Jump to content

Template:Networking rutos manual administration: Difference between revisions

no edit summary
No edit summary
No edit summary
(27 intermediate revisions by 4 users not shown)
Line 1: Line 1:
<!--- {{{series}}}, {{{name}}} --->
<!--- {{{series}}}, {{{name}}} --->
{{Template: Networking_rutos_manual_fw_disclosure
{{Template: Networking_device_manual_fw_disclosure
| fw_version ={{Template: Networking_rutos_manual_latest_fw
| series = {{{series}}}
| name  = {{{name}}}
| fw_version ={{Template: Networking_device_manual_latest_fw
  | series = {{{series}}}
  | series = {{{series}}}
  | name  = {{{name}}}
  | name  = {{{name}}}
  }}
  }}
}}
}}
{{#ifeq: {{{series}}} | RUT9 |<br><i><b>Note</b>: <b>[[{{{name}}} Administration (legacy WebUI)|click here]]</b> for the old style WebUI (FW version {{Template: Networking_rutos_manual_latest_fw | series = RUT9XX}} and earlier) user manual page.</i>|}}
{{#ifeq: {{{series}}} | RUT9 |<br><i><b>Note</b>: <b>[[{{{name}}} Administration (legacy WebUI)|click here]]</b> for the old style WebUI (FW version {{Template: Networking_device_manual_latest_fw | series = RUT9XX}} and earlier) user manual page.</i>|}}
{{#ifeq: {{{series}}} | RUT2 |<br><i><b>Note</b>: <b>[[{{{name}}} Administration (legacy WebUI)|click here]]</b> for the old style WebUI (FW version {{Template: Networking_rutos_manual_latest_fw | series = RUT2XX}} and earlier) user manual page.</i>|}}
{{#ifeq: {{{series}}} | RUT2 |<br><i><b>Note</b>: <b>[[{{{name}}} Administration (legacy WebUI)|click here]]</b> for the old style WebUI (FW version {{Template: Networking_device_manual_latest_fw | series = RUT2XX}} and earlier) user manual page.</i>|}}
__TOC__
==Summary==
==Summary==


Line 16: Line 19:
The <b>General</b> section is used to set up some of device managerial parameters, such as changing device name. For more information on the General section, refer to figure and table below.
The <b>General</b> section is used to set up some of device managerial parameters, such as changing device name. For more information on the General section, refer to figure and table below.
{{#switch:{{{series}}}
{{#switch:{{{series}}}
  | TAP100=[[File:Networking_rutos_manual_administration_general_tap100_v1.png|border|class=tlt-border]]
  | TAP100|TAP200=[[File:Networking_rutos_manual_administration_general_tap100_v1.png|border|class=tlt-border]]
  | TCR1=[[File:Networking_rutos_manual_administration_general_tcr_v2.png|border|class=tlt-border]]
  | TCR1=[[File:Networking_rutos_manual_administration_general_tcr_v2.png|border|class=tlt-border]]
  | TRB1|TRB2|TRB5=[[File:Networking_rutos_manual_administration_general_trb_v2.png|border|class=tlt-border]]
  | TRB1|TRB2|TRB5=[[File:Networking_rutos_manual_administration_general_trb_v2.png|border|class=tlt-border]]
Line 26: Line 29:
       <th>Value</th>
       <th>Value</th>
       <th>Description</th>
       <th>Description</th>
     </tr>{{#ifeq:{{{series}}}|TAP100||
     </tr>{{#switch:{{{series}}}|TAP100|TAP200=|#default=
     <tr>
     <tr>
       <th>General Settings</th>
       <th>General Settings</th>
Line 84: Line 87:
</table>
</table>


{{#ifeq:{{{series}}}|TAP100||<span class="asterisk">*</span> Different language packages can be downloaded separately from the <b>Services → [[{{{name}}} Package Manager|Package Manager]]</b> page.}}
{{#switch:{{{series}}}|TAP100|TAP200=|#default=<span class="asterisk">*</span> Different language packages can be downloaded separately from the <b>System → [[{{{name}}} Package Manager|Package Manager]]</b> page.}}


==Date & Time==
==Date & Time==
Line 114: Line 117:
       <td>Sync with browser</td>
       <td>Sync with browser</td>
       <td>-(interactive button)</td>
       <td>-(interactive button)</td>
       <td>Click to synchronize device time and time zone to browsers, if your device time or time zone is not correct.<br>
       <td>Click to synchronize device time and time zone to browsers, if your device time or time zone is not correct.<br></td>
     </tr>
     </tr>
     <tr>
     <tr>
Line 126: Line 129:
         <td>off {{!}} on; default: <b>off</b></td>
         <td>off {{!}} on; default: <b>off</b></td>
         <td>Enables periodic time synchronization for the system using the GPS module which does not require an Internet connection.</td>
         <td>Enables periodic time synchronization for the system using the GPS module which does not require an Internet connection.</td>
     </tr>
     </tr>|}}
|}}
</table>
</table>
===NTP===
===NTP===
Line 190: Line 192:
This section is used to specify which time servers the device will use for time synchronization. To add more time servers to the list, click the 'Add' button.
This section is used to specify which time servers the device will use for time synchronization. To add more time servers to the list, click the 'Add' button.


{{#ifeq:{{{series}}}|TAP100|[[File:Networking_rutos_ntp_ntp_time_servers_tap100.png|border|class=tlt-border]]|[[File:Networking_rutos_ntp_ntp_time_servers.png|border|class=tlt-border]]}}
{{#switch:{{{series}}}|TAP100|TAP200=[[File:Networking_rutos_ntp_ntp_time_servers_tap100_v2.png|border|class=tlt-border]]|#default=[[File:Networking_rutos_ntp_ntp_time_servers_v2.png|border|class=tlt-border]]}}
<table class="nd-mantable">
<table class="nd-mantable">
     <tr>
     <tr>
Line 204: Line 206:
</table>
</table>


{{#ifeq:{{{series}}}|TAP100||====NTP Server====
{{#switch:{{{series}}}|TAP100|TAP200=|#default= ====NTP Server====
----
----
The device can also act as an <b>NTP Server</b>, providing clock synchronization to other devices in the network. From this section you can turn this feature on or off:
The device can also act as an <b>NTP Server</b>, providing clock synchronization to other devices in the network. From this section you can turn this feature on or off:


[[File:Networking_rutos_ntp_ntp_server.png|border|class=tlt-border]]}}
[[File:Networking_rutos_ntp_ntp_server.png|border|class=tlt-border]]}}
{{#ifeq:{{{series}}}|TAP100||===NTPD===
{{#switch:{{{series}}}|TAP100|TAP200=|#default= ===NTPD===
----
----
The <b>NTPD</b> program is an operating system daemon that synchronizes the system clock to remote NTP time servers or local reference clocks. NTPD includes the ability to use this to keep your clock in sync and will run more accurately than a clock on a device not running NTPD. NTPD will also use several servers to improve accuracy. It is a complete implementation of NTP version 4 defined by RFC-5905, but also retains compatible with version 3 defined by RFC-1305 and versions 1 and 2, defined by RFC-1059 and RFC-1119, respectively.
The <b>NTPD</b> program is an operating system daemon that synchronizes the system clock to remote NTP time servers or local reference clocks. NTPD includes the ability to use this to keep your clock in sync and will run more accurately than a clock on a device not running NTPD. NTPD will also use several servers to improve accuracy. It is a complete implementation of NTP version 4 defined by RFC-5905, but also retains compatible with version 3 defined by RFC-1305 and versions 1 and 2, defined by RFC-1059 and RFC-1119, respectively.


<b>Note:</b> PAM is additional software that can be installed from the <b>Services → [[{{{name}}} Package Manager|Package Manager]]</b> page.
<b>Note:</b> NTPD is additional software that can be installed from the <b>System → [[{{{name}}} Package Manager|Package Manager]]</b> page.
[[File:Networking_rutos_ntp_ntpd.png|border|class=tlt-border]]
[[File:Networking_rutos_ntp_ntpd_v2.png|border|class=tlt-border]]


<table class="nd-mantable">
<table class="nd-mantable">
Line 251: Line 253:
==User Settings==
==User Settings==


{{Template: Networking_rutos_manual_users | series = {{{series}}} | name = {{{name}}}}}
{{Template: Networking_rutos_manual_users | series = {{{series}}} | name = {{{name}}} | wifi = {{{wifi}}} | mobile = {{{mobile}}}}}


==Access Control==
==Access Control==
===General===
===General===
----
----
The <b>Access Control</b> page is used to manage {{#ifeq:{{{series}}}|TAP100||remote and}} local access to device.
The <b>Access Control</b> page is used to manage {{#switch:{{{series}}}|TAP100|TAP200=|#default= remote and}} local access to device.


{{#ifeq:{{{series}}}|TAP100||<b>Important</b>: turning on remote access leaves your device vulnerable to external attackers. Make sure you use a strong password.
{{#switch:{{{series}}}|TAP100|TAP200=|#default=<b>Important</b>: turning on remote access leaves your device vulnerable to external attackers. Make sure you use a strong password.
<br><br>}}
<br><br>}}
<b>SSH</b>
<b>SSH</b>
----{{#switch:{{{series}}}
----{{#switch:{{{series}}}
|TAP100 = [[File:Networking_rutos_manual_administration_access_control_general_ssh_tap100_v1.png|border|class=tlt-border]]
|TAP100|TAP200 = [[File:Networking_rutos_manual_administration_access_control_general_ssh_tap100_v1.png|border|class=tlt-border]]
|#default = [[File:Networking_rutos_manual_administration_access_control_general_ssh_v1.png|border|class=tlt-border]]}}
|#default = [[File:Networking_rutos_manual_administration_access_control_general_ssh_v1.png|border|class=tlt-border]]}}


Line 273: Line 275:
     <tr>
     <tr>
         <td>Enable SSH access</td>
         <td>Enable SSH access</td>
         <td>off | on; default: <b>on</b></td>
         <td>off {{!}} on; default: <b>on</b></td>
         <td>Turns SSH access from the local network (LAN) on or off.</td>
         <td>Turns SSH access from the local network (LAN) on or off.</td>
     </tr>{{#ifeq:{{{series}}}|TAP100||
     </tr>{{#switch:{{{series}}}|TAP100|TAP200=|#default=
     <tr>
     <tr>
         <td>Remote SSH access</td>
         <td>Remote SSH access</td>
         <td>off | on; default: <b>off</b></td>
         <td>off {{!}} on; default: <b>off</b></td>
         <td>Turns SSH access from remote networks (WAN) on or off.</td>
         <td>Turns SSH access from remote networks (WAN) on or off.</td>
     </tr>}}
     </tr>}}
Line 288: Line 290:
     <tr>
     <tr>
         <td>Enable key-based authentication</td>
         <td>Enable key-based authentication</td>
         <td>off | on; default: <b>off</b></td>
         <td>off {{!}} on; default: <b>off</b></td>
         <td>Use public keys for authentication.</td>
         <td>Use public keys for authentication.</td>
     </tr>
     </tr>
Line 295: Line 297:
<b>WebUI</b>
<b>WebUI</b>
----{{#switch:{{{series}}}
----{{#switch:{{{series}}}
|TAP100 = [[File:Networking_rutos_manual_administration_access_control_general_webui_tap100_v1.png|border|class=tlt-border]]
|TAP100|TAP200 = [[File:Networking_rutos_manual_administration_access_control_general_webui_tap100_v1.png|border|class=tlt-border]]
|#default = [[File:Networking_rutos_manual_administration_access_control_general_webui_v1.png|border|class=tlt-border]]}}
|#default = [[File:Networking_rutos_manual_administration_access_control_general_webui_v1.png|border|class=tlt-border]]}}


Line 306: Line 308:
     <tr>
     <tr>
         <td>Enable HTTP access</td>
         <td>Enable HTTP access</td>
         <td>off | on; default: <b>on</b></td>
         <td>off {{!}} on; default: <b>on</b></td>
         <td>Turns HTTP access from the local network (LAN) to the device WebUI on or off.</td>
         <td>Turns HTTP access from the local network (LAN) to the device WebUI on or off.</td>
     </tr>
     </tr>
     <tr>
     <tr>
         <td>Enable HTTPS access</td>
         <td>Enable HTTPS access</td>
         <td>off | on; default: <b>on</b></td>
         <td>off {{!}} on; default: <b>on</b></td>
         <td>Turns HTTPS access from the local network (LAN) to the device WebUI on or off.</td>
         <td>Turns HTTPS access from the local network (LAN) to the device WebUI on or off.</td>
     </tr>
     </tr>
     <tr>
     <tr>
         <td>Redirect to HTTPS</td>
         <td>Redirect to HTTPS</td>
         <td>off | on; default: <b>off</b></td>
         <td>off {{!}} on; default: <b>off</b></td>
         <td>Redirects connection attempts from HTTP to HTTPS.</td>
         <td>Redirects connection attempts from HTTP to HTTPS.</td>
     </tr>{{#ifeq:{{{series}}}|TAP100||
     </tr>{{#switch:{{{series}}}|TAP100|TAP200=|#default=
     <tr>
     <tr>
         <td>Enable remote HTTP access</td>
         <td>Enable remote HTTP access</td>
         <td>off | on; default: <b>off</b></td>
         <td>off {{!}} on; default: <b>off</b></td>
         <td>Turns HTTP access from remote networks (WAN) to the device WebUI on or off.</td>
         <td>Turns HTTP access from remote networks (WAN) to the device WebUI on or off.</td>
     </tr>}}
     </tr>}}
Line 328: Line 330:
         <td>integer [0..65535]; default: <b>80</b></td>
         <td>integer [0..65535]; default: <b>80</b></td>
         <td>Selects which port to use for HTTP access.</td>
         <td>Selects which port to use for HTTP access.</td>
     </tr>{{#ifeq:{{{series}}}|TAP100||
     </tr>{{#switch:{{{series}}}|TAP100|TAP200=|#default=
     <tr>
     <tr>
         <td>Enable remote HTTPS access</td>
         <td>Enable remote HTTPS access</td>
         <td>off | on; default: <b>off</b></td>
         <td>off {{!}} on; default: <b>off</b></td>
         <td>Turns HTTPS access from remote networks (WAN) to the device WebUI on or off.</td>
         <td>Turns HTTPS access from remote networks (WAN) to the device WebUI on or off.</td>
     </tr>}}
     </tr>}}
Line 338: Line 340:
         <td>integer [0..65535]; default: <b>443</b></td>
         <td>integer [0..65535]; default: <b>443</b></td>
         <td>Selects which port to use for HTTPS access.</td>
         <td>Selects which port to use for HTTPS access.</td>
     </tr>{{#ifeq:{{{series}}}|TAP100||
     </tr>{{#switch:{{{series}}}|TAP100|TAP200=|#default=
     <tr>
     <tr>
         <td>Ignore private IPs on public interface</td>
         <td>Ignore private IPs on public interface</td>
         <td>off | on; default: <b>on</b></td>
         <td>off {{!}} on; default: <b>on</b></td>
         <td>Prevent access from private (RFC1918) IPs on an interface if it has an public IP address.</td>
         <td>Prevent access from private (RFC1918) IPs on an interface if it has an public IP address.</td>
     </tr>}}{{#ifeq:{{{series}}}|TAP100||
     </tr>}}{{#switch:{{{series}}}|TAP100|TAP200=|#default=
     <tr>
     <tr>
         <td>Certificate files from device</td>
         <td>Certificate files from device</td>
         <td>off | on; default: <b>on</b></td>
         <td>off {{!}} on; default: <b>on</b></td>
         <td>Choose this option if you want to select certificate files from device. Certificate files can be generated in [[{{{name}}} Administration#Certificates|Certificates]] section.</td>
         <td>Choose this option if you want to select certificate files from device. Certificate files can be generated in [[{{{name}}} Administration#Certificates|Certificates]] section.</td>
     </tr>}}{{#ifeq:{{{series}}}|TAP100||
     </tr>}}{{#switch:{{{series}}}|TAP100|TAP200=|#default=
     <tr>
     <tr>
         <td>Server certificate</td>
         <td>Server certificate</td>
         <td>.crt; default: <b>uhttpd.crt</b></td>
         <td>.crt; default: <b>uhttpd.crt</b></td>
         <td>Server certificate file.</td>
         <td>Server certificate file.</td>
     </tr>}}{{#ifeq:{{{series}}}|TAP100||
     </tr>}}{{#switch:{{{series}}}|TAP100|TAP200=|#default=
     <tr>
     <tr>
         <td>Server key</td>
         <td>Server key</td>
Line 363: Line 365:
<b>CLI</b>
<b>CLI</b>
----{{#switch:{{{series}}}
----{{#switch:{{{series}}}
|TAP100 = [[File:Networking_rutos_manual_administration_access_control_general_cli_tap100.png|border|class=tlt-border]]
|TAP100|TAP200 = [[File:Networking_rutos_manual_administration_access_control_general_cli_tap100.png|border|class=tlt-border]]
|#default = [[File:Networking_rutos_manual_administration_access_control_general_cli.png|border|class=tlt-border]]}}
|#default = [[File:Networking_rutos_manual_administration_access_control_general_cli.png|border|class=tlt-border]]}}


Line 374: Line 376:
     <tr>
     <tr>
         <td>Enable CLI</td>
         <td>Enable CLI</td>
         <td>off | on; default: <b>on</b></td>
         <td>off {{!}} on; default: <b>on</b></td>
         <td>Turns CLI access from the local network (LAN) on or off.</td>
         <td>Turns CLI access from the local network (LAN) on or off.</td>
     </tr>{{#ifeq:{{{series}}}|TAP100||
     </tr>{{#switch:{{{series}}}|TAP100|TAP200=|#default=
     <tr>
     <tr>
         <td>Enable remote CLI</td>
         <td>Enable remote CLI</td>
         <td>off | on; default: <b>off</b></td>
         <td>off {{!}} on; default: <b>off</b></td>
         <td>Turns CLI access from remote networks (WAN) on or off.</td>
         <td>Turns CLI access from remote networks (WAN) on or off.</td>
     </tr>}}
     </tr>}}
Line 393: Line 395:
     </tr>
     </tr>
</table>
</table>
<br>{{#ifeq:{{{series}}}|TAP100||
<br>{{#switch:{{{series}}}|TAP100|TAP200=|#default=
<b>Telnet</b>
<b>Telnet</b>
----
----
Line 423: Line 425:
===PAM===
===PAM===
----
----
<b>Note:</b> PAM is additional software that can be installed from the <b>Services → [[{{{name}}} Package Manager|Package Manager]]</b> page.
<b>Note:</b> PAM is additional software that can be installed from the <b>System → [[{{{name}}} Package Manager|Package Manager]]</b> page.


[[File:Networking_rutos_manual_administration_access_control_pam_v1.png|border|class=tlt-border]]
[[File:Networking_rutos_manual_administration_access_control_pam_v2.png|border|class=tlt-border]]


====Modify PAM Auth====
====Modify PAM Auth====
Line 463: Line 465:
     </tr>
     </tr>
     <tr>
     <tr>
         <td><span style="color:red">Radius</span>: Port</td>
         <td><span style="color:blue">TACACS+</span>/<span style="color:red">Radius</span>: Port</td>
         <td>integer [0..65535]; default: <b>1812</b></td>
         <td>integer [0..65535]; default: <b><span style="color:blue">49</span>/<span style="color:red">1812</span></b></td>
         <td>RADIUS server authentication port</td>
         <td>RADIUS server authentication port</td>
     </tr>
     </tr>
Line 480: Line 482:
<b>IP Block Settings</b>  
<b>IP Block Settings</b>  
----
----
[[File:Networking_rutos_manual_administration_access_control_security_v2.png|border|class=tlt-border]]
[[File:Networking_rutos_manual_administration_access_control_security_v4.png|border|class=tlt-border]]
<table class="nd-mantable">
<table class="nd-mantable">
     <tr>
     <tr>
Line 489: Line 491:
     <tr>
     <tr>
         <td>Enable</td>
         <td>Enable</td>
         <td>off | on; default: <b>on</b></td>
         <td>off {{!}} on; default: <b>on</b></td>
         <td>Enable or disable blocking IP's if they have reached the set amount of failed times.</td>
         <td>Enable or disable blocking IP's if they have reached the set amount of failed times.</td>
    </tr>
    <tr>
        <td>Type</td>
        <td>Timed blocking {{!}} Permanent blocking; default: <b>Timed blocking</b></td>
        <td>You can choose an option of a blocking type.</td>
     </tr>
     </tr>
     <tr>
     <tr>
Line 499: Line 506:
     <tr>
     <tr>
         <td>Clean after reboot</td>
         <td>Clean after reboot</td>
         <td>off | on; default: <b>off</b></td>
         <td>off {{!}} on; default: <b>off</b></td>
         <td>If enabled, blocked loging attempts list will be cleared on device reboot.</td>
         <td>If enabled, blocked loging attempts list will be cleared on device reboot.</td>
     </tr>
     </tr>
Line 506: Line 513:
<b>Login Attempts</b>
<b>Login Attempts</b>
----
----
[[File:Networking_rutos_manual_administration_access_control_security_login.png|border|class=tlt-border]]
[[File:Networking_rutos_manual_administration_access_control_security_login_v2.png|border|class=tlt-border]]
<table class="nd-mantable">
<table class="nd-mantable">
     <tr>
     <tr>
Line 514: Line 521:
     </tr>
     </tr>
     <tr>
     <tr>
         <td>Source address</td>
         <td>Source</td>
         <td>IP address</td>
         <td>IP address</td>
         <td>Shows the IP address from which the connection failed.</td>
         <td>Shows the IP address from which the connection failed.</td>
     </tr>
     </tr>
     <tr>
     <tr>
        <td>Device port</td>
         <td>Destination</td>
        <td>Port number</td>
        <td>Shows the port number from which the connection failed.</td>
    </tr>
    <tr>
         <td>Destination address</td>
         <td>IP address</td>
         <td>IP address</td>
         <td>Shows yours device IP adress</td>
         <td>Shows yours device IP adress</td>
     </tr>
     </tr>
     <tr>
     <tr>
         <td>Protocol</td>
         <td>Port (protocol)</td>
         <td>Connection protocol</td>
         <td>Port number</td>
         <td>Displays the connection protocol used for connection.</td>
         <td>Shows the port number from which the connection failed.</td>
     </tr>
     </tr>
     <tr>
     <tr>
         <td>Failed atempts</td>
         <td>Status</td>
         <td>Number</td>
         <td>Attempt count {{!}} Blocked</td>
         <td>Shows the number of failed attempts to connect to device.</td>
         <td>Shows the number of failed attempts to connect to device. Indicates whether the source address is blocked or not.</td>
     </tr>
     </tr>
     <tr>
     <tr>
        <td>Status</td>
        <td>- {{!}} Blocked</td>
        <td>Indicates whether the source address is blocked or not.</td>
    </tr>
        <tr>
         <td>Reset</td>
         <td>Reset</td>
         <td>Check box</td>
         <td>Check box</td>
         <td>Allows you to select multiple IP addresses.</td>
         <td>Allows you to select multiple IP addresses.</td>
     </tr>
     </tr>
         <tr>
    <tr>
         <td>Actions</td>
        <td>-(interactive button)</td>
        <td>Allows you to select multiple IP addresses.</td>
    </tr>
    <tr>
         <td>Unblock all</td>
         <td>Unblock all</td>
         <td>-(interactive button)</td>
         <td>-(interactive button)</td>
         <td>Unblocks all source adresses from the list.</td>
         <td>Deletes instance.</td>
     </tr>
     </tr>
        <tr>
    <tr>
         <td>Unblock selected</td>
         <td>Unblock selected</td>
         <td>-(interactive button)</td>
         <td>-(interactive button)</td>
Line 560: Line 562:
</table>
</table>


{{#ifeq:{{{series}}}|TAP100|===Device Pairing===
{{#switch:{{{series}}}|TAP100|TAP200= ===Device Pairing===
----
----
[[File:Networking_rutos_manual_administration_access_control_pairing_v2.png|border|class=tlt-border]]
[[File:Networking_rutos_manual_administration_access_control_pairing_v2.png|border|class=tlt-border]]
Line 574: Line 576:
         <td>Enable or disable device pairing.</td>
         <td>Enable or disable device pairing.</td>
     </tr>
     </tr>
</table>|}}
</table>|#default=}}


{{#ifeq:{{{series}}}|TAP100||
{{#switch:{{{series}}}|TAP100|TAP200=|#default=
==Recipients==
==Recipients==


Line 591: Line 593:
     <li>Enter a custom name for the phone group into the 'Name' field.</li>
     <li>Enter a custom name for the phone group into the 'Name' field.</li>
     <li>Click the 'Add' button.</li>
     <li>Click the 'Add' button.</li>
    <li>Click the 'Edit' button next to the newly added phone group.</li>
</ol>
</ol>


[[File:Networking_rutos_manual_administration_recipients_phone_groups_add_button_edit_button.png|border|class=tlt-border]]
[[File:Networking_rutos_manual_administration_recipients_phone_groups_add_button.png|border|class=tlt-border]]


After clicking 'Edit' you should be redirected to that phone group's configuration page where you can start adding phone numbers to it.
After clicking 'Edit' you should be redirected to that phone group's configuration page where you can start adding phone numbers to it.
Line 618: Line 619:
</table>
</table>


===Email Accounts===
===Email Users===
----
----
When email related services{{#ifeq:{{{events_reporting}}}|0|&nbsp;|&nbsp;(such as [[{{{name}}} Events Reporting|Events Reporting]])&nbsp;}}are used, the device logs in to the specified email account and reads the inbox (e.g., Email to SMS) or sends out a message (e.g., SMS to Email) depending on the configured service. In this context, an <b>Email Account</b> is an configuration instance that contains the necessary data required in order to log into an email account.
When email related services{{#ifeq:{{{events_reporting}}}|0|&nbsp;|&nbsp;(such as [[{{{name}}} Events Reporting|Events Reporting]])&nbsp;}}are used, the device logs in to the specified email account and reads the inbox (e.g., Email to SMS) or sends out a message (e.g., SMS to Email) depending on the configured service. In this context, an <b>Email Account</b> is an configuration instance that contains the necessary data required in order to log into an email account.
Line 627: Line 628:
     <li>Enter a custom name for the email account into the 'Name' field.</li>
     <li>Enter a custom name for the email account into the 'Name' field.</li>
     <li>Click the 'Add' button.</li>
     <li>Click the 'Add' button.</li>
    <li>Click the 'Edit' button next to the newly added email account.</li>
</ol>
</ol>


[[File:Networking_rutos_manual_administration_recipients_email_accounts_groups_add_button_edit_button.png|border|class=tlt-border]]
[[File:Networking_rutos_manual_administration_recipients_email_accounts_groups_add_button_v1.png|border|class=tlt-border]]


After clicking 'Edit' you should be redirected to that email account's settings page where you can start configuring the account.
After clicking 'Add' you should be redirected to that email account's settings page where you can start configuring the account.


[[File:Networking_rutos_manual_administration_recipients_email_accounts_modify_email_account_v2.png|border|class=tlt-border]]
[[File:Networking_rutos_manual_administration_recipients_email_accounts_modify_email_account_v3.png|border|class=tlt-border]]


<table class="nd-mantable">
<table class="nd-mantable">
Line 644: Line 644:
     <tr>
     <tr>
       <td>Secure connection</td>
       <td>Secure connection</td>
       <td>off <nowiki>|</nowiki> on; default: <b>off</b></td>
       <td>off {{!}} on; default: <b>off</b></td>
       <td>Use if your SMTP server supports TLS or SSL encryption.</td>
       <td>Use if your SMTP server supports TLS or SSL encryption.</td>
     </tr>
     </tr>
Line 659: Line 659:
     <tr>
     <tr>
       <td>Credentials</td>
       <td>Credentials</td>
       <td>off {{!}} on; default: <b>off</b></td>
       <td>off {{!}} <span style="color: blue;">on</span>; default: <b>off</b></td>
       <td>This options allows you to set username and password of email account.</td>
       <td>This options allows you to set username and password of email account.</td>
     </tr>
     </tr>
     <tr>
     <tr>
       <td>Username</td>
       <td><span style="color: blue;">Username</span></td>
       <td>string; default: <b>none</b></td>
       <td>string; default: <b>none</b></td>
       <td>Username used to authenticate to the email service.</td>
       <td>Username for authentication on SMTP (Simple Mail Transfer Protocol) server. All characters are allowed except `' and space.</td>
     </tr>
     </tr>
     <tr>
     <tr>
       <td>Password</td>
       <td><span style="color: blue;">Password</span></td>
       <td>string; default: <b>none</b></td>
       <td>string; default: <b>none</b></td>
       <td>Password used to authenticate to the email service..</td>
       <td>Password for authentication on SMTP (Simple Mail Transfer Protocol) server. All characters are allowed except `' and space.</td>
     </tr>
     </tr>
     <tr>
     <tr>
       <td>Sender's email address</td>
       <td>Sender's email address</td>
       <td>string; default: <b>none</b></td>
       <td>string; default: <b>none</b></td>
       <td>Configured SMTP server user's email address.</td>
       <td>An address that will be used to send your email from. Allowed characters (a-zA-Z0-9._%+-@).</td>
    </tr>
    <tr>
      <td>Do not verify authenticity</td>
      <td><span style="color: red;">off</span> {{!}} on; default: <b>off</b></td>
      <td>When enabled peer's certificate authenticity will not be verified.</td>
    </tr>
    <tr>
      <td><span style="color: red;">Server's CA file</span></td>
      <td> - (interactive button)</td>
      <td>Upload server's CA file.</td>
     </tr>
     </tr>
     <tr>
     <tr>
Line 684: Line 694:
</table>}}}}
</table>}}}}


{{#ifeq:{{{series}}}|TAP100||
{{#switch:{{{series}}}|TAP100|TAP200=|#default=
==Certificates==
==Certificates==


Line 712: Line 722:
====Generation Parameters====
====Generation Parameters====
----
----
Generating each type of file (excluding 'Simple') requires setting some parameters. This section provides an overview for parameters used in TLS certificate generation.
Generating each type of file requires setting some parameters. This section provides an overview for parameters used in Simple and TLS certificate generation.
----
<b>Simple file parameters</b>
 
[[File:Networking_rutos_manual_administartion_certificates_certificates_generation_simple_parameters.png|border|class=tlt-border]]
 
<table class="nd-mantable">
    <tr>
        <th>Field</th>
      <th>Value</th>
      <th>Description</th>
    </tr>
    <tr>
      <td>Hosts</td>
      <td>string; default: <b>none</b></td>
      <td>Appends hostnames to certificates.</td>
    </tr>
    <tr>
      <td>IP addresses</td>
      <td>IPv4 address; default: <b>none</b></td>
      <td>Appends IPv4 addresses to certificates.</td>
    </tr>
</table>
----
----
<b>Core parameters</b> or simply parameters that apply to each file type are the size and common name of the generated file(s).
<b>TLS parameters</b> or simply parameters that apply to each (CA, Server, Client, DH) file type are the size and common name of the generated file(s).


[[File:Networking_rutos_manual_administartion_certificates_certificates_generation_core_parameters_v1.png|border|class=tlt-border]]
[[File:Networking_rutos_manual_administartion_certificates_certificates_generation_core_parameters_v1.png|border|class=tlt-border]]
Line 776: Line 808:
[[File:Networking_rutos_manual_administartion_certificates_certificates_generation_private_key_decryption_password_v1.png|border|class=tlt-border]]
[[File:Networking_rutos_manual_administartion_certificates_certificates_generation_private_key_decryption_password_v1.png|border|class=tlt-border]]


===Certificate Signing===
====Certificate Signing====
----
----
The <b>Certificate Signing</b> section is used to validate (sign) unsigned certificates.
The <b>Certificate Signing</b> section is used to validate (sign) unsigned certificates.


[[File:Networking_rutos_manual_administartion_certificates_certificates_generation_certificate_signing_v2.png|border|class=tlt-border]]
[[File:Networking_rutos_manual_administartion_certificates_certificates_generation_certificate_signing_v3.png|border|class=tlt-border]]


<table class="nd-mantable">
<table class="nd-mantable">
Line 822: Line 854:
       <td>off {{!}} on; default: <b>off</b></td>
       <td>off {{!}} on; default: <b>off</b></td>
       <td>Generation creates additional 'signing request' files (which appear under the [[#Certificate_Manager|Certificate Manager]] tab) that are later used to sign the generated certificates. When this option is set to 'on', the device deletes the signing request files after the signing process is complete.</td>
       <td>Generation creates additional 'signing request' files (which appear under the [[#Certificate_Manager|Certificate Manager]] tab) that are later used to sign the generated certificates. When this option is set to 'on', the device deletes the signing request files after the signing process is complete.</td>
    </tr>
    <tr>
      <td>Hosts</td>
      <td>string; default: <b>none</b></td>
      <td>Appends hostnames to certificates.</td>
    </tr>
    <tr>
      <td>IP addresses</td>
      <td>IPv4 address; default: <b>none</b></td>
      <td>Appends IPv4 addresses to certificates.</td>
     </tr>
     </tr>
     <tr>
     <tr>
Line 838: Line 880:
The <b>Certificate Import</b> section provides the possibility to import certificates and files generated on another machine. To upload such a file simply click 'Browse' and locate the file on your computer, it should then start uploading automatically.
The <b>Certificate Import</b> section provides the possibility to import certificates and files generated on another machine. To upload such a file simply click 'Browse' and locate the file on your computer, it should then start uploading automatically.


[[File:Networking_rutos_manual_administartion_certificates_certificates_manager_certificate_import_v2.png|border|class=tlt-border]]
[[File:Networking_rutos_manual_administartion_certificates_certificates_manager_certificate_import_v3.png|border|class=tlt-border]]


====Certificates, Keys & Requests====
====Certificates, Keys & Requests====
----
----
The <b>Certificates</b>, <b>Keys</b> and </b>Requests</b> section display files generated on or imported to the device along with the most important information related to them.  
The <b>Certificates</b>, <b>Keys</b> and <b>Requests</b> section display files generated on or imported to the device along with the most important information related to them.  


By default, the lists are empty. A set certificates generated using 'Simple' file type would look something like this:
By default, the lists are empty. A set certificates generated using 'Simple' file type would look something like this:


[[File:Networking_rutos_manual_administartion_certificates_certificates_manager_certificate_list_v1.png|border|class=tlt-border]]
[[File:Networking_rutos_manual_administartion_certificates_certificates_manager_certificate_list_v2.png|border|class=tlt-border]]


The 'Export' buttons are used to download the files from the device onto your local machine. The 'X' buttons located to the right of each entry are used to delete related files.
The 'Export' buttons are used to download the files from the device onto your local machine. The 'X' buttons located to the right of each entry are used to delete related files.
Line 855: Line 897:


[[File:Networking_rutos_manual_administration_access_control_root_ca_v1.png|border|class=tlt-border]]}}
[[File:Networking_rutos_manual_administration_access_control_root_ca_v1.png|border|class=tlt-border]]}}
==Troubleshoot==
===Logging Settings===
----
The <b>Logging Settings</b> section is used to configure how and where the device stores system log data. The system log is a file that contains information on various system related events and is useful to engineers for troubleshooting the device.
[[File:Networking_rutos_manual_administration_troubleshoot_logging_settings_v2.png|border|class=tlt-border]]
<table class="nd-mantable">
    <tr>
        <th>Field</th>
      <th>Value</th>
      <th>Description</th>
    </tr>
    <tr>
      <td>System log buffer size</td>
      <td>integer; default: <b>128</b></td>
      <td>System log buffer size in kibibytes (KiB).</td>
    </tr>
    <tr>
      <td>External system log server</td>
      <td>ip; default: <b>none</b></td>
      <td>IP address of an external server that will be used to store device logs.</td>
    </tr>
    <tr>
      <td>External system log server port</td>
      <td>integer [0..65535]; default: <b>none</b></td>
      <td>TCP/UDP port number of the external log server.</td>
    </tr>
    <tr>
      <td>External system log server protocol</td>
      <td>UDP | TCP; default: <b>UDP</b></td>
      <td>Communication protocol used by the external log server.</td>
    </tr>
    <tr>
      <td>Save log in</td>
      <td>RAM memory | <span style="color:blue">Flash memory</span>; default: <b>RAM memory</b></td>
      <td>Specifies which type of memory to use for storing system logs.</td>
    </tr>
    <tr>
      <td><span style="color:blue">System log file size</span></td>
      <td>integer [10..500]; default: <b>200</b></td>
      <td>Maximum size (in kilobytes) of a log file. When threshold is reached, log rotation is performed. Can be set to value from 10kB to 500kB. Smaller the file, larger amount of old logs is saved.</td>
    </tr>
    <tr>
      <td><span style="color:blue">Compress</span></td>
      <td>off | on; default: <b>off</b></td>
      <td>Compress old rotated logs using GZ format.</td>
    </tr>
    <tr>
      <td>Delete</td>
      <td>- (interactive button)</td>
      <td>Deletes log file from router.</td>
    </tr>
    <tr>
      <td>Show hostname</td>
      <td>off | on; default: <b>off</b></td>
      <td>Show hostname instead of IP address in syslog.</td>
    </tr>
</table>
===Troubleshoot===
----
The <b>Troubleshoot</b> section is used to download various files that contain information used for troubleshooting the device. Refer to the figure and table below for information on the Troubleshoot page.
{{#switch:{{{series}}}
|TAP100 = [[File:Networking_rutos_manual_administration_troubleshoot_troubleshoot_tap100.png|border|class=tlt-border]]
|#default = [[File:Networking_rutos_manual_administration_troubleshoot_troubleshoot.png|border|class=tlt-border]]}}
<table class="nd-mantable">
    <tr>
        <th>Field</th>
      <th>Value</th>
      <th>Description</th>
    </tr>
    <tr>
        <td>System log</td>
        <td>- (interactive button)</td>
        <td>Displays the contents of the device system log file. The system log contains records of various system related events, such as starts/stops of various services, errors, reboots, etc.</td>
    </tr>
    <tr>
        <td>Kernel log</td>
        <td>- (interactive button)</td>
        <td>Displays the contents of the device kernel log file. The kernel log contains records of various events related to the processes of the operating system (OS).</td>
    </tr>
    <tr>
        <td>Troubleshoot file</td>
        <td>- (interactive button)</td>
        <td>Downloads the device Troubleshoot file. It contains the device configuration information, logs and some other files. When requesting support, it is recommended to always provide the device Troubleshoot file to Teltonika engineers for analysis.</td>
    </tr>{{#ifeq:{{{series}}}|TAP100||
    <tr>
        <td>TCP dump file{{#ifeq:{{{series}}}|RUTX||<span class="asterisk">*</span>}}</td>
        <td>- (interactive button)</td>
        <td>Downloads the device TCP dump file. TCP dump is a program used to capture packets moving through network interfaces. By default, the device does not store TCP dump information. You must enable TCP dump and save the changes before you can download the file.</td>
    </tr>
    <tr>
        <td>Enable TCP dump{{#ifeq:{{{series}}}|RUTX||<span class="asterisk">*</span>}}</td>
        <td>off | on; default: <b>off</b></td>
        <td>Turns TCP dump packets capture on or off.</td>
    </tr>}}
</table>
{{#switch:{{{series}}}|TAP100|RUT2M|RUT9M|TCR1=
| #default={{#switch:{{{series}}}|RUTX|RUTM=|#default=<font size="-1"><span class="asterisk">*</span> As of {{{series}}}_R_00.07.00, TCPdump is not part of core functionality anymore. To see these options, the TCPdump package must be downloaded from [[{{{name}}}_Package_Manager|Package Manager]].</font>}}
}}
{{#ifeq:{{{series}}}|TAP100||====TCP dump====
----
<b>TCP dump</b> is {{#switch:{{{series}}}|RUTX|RUTM=|#default=an <i>optional</i> downloadable functionality<span class="asterisk">*</span>}} used to capture packets moving through network interfaces. By default, the device does not store TCP dump information. You must enable TCP dump and save the changes before you can download the file.
If you enable TCP dump, you will notice additional configuration fields appear. Refer to the figure and table below for realted information.
{{#switch:{{{series}}}|RUTX|RUTM=|#default=<font size="-1"><span class="asterisk">*</span> You can download the TCPdump package from [[{{{name}}}_Package_Manager|Package Manager]].</font>}}
[[File:Networking_rutos_manual_administration_troubleshoot_tcp_dump.png|border|class=tlt-border]]
<table class="nd-mantable">
    <tr>
        <th>Field</th>
      <th>Value</th>
      <th>Description</th>
    </tr>
    <tr>
        <td>Enable TCP dump</td>
        <td>off {{!}} on; default: <b>off</b></td>
        <td>Turns TCP dump packet capture on or off.</td>
    </tr>
    <tr>
        <td>Select interface</td>
        <td>network interface; default: '''br-lan'''</td>
        <td>Only captures packets that move through the specified network interface.</td>
    </tr>
    <tr>
        <td>Select protocol filter</td>
        <td>All {{!}} ICMP {{!}} TCP {{!}} UDP {{!}} ARP; default: <b>All</b></td>
        <td>Only captures packets that match the specified protocol.</td>
    </tr>
    <tr>
        <td>Select packets direction</td>
        <td>Incoming/Outgoing {{!}} Incoming {{!}} Outgoing; default: <b>Incoming/Outgoing</b></td>
        <td>Only captures packets coming from the specified direction.</td>
    </tr>
    <tr>
        <td>Host</td>
        <td>ip {{!}} host; default: <b>none</b></td>
        <td>Only captures packets related to the specified host.</td>
    </tr>
    <tr>
        <td>Port</td>
        <td>integer [0..65335]; default: <b>none</b></td>
        <td>Only captures packets related to the specified communication port.</td>
    </tr>
    <tr>
        <td>Select storage</td>
        <td>RAM memory; default: <b>RAM memory</b></td>
        <td>Specifies where the TCP dump file will be stored.</td>
    </tr>
</table>}}
===Diagnostics===
----
The <b>Diagnostics</b> section is used to execute simple network diagnostic tests, including <i>ping</i>, <i>traceroute</i> and <i>nslookup</i>.
[[File:Networking_rutos_manual_administration_troubleshoot_diagnostics.png|border|class=tlt-border]]
<table class="nd-mantable">
    <tr>
        <th>Field</th>
      <th>Value</th>
      <th>Description</th>
    </tr>
    <tr>
      <td>Method</td>
      <td>Ping | Traceroute | Nslookup; default: <b>Ping</b></td>
      <td>Selects diagnostic method.
            <ul>
                <li><b>Ping</b> - sends ICMP requests to the specified address.</li>
                <li><b>Traceroute</b> - displays the path that packets have to take in order to reach the specified address.</li>
                <li><b>Nslookup</b> - obtains domain name address and IP address mapping information.</li>
            </ul>
        </td>
    </tr>
    <tr>
      <td>Protocol</td>
      <td>IPv4 | IPv6; default: <b>IPv4</b></td>
      <td>Selects IP address family for diagnostic test.</td>
    </tr>
    <tr>
      <td>Address</td>
      <td>ip | host; default: <b>none</b></td>
      <td>IP address or hostname on which the diagnostic test will be performed.</td>
    </tr>
    <tr>
        <td>Perform</td>
      <td>-(interactive button)</td>
      <td>Performs diagnostic test when clicked.</td>
    </tr>
</table>
{{#ifeq: {{{mobile}}} | 1 |
===Modem Debug===
----
The <b>Modem Debug</b> section is used to send AT commands to the modem.
{{#ifeq: {{{name}}} | RUTX12 | [[File:Networking_rutos_manual_administration_troubleshoot_modemdebug_v1_RUTX12.png]] | [[File:Networking_rutos_manual_administration_troubleshoot_modemdebug_v1.png]]}}
<table class="nd-mantable">
    <tr>
        <th>Field</th>
      <th>Value</th>
      <th>Description</th>
    </tr>
    <tr>
    {{#ifeq: {{{name}}} | RUTX12 |
      <td>Modem</td>
      <td>Primary modem {{!}} Secondary modem; default: <b>Primary modem</b></td>
      <td>Selects which modem to send at commands to.</td>
    </tr>|}}
    <tr>
      <td>AT command</td>
      <td>AT command; default: <b>none</b></td>
      <td>AT command to send to the modem</td>
    </tr>
    <tr>
      <td>Response message</td>
      <td>- (read only text box)</td>
      <td>The response message of the sent at command.</td>
    </tr>
    <tr>
        <td>Send</td>
      <td>-(interactive button)</td>
      <td>Sends at command to modem.</td>
    </tr>
</table>
====AT Commands History====
This section shows the sent AT commands.
Networking_rutos_manual_administration_troubleshoot_athistory_v1.png
<table class="nd-othertables">
    <tr>
        <th width="250">field name</th>
        <th width="900">description</th>
    </tr>
    <tr>
        <td>Date</td>
        <td>Time when the AT command was sent </td>
    </tr>
    <tr>
        <td>Command</td>
        <td>The command that was sent </td>
    </tr>
    <tr>
        <td>Response</td>
        <td>The response received from the modem </td>
    </tr>
</table>|}}


==Profiles==
==Profiles==
Line 1,119: Line 902:
{{Template: Networking_rutos_manual_profiles | series = {{{series}}} | name = {{{name}}}}}
{{Template: Networking_rutos_manual_profiles | series = {{{series}}} | name = {{{name}}}}}


{{#ifeq: {{{serires}}} | TAP100 ||
{{#switch:{{{series}}}|TAP100|TAP200=|#default=
==Storage Memory Expansion==
==Storage Memory Expansion==


Line 1,175: Line 958:
     <li>If all is in order you should see a 'Formatting MSD...' message on the screen. This indicates that the MSD is being formatted and detached from the system. This procedure can take up to a couple of minutes and ends with a reboot of the device.<br>[[File:Networking_rutos_manual_storage_memory_expansion_disable_3.png]]</li>
     <li>If all is in order you should see a 'Formatting MSD...' message on the screen. This indicates that the MSD is being formatted and detached from the system. This procedure can take up to a couple of minutes and ends with a reboot of the device.<br>[[File:Networking_rutos_manual_storage_memory_expansion_disable_3.png]]</li>
     <li>Your device's flash memory will be restored to normal once the reboot has finished. In order to check, log in to the WebUI and look to the 'System' widget in the 'Overview' page. Hover your mouse cursor over the 'FLASH' memory indicator; you should see your device's flash memory return to its regular size.<br>[[File:Networking_rutos_manual_storage_memory_expansion_disable_4.png|border|class=tlt-border]]</li>
     <li>Your device's flash memory will be restored to normal once the reboot has finished. In order to check, log in to the WebUI and look to the 'System' widget in the 'Overview' page. Hover your mouse cursor over the 'FLASH' memory indicator; you should see your device's flash memory return to its regular size.<br>[[File:Networking_rutos_manual_storage_memory_expansion_disable_4.png|border|class=tlt-border]]</li>
</ol>
</ol>|}}
 
|}}


===SSHFS===
===SSHFS===