Line 277: |
Line 277: |
| <td>off {{!}} on; default: <b>on</b></td> | | <td>off {{!}} on; default: <b>on</b></td> |
| <td>Turns SSH access from the local network (LAN) on or off.</td> | | <td>Turns SSH access from the local network (LAN) on or off.</td> |
− | </tr>{{#switch:{{{series}}}|TAP100|TAP200=|#default | + | </tr>{{#switch:{{{series}}}|TAP100|TAP200=|#default= |
| <tr> | | <tr> |
| <td>Remote SSH access</td> | | <td>Remote SSH access</td> |
Line 451: |
Line 451: |
| <tr> | | <tr> |
| <td>Type</td> | | <td>Type</td> |
− | <td>Required {{!}} Requisite {{!}} Sufficient {{!}} Optional; default: <b>Required </b></td> | + | <td>Required {{!}} Requisite {{!}} Sufficient {{!}} Optional; default: <b>Optional </b></td> |
| <td>Determines the continuation or failure behavior for the module</td> | | <td>Determines the continuation or failure behavior for the module</td> |
| + | </tr> |
| + | <tr> |
| + | <td><span style="color:red">Radius</span>: Enable for all users</td> |
| + | <td>off {{!}} on; default: <b>off</b></td> |
| + | <td>Turn on PAM authentication for all users. It will allow login with users that are not created on the device.</td> |
| </tr> | | </tr> |
| <tr> | | <tr> |
Line 482: |
Line 487: |
| <b>IP Block Settings</b> | | <b>IP Block Settings</b> |
| ---- | | ---- |
− | [[File:Networking_rutos_manual_administration_access_control_security_v3.png|border|class=tlt-border]] | + | [[File:Networking_rutos_manual_administration_access_control_security_v4.png|border|class=tlt-border]] |
| <table class="nd-mantable"> | | <table class="nd-mantable"> |
| <tr> | | <tr> |
Line 493: |
Line 498: |
| <td>off {{!}} on; default: <b>on</b></td> | | <td>off {{!}} on; default: <b>on</b></td> |
| <td>Enable or disable blocking IP's if they have reached the set amount of failed times.</td> | | <td>Enable or disable blocking IP's if they have reached the set amount of failed times.</td> |
| + | </tr> |
| + | <tr> |
| + | <td>Type</td> |
| + | <td>Timed blocking {{!}} Permanent blocking; default: <b>Timed blocking</b></td> |
| + | <td>You can choose an option of a blocking type.</td> |
| </tr> | | </tr> |
| <tr> | | <tr> |
Line 503: |
Line 513: |
| <td>off {{!}} on; default: <b>off</b></td> | | <td>off {{!}} on; default: <b>off</b></td> |
| <td>If enabled, blocked loging attempts list will be cleared on device reboot.</td> | | <td>If enabled, blocked loging attempts list will be cleared on device reboot.</td> |
− | </tr>
| |
− | <tr>
| |
− | <td>Enable MAC blockig</td>
| |
− | <td>off {{!}} on; default: <b>off</b></td>
| |
− | <td>If enabled, MAC adresses wil be blocked.</td>
| |
| </tr> | | </tr> |
| </table> | | </table> |
Line 513: |
Line 518: |
| <b>Login Attempts</b> | | <b>Login Attempts</b> |
| ---- | | ---- |
− | [[File:Networking_rutos_manual_administration_access_control_security_login.png|border|class=tlt-border]] | + | [[File:Networking_rutos_manual_administration_access_control_security_login_v2.png|border|class=tlt-border]] |
| <table class="nd-mantable"> | | <table class="nd-mantable"> |
| <tr> | | <tr> |
Line 521: |
Line 526: |
| </tr> | | </tr> |
| <tr> | | <tr> |
− | <td>Source address</td> | + | <td>Source</td> |
| <td>IP address</td> | | <td>IP address</td> |
| <td>Shows the IP address from which the connection failed.</td> | | <td>Shows the IP address from which the connection failed.</td> |
| </tr> | | </tr> |
| <tr> | | <tr> |
− | <td>Device port</td>
| + | <td>Destination</td> |
− | <td>Port number</td>
| |
− | <td>Shows the port number from which the connection failed.</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td>Destination address</td> | |
| <td>IP address</td> | | <td>IP address</td> |
| <td>Shows yours device IP adress</td> | | <td>Shows yours device IP adress</td> |
| </tr> | | </tr> |
| <tr> | | <tr> |
− | <td>Protocol</td> | + | <td>Port (protocol)</td> |
− | <td>Connection protocol</td> | + | <td>Port number</td> |
− | <td>Displays the connection protocol used for connection.</td> | + | <td>Shows the port number from which the connection failed.</td> |
| </tr> | | </tr> |
| <tr> | | <tr> |
− | <td>Failed atempts</td> | + | <td>Status</td> |
− | <td>Number</td> | + | <td>Attempt count {{!}} Blocked</td> |
− | <td>Shows the number of failed attempts to connect to device.</td> | + | <td>Shows the number of failed attempts to connect to device. Indicates whether the source address is blocked or not.</td> |
| </tr> | | </tr> |
| <tr> | | <tr> |
− | <td>Status</td>
| |
− | <td>- {{!}} Blocked</td>
| |
− | <td>Indicates whether the source address is blocked or not.</td>
| |
− | </tr>
| |
− | <tr>
| |
| <td>Reset</td> | | <td>Reset</td> |
| <td>Check box</td> | | <td>Check box</td> |
| <td>Allows you to select multiple IP addresses.</td> | | <td>Allows you to select multiple IP addresses.</td> |
| </tr> | | </tr> |
− | <tr> | + | <tr> |
| + | <td>Actions</td> |
| + | <td>-(interactive button)</td> |
| + | <td>Allows you to select multiple IP addresses.</td> |
| + | </tr> |
| + | <tr> |
| <td>Unblock all</td> | | <td>Unblock all</td> |
| <td>-(interactive button)</td> | | <td>-(interactive button)</td> |
− | <td>Unblocks all source adresses from the list.</td> | + | <td>Deletes instance.</td> |
| </tr> | | </tr> |
− | <tr>
| + | <tr> |
| <td>Unblock selected</td> | | <td>Unblock selected</td> |
| <td>-(interactive button)</td> | | <td>-(interactive button)</td> |
Line 604: |
Line 604: |
| After clicking 'Edit' you should be redirected to that phone group's configuration page where you can start adding phone numbers to it. | | After clicking 'Edit' you should be redirected to that phone group's configuration page where you can start adding phone numbers to it. |
| | | |
− | [[File:Networking_rutos_manual_administration_recipients_phone_groups_modify_phone_group.png|border|class=tlt-border]] | + | [[File:Networking_rutos_manual_administration_recipients_phone_groups_modify_phone_group_v2.png|border|class=tlt-border]] |
| | | |
| <table class="nd-mantable"> | | <table class="nd-mantable"> |
Line 708: |
Line 708: |
| The <b>Certificate Generation</b> tab provides the possibility to generate TLS certificates required for secure authentication and communication encryption used by some of the devices services. | | The <b>Certificate Generation</b> tab provides the possibility to generate TLS certificates required for secure authentication and communication encryption used by some of the devices services. |
| | | |
− | There are five distinct generation methods (denoted by the selected 'File Type'). | + | There are six distinct generation methods (denoted by the selected 'File Type'). |
| | | |
| <ol> | | <ol> |
Line 723: |
Line 723: |
| <li><b>Client</b> - generates a client certificate and key. A client certificate validates a client's identity to the server that it's connecting to, while a key is responsible for encryption.</li> | | <li><b>Client</b> - generates a client certificate and key. A client certificate validates a client's identity to the server that it's connecting to, while a key is responsible for encryption.</li> |
| <li><b>DH Parameters</b> - generates a Diffie-Hellman (DH) parameters file. DH parameters are used in symmetric encryption to protect and define how OpenSSL key exchange is performed.</li> | | <li><b>DH Parameters</b> - generates a Diffie-Hellman (DH) parameters file. DH parameters are used in symmetric encryption to protect and define how OpenSSL key exchange is performed.</li> |
| + | <li><b>Let's encrypt</b> - generates SSL certificate.</li> |
| </ol> | | </ol> |
| | | |
Line 750: |
Line 751: |
| </tr> | | </tr> |
| </table> | | </table> |
− | | + | ---- |
| <b>TLS parameters</b> or simply parameters that apply to each (CA, Server, Client, DH) file type are the size and common name of the generated file(s). | | <b>TLS parameters</b> or simply parameters that apply to each (CA, Server, Client, DH) file type are the size and common name of the generated file(s). |
| | | |