Jump to content

Template:Networking rutos manual administration: Difference between revisions

no edit summary
No edit summary
No edit summary
Line 3: Line 3:
| fw_version ={{Template: Networking_rutos_manual_latest_fw
| fw_version ={{Template: Networking_rutos_manual_latest_fw
  | series = {{{series}}}
  | series = {{{series}}}
| name  = {{{name}}}
  }}
  }}
}}
}}
Line 14: Line 15:


The <b>General</b> section is used to set up some of device managerial parameters, such as changing device name. For more information on the General section, refer to figure and table below.
The <b>General</b> section is used to set up some of device managerial parameters, such as changing device name. For more information on the General section, refer to figure and table below.
{{#switch:{{series}}}
 
| TCR1=[[File:Networking_rutos_manual_administration_general_tcr_v1.png|border|class=tlt-border]]
{{#ifeq:{{{series}}}|RUTX|[[File:Networking_{{lc:{{{name}}}}}_manual_administration_general_v2.png|border|class=tlt-border]]
| TRB1|TRB2=[[File:Networking_rutos_manual_administration_general_trb_v1.png|border|class=tlt-border]]
|[[File:Networking_{{lc:{{{name}}}}}_manual_administration_general.png|border|class=tlt-border]]}}
| #default=[[File:Networking_rutos_manual_administration_general_rut_v1.png|border|class=tlt-border]]
 
}}
<table class="nd-mantable">
<table class="nd-mantable">
     <tr>
     <tr>
Line 24: Line 24:
       <th>Value</th>
       <th>Value</th>
       <th>Description</th>
       <th>Description</th>
    </tr>
    <tr>
      <th>General Settings</th>
        <th></th>
        <th></th>   
    </tr>
    <tr>
      <td>Configuration Mode</td>
      <td>Basic {{!}} Advanced; default: <b>Basic</b></td>
      <td>Mode determines what options and configurations are shown. In Basic mode only the essential configurations are shown. In Advanced mode there is greater freedom to configure and access more options.</td>
    </tr>
    <tr>
      <th>Device name and hostname</th>
        <th></th>
        <th></th>   
     </tr>
     </tr>
     <tr>
     <tr>
Line 51: Line 36:
     </tr>
     </tr>
     <tr>
     <tr>
       <th>LED Indication</th>
       <td>Mode</td>
        <th></th>
      <td>Basic {{!}} Advanced; default: <b>Basic</b></td>
        <th></th>   
      <td>Mode determines what options and configurations are shown. In Basic mode only the essential configurations are shown. In Advanced mode there is greater freedom to configure and access more options.</td>
    </tr>
    <tr>
  <td>Enable</td>
        <td>off {{!}} on; default: <b>on</b></td>
        <td>Manages signal strength{{#ifeq:{{{series}}}|RUTX||, LAN}} and connection status indication LEDs.</td>
    </tr>
    <tr>
      <th>Reset Button Configuration</th>
        <th></th>
        <th></th>   
     </tr>
     </tr>
     <tr>
     <tr>
Line 86: Line 61:
<b>SSH</b>
<b>SSH</b>
----
----
[[File:Networking_rutos_manual_administration_access_control_general_ssh_v1.png|border|class=tlt-border]]
[[File:Networking_rutos_manual_administration_access_control_general_ssh.png|border|class=tlt-border]]


<table class="nd-mantable">
<table class="nd-mantable">
Line 108: Line 83:
         <td>integer [0..65535]; default: <b>22</b></td>
         <td>integer [0..65535]; default: <b>22</b></td>
         <td>Selects which port to use for SSH access.</td>
         <td>Selects which port to use for SSH access.</td>
    </tr>
    <tr>
        <td>Enable key-based authentication</td>
        <td>off | on; default: <b>off</b></td>
        <td>Use public keys for authentication.</td>
     </tr>
     </tr>
</table>
</table>
Line 118: Line 88:
<b>WebUI</b>
<b>WebUI</b>
----
----
[[File:Networking_rutos_manual_administration_access_control_general_webui_v1.png|border|class=tlt-border]]
[[File:Networking_rutos_manual_administration_access_control_general_webui.png|border|class=tlt-border]]


<table class="nd-mantable">
<table class="nd-mantable">
Line 155: Line 125:
         <td>integer [0..65535]; default: <b>443</b></td>
         <td>integer [0..65535]; default: <b>443</b></td>
         <td>Selects which port to use for HTTPS access.</td>
         <td>Selects which port to use for HTTPS access.</td>
    </tr>
    <tr>
        <td>Ignore private IPs on public interface</td>
        <td>off | on; default: <b>on</b></td>
        <td>Prevent access from private (RFC1918) IPs on an interface if it has an public IP address.</td>
    </tr>
    <tr>
        <td>Certificate files from device</td>
        <td>off | on; default: <b>on</b></td>
        <td>Choose this option if you want to select certificate files from device. Certificate files can be generated in [[{{{name}}} Administration#Certificates|Certificates]] section.</td>
    </tr>
    <tr>
        <td>Server certificate</td>
        <td>.crt; default: <b>uhttpd.crt</b></td>
        <td>Server certificate file.</td>
    </tr>
    <tr>
        <td>Server key</td>
        <td>.key; default: <b>uhttpd.key</b></td>
        <td>Server key file.</td>
     </tr>
     </tr>
</table>
</table>
Line 239: Line 189:
===Security===
===Security===
----
----
[[File:Networking_rutos_manual_administration_access_control_security_v1.png|border|class=tlt-border]]
[[File:Networking_rutos_manual_administration_access_control_security.png|border|class=tlt-border]]


<table class="nd-mantable">
<table class="nd-mantable">
Line 246: Line 196:
       <th>Value</th>
       <th>Value</th>
       <th>Description</th>
       <th>Description</th>
    </tr>
    <tr>
        <td>Enable</td>
        <td>off | on; default: <b>on</b></td>
        <td>Enable or disable blocking IP's if they have reached the set amount of failed times.</td>
     </tr>
     </tr>
     <tr>
     <tr>
Line 256: Line 201:
         <td>integer; default: <b>10</b></td>
         <td>integer; default: <b>10</b></td>
         <td>An amount of times IP address can try to access SSH or WebUI before being blocked.</td>
         <td>An amount of times IP address can try to access SSH or WebUI before being blocked.</td>
    </tr>
    <tr>
        <td>Blocked address</td>
        <td>ip</td>
        <td>IP address which was blocked due to reaching fail count limit.</td>
    </tr>
    <tr>
        <td>Failed attempts</td>
        <td>integer</td>
        <td>Amount of times IP address tried to access SSH or WebUI after getting blocked.</td>
     </tr>
     </tr>
</table>
</table>
===Root CA===
----
The <b>Root CA</b> section is used to add a root CA certificate file to the device. There is a default file already preloaded on the device which will be overwritten by any uploaded file. The certificates must be in .pem format, maximum file size is 300 KB. These certificates are only needed if you want to use HTTPS for your services and the default file should be sufficient in most cases.
[[File:Networking_rutos_manual_administration_access_control_root_ca.png|border|class=tlt-border]]


==Recipients==
==Recipients==
Line 318: Line 279:
After clicking 'Edit' you should be redirected to that email account's settings page where you can start configuring the account.
After clicking 'Edit' you should be redirected to that email account's settings page where you can start configuring the account.


[[File:Networking_rutos_manual_administration_recipients_email_accounts_modify_email_account_v1.png|border|class=tlt-border]]
[[File:Networking_rutos_manual_administration_recipients_email_accounts_modify_email_account.png|border|class=tlt-border]]


<table class="nd-mantable">
<table class="nd-mantable">
Line 342: Line 303:
     </tr>
     </tr>
     <tr>
     <tr>
       <td>Credentials</td>
       <td>User name</td>
      <td>off {{!}} on; default: <b>off</b></td>
      <td>This options allows you to set username and password of email account.</td>
    </tr>
    <tr>
      <td>Username</td>
       <td>string; default: <b>none</b></td>
       <td>string; default: <b>none</b></td>
       <td>Username used to authenticate to the email service.</td>
       <td>Username used to authenticate to the email service.</td>
Line 458: Line 414:
The <b>Certificate Signing</b> section is used to validate (sign) unsigned certificates.
The <b>Certificate Signing</b> section is used to validate (sign) unsigned certificates.


[[File:Networking_rutos_manual_administartion_certificates_certificates_generation_certificate_signing_v2.png|border|class=tlt-border]]
[[File:Networking_rutos_manual_administartion_certificates_certificates_generation_certificate_signing_v1.png|border|class=tlt-border]]


<table class="nd-mantable">
<table class="nd-mantable">
Line 468: Line 424:
     <tr>
     <tr>
       <td>Signed Certificate Name</td>
       <td>Signed Certificate Name</td>
       <td>string; default: <b>none</b></td>
       <td>string; default: <b>cert</b></td>
       <td>Name of the signed certificate.</td>
       <td>Name of the signed certificate.</td>
     </tr>
     </tr>
Line 483: Line 439:
     <tr>
     <tr>
       <td>Days Valid</td>
       <td>Days Valid</td>
       <td>integer; default: <b>none</b></td>
       <td>integer; default: <b>3650</b></td>
       <td>Length of the signature's validity.</td>
       <td>Length of the signature's validity.</td>
     </tr>
     </tr>
Line 516: Line 472:
The <b>Certificate Import</b> section provides the possibility to import certificates and files generated on another machine. To upload such a file simply click 'Browse' and locate the file on your computer, it should then start uploading automatically.
The <b>Certificate Import</b> section provides the possibility to import certificates and files generated on another machine. To upload such a file simply click 'Browse' and locate the file on your computer, it should then start uploading automatically.


[[File:Networking_rutos_manual_administartion_certificates_certificates_manager_certificate_import_v2.png|border|class=tlt-border]]
[[File:Networking_rutos_manual_administartion_certificates_certificates_manager_certificate_import_v1.png|border|class=tlt-border]]


====Certificates, Keys & Requests====
====Certificates, Keys & Requests====
Line 527: Line 483:


The 'Export' buttons are used to download the files from the device onto your local machine. The 'X' buttons located to the right of each entry are used to delete related files.
The 'Export' buttons are used to download the files from the device onto your local machine. The 'X' buttons located to the right of each entry are used to delete related files.
===Root CA===
----
The <b>Root CA</b> section is used to add a root CA certificate file to the device. There is a default file already preloaded on the device which will be overwritten by any uploaded file. The certificates must be in .pem format, maximum file size is 300 KB. These certificates are only needed if you want to use HTTPS for your services and the default file should be sufficient in most cases.
[[File:Networking_rutos_manual_administration_access_control_root_ca_v1.png|border|class=tlt-border]]


==Troubleshoot==
==Troubleshoot==
Line 541: Line 490:
The <b>Logging Settings</b> section is used to configure how and where the device stores system log data. The system log is a file that contains information on various system related events and is useful to engineers for troubleshooting the device.
The <b>Logging Settings</b> section is used to configure how and where the device stores system log data. The system log is a file that contains information on various system related events and is useful to engineers for troubleshooting the device.


[[File:Networking_rutos_manual_administration_troubleshoot_logging_settings_v1.png|border|class=tlt-border]]
[[File:Networking_rutos_manual_administration_troubleshoot_logging_settings.png|border|class=tlt-border]]


<table class="nd-mantable">
<table class="nd-mantable">