking_rutos_manual_administration_recipients_phone_groups_modify_phone_group_v2.png|border|class=tlt-border]]
    
<table class="nd-mantable">
 
<table class="nd-mantable">
Line 708: Line 708:  
The <b>Certificate Generation</b> tab provides the possibility to generate TLS certificates required for secure authentication and communication encryption used by some of the devices services.
 
The <b>Certificate Generation</b> tab provides the possibility to generate TLS certificates required for secure authentication and communication encryption used by some of the devices services.
   −
There are five distinct generation methods (denoted by the selected 'File Type').  
+
There are six distinct generation methods (denoted by the selected 'File Type').  
    
<ol>
 
<ol>
Line 723: Line 723:  
     <li><b>Client</b> - generates a client certificate and key. A client certificate validates a client's identity to the server that it's connecting to, while a key is responsible for encryption.</li>
 
     <li><b>Client</b> - generates a client certificate and key. A client certificate validates a client's identity to the server that it's connecting to, while a key is responsible for encryption.</li>
 
     <li><b>DH Parameters</b> - generates a Diffie-Hellman (DH) parameters file. DH parameters are used in symmetric encryption to protect and define how OpenSSL key exchange is performed.</li>
 
     <li><b>DH Parameters</b> - generates a Diffie-Hellman (DH) parameters file. DH parameters are used in symmetric encryption to protect and define how OpenSSL key exchange is performed.</li>
 +
    <li><b>Let's encrypt</b> - generates SSL certificate.</li>
 
</ol>
 
</ol>
   Line 750: Line 751:  
     </tr>
 
     </tr>
 
</table>
 
</table>
 
+
----
 
<b>TLS parameters</b> or simply parameters that apply to each (CA, Server, Client, DH) file type are the size and common name of the generated file(s).
 
<b>TLS parameters</b> or simply parameters that apply to each (CA, Server, Client, DH) file type are the size and common name of the generated file(s).