This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
admin-access [2024/11/10 03:26] – [Web Admin] -Condense, formatting hogwild | admin-access [2024/11/28 23:13] (current) – [Admin Restrictions] -Formatting hogwild | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Admin Access ====== | ====== Admin Access ====== | ||
- | Settings here specify who will be allowed to administer the router and access the network, how those users connect, and more. The Admin Access | + | Settings here specify who will be allowed to administer the router and access the network, how those users connect, and more. Sections in this menu include: Web Admin, SSH Daemon, Telnet Daemon, Admin Restrictions and Username/ |
===== Web Admin ===== | ===== Web Admin ===== | ||
- | This section | + | This section' |
* Disabled - disables all LAN access to FreshTomato' | * Disabled - disables all LAN access to FreshTomato' | ||
* HTTP - lets LAN Ethernet clients access the web interface via HTTP. | * HTTP - lets LAN Ethernet clients access the web interface via HTTP. | ||
- | * HTTP Port - enter the port on which to allow HTTP administration | + | * HTTP Port - enter the port on which to allow HTTP \\ administration |
- | * Allow Wireless Access - lets LAN WiFi clients access | + | * Allow Wireless Access - lets LAN WiFi clients access |
- | * HTTPS - allows | + | * HTTPS - lets Ethernet LAN clients access the web interface \\ via HTTPS (SSL-encrypted web). |
* HTTPS port: the HTTPS port to use. (Appears only if \\ HTTPS is a chosen option). | * HTTPS port: the HTTPS port to use. (Appears only if \\ HTTPS is a chosen option). | ||
* Allow Wireless Access - lets LAN WiFi clients access | * Allow Wireless Access - lets LAN WiFi clients access | ||
- | * HTTP and HTTPS - allows Ethernet LAN clients to access | + | * HTTP and HTTPS - allows Ethernet LAN clients to access |
* HTTP Port - the port on which HTTP administration | * HTTP Port - the port on which HTTP administration | ||
* HTTPS port: the HTTPS port to use. (shows only if \\ HTTPS is a chosen option). | * HTTPS port: the HTTPS port to use. (shows only if \\ HTTPS is a chosen option). | ||
* Allow Wireless Access - lets LAN WiFi clients access | * Allow Wireless Access - lets LAN WiFi clients access | ||
- | \\ | + | |
- | + | ||
- | [[https:// | + | |
\\ | \\ | ||
Line 38: | Line 36: | ||
**Common Name (CN): **the human-friendly name of the SSL web administration certificate to generate. | **Common Name (CN): **the human-friendly name of the SSL web administration certificate to generate. | ||
- | Technically | + | Technically, |
- | The certificate is valid only if the requested hostname matches the certificate common name. Your browser will display a warning message when connecting | + | The certificate is valid only if the requested hostname matches the certificate common name. If you connect |
- | Officially, this field is optional. However, it is unwise to leave it empty. Starting with release 2024.4, this field will use " | + | Officially, this field is optional. However, it is unwise to leave it empty. Starting with release 2024.4, this field uses " |
**Regenerate: | **Regenerate: | ||
Line 84: | Line 82: | ||
\\ | \\ | ||
- | **Allow Wireless Access: | + | **Allow Wireless Access: |
+ | |||
+ | (Default: Disabled). | ||
\\ | \\ | ||
- | **Directory with GUI files: | + | **Directory with GUI files:** here, choose |
\\ | \\ | ||
- | **Theme UI:** here, choose the color scheme (theme) of the web interface. (Default: Default). | + | **Theme UI:** here, choose the color scheme (theme) of the web interface. (Default: Default). |
\\ | \\ | ||
- | **Open Menus: | + | **Open Menus: |
- | Menu names unchecked | + | Unchecked menu names will display their submenus as nested. |
\\ | \\ | ||
Line 105: | Line 105: | ||
===== SSH Daemon ===== | ===== SSH Daemon ===== | ||
- | The Secure SHell tunneling protocol lets you make secure local and remote connections to FreshTomato. With the help of the Dropbear service, it also lets you make SSH connections //though | + | The Secure SHell tunneling protocol lets you make secure local and remote connections to FreshTomato. With the help of the Dropbear service, it also lets you make SSH connections //through |
\\ | \\ | ||
- | **Enable at Startup: | + | **Enable at Startup:** checking this starts the SSH when the router boots. |
+ | |||
+ | (Default: Enabled). | ||
\\ | \\ | ||
- | **Extended MOTD: | + | **Extended MOTD:** enables the Message of the Day function. |
+ | |||
+ | This displays a custom message as you first log in via Telnet. It can be important information, | ||
- | This displays a custom message when you first log in via Telnet. It can be important information, | + | \\ {{:: |
\\ | \\ | ||
- | [[https:// | + | **Remote Access:** allows SSH connections from remote WAN/Internet clients. |
- | \\ | + | (Default: Disabled). |
- | + | ||
- | **Remote Access: | + | |
\\ | \\ | ||
Line 129: | Line 131: | ||
**Remote Forwarding: | **Remote Forwarding: | ||
- | Dropbear provides SSH services on the router, including SSH port tunneling | + | Dropbear provides SSH services on the router, including SSH port tunneling/forwarding. Don't confuse this with standard (local) Port Forwarding. |
For example, say you want to access a PC on your LAN via Remote Desktop. However, you don't want the security risk of using standard port forwarding to open a port for RDP to the Internet. | For example, say you want to access a PC on your LAN via Remote Desktop. However, you don't want the security risk of using standard port forwarding to open a port for RDP to the Internet. | ||
Line 137: | Line 139: | ||
This way, when you are connected to the the router via SSH, you can run RDP on your machine, connect to 127.0.0.1: | This way, when you are connected to the the router via SSH, you can run RDP on your machine, connect to 127.0.0.1: | ||
- | **Port: | + | **Port: **sets the port on which SSH traffic flows. |
+ | |||
+ | Changing this from the default is highly recommended. Port 22 is constantly scanned by Internet hackers. | ||
- | Changing this from the default is highly recommended. Port 22 is constantly scanned by Internet hackers. | + | (Default: 22). |
\\ | \\ | ||
Line 145: | Line 149: | ||
**Allow Password Login: | **Allow Password Login: | ||
- | No authorized encryption key is needed. When disabled, SSH requires an authorized key to allow clients | + | An authorized encryption key isn' |
\\ | \\ | ||
- | **Authorized Keys: | + | **Authorized Keys:** one or more encryption keys that authorize an SSH client to access to the LAN. |
\\ | \\ | ||
- | **Stop Now/Start Now:** clicking this instantly stops/ | + | **Stop Now/Start Now:** clicking this instantly stops/ |
- | The button | + | The button |
===== Telnet Daemon ===== | ===== Telnet Daemon ===== | ||
- | (Terminal EmuLation over the NEtwork) | + | The (Terminal EmuLation over the NEtwork) protocol allows LAN and remote connections via a command-line interface. Unlike SSH, Telnet is not secure. |
\\ | \\ | ||
Line 176: | Line 180: | ||
When Telnet has stopped, the button reads: "Start Now". Clicking "Start Now" immediately starts Telnet again. The Telnet daemon will restart at next reboot (if Enable at Startup is checked). | When Telnet has stopped, the button reads: "Start Now". Clicking "Start Now" immediately starts Telnet again. The Telnet daemon will restart at next reboot (if Enable at Startup is checked). | ||
- | \\ | + | \\ {{:: |
- | + | ||
- | {{:8df69e6c26ffe04b52fd742f27ad1a3a.png}} | + | |
===== Admin Restrictions ===== | ===== Admin Restrictions ===== | ||
- | **Allowed Remote IP Address:** the IP addresses/ DNS names of hosts to allow to connect to the FreshTomato | + | **Allowed Remote IP Address:** the IP addresses/ |
Addresses can be individual, comma-separated, | Addresses can be individual, comma-separated, | ||
Line 189: | Line 191: | ||
\\ | \\ | ||
- | **Limit Connection Attempts: ** specifies whether the number of SSH or Telnet connection attempts will be limited to number (n) at certain frequency (f). (Default: 3 connection attempts every 60 seconds). | + | **Limit Connection Attempts: **specifies whether the number of SSH/Telnet connection attempts will be limited to a number (n) at certain frequency (f). |
- | Checking SSH limits the number of SSH connection attempts to number n at frequency f (in seconds). Checking Telnet works similarly. | + | (Default: 3 connection attempts every 60 seconds). |
- | + | ||
- | \\ | + | |
- | [[https:// | + | |
Line 216: | Line 216: | ||
\\ | \\ | ||
- | {{:39f890aeb648c15c4715402a590e36a0.png}} | + | {{:: |
\\ | \\ |