Site Tools


admin-access

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
admin-access [2024/11/15 19:10] – [Web Admin] -Replace screenshot with "administration-admin_access-web_admin-2024.3.png" hogwildadmin-access [2024/11/28 23:13] (current) – [Admin Restrictions] -Formatting hogwild
Line 1: Line 1:
 ====== Admin Access ====== ====== Admin Access ======
  
-Settings here specify who will be allowed to administer the router and access the network, how those users connect, and more. The Admin Access menu is divided into sections. The sections include Web Admin, SSH Daemon, Telnet Daemon, Admin Restrictions and Username/Password.+Settings here specify who will be allowed to administer the router and access the network, how those users connect, and more. Sections in this menu includeWeb Admin, SSH Daemon, Telnet Daemon, Admin Restrictions and Username/Password.
  
  
 ===== Web Admin ===== ===== Web Admin =====
  
-This section has settings to control who can access FreshTomato's web interface, how, and from where. You can also which menus stay nested or shown. Finally, it also has settings for the interface's color scheme.  \\   \\ **Local Access:  **here, choose the web protocols allowed for communication with the web interface via LAN. \\ Port and Wireless access options appear, depending on the selection you choose. \\  \\+This section'settings control who can access FreshTomato's web interface, how, and from where. You can also choose which menus stay nested or shown. It also has settings for the interface's color scheme.  \\   \\ **Local Access:  **here, choose the web protocols allowed for communication with the web interface via LAN. \\ Port and Wireless access options appear, depending on your selection. \\  \\
  
   * Disabled - disables all LAN access to FreshTomato's web\\ interface via web protocols.   * Disabled - disables all LAN access to FreshTomato's web\\ interface via web protocols.
  
   * HTTP - lets LAN Ethernet clients access the web interface via HTTP.   * HTTP - lets LAN Ethernet clients access the web interface via HTTP.
-    * HTTP Port - enter the port on which to allow HTTP administration \\ traffic to flow. (Default: 80). +    * HTTP Port - enter the port on which to allow HTTP  \\ administration traffic to flow. (Default: 80). 
-    * Allow Wireless Access - lets LAN WiFi clients access the \\ web interface. (Default: enabled).+    * Allow Wireless Access - lets LAN WiFi clients access  \\ the web interface. (Default: enabled).
  
-  * HTTPS - allows Ethernet LAN clients to access the web interface \\ via HTTPS (SSL-encrypted web).+  * HTTPS - lets Ethernet LAN clients access the web interface \\ via HTTPS (SSL-encrypted web).
     * HTTPS port: the HTTPS port to use. (Appears only if  \\ HTTPS is a chosen option).     * HTTPS port: the HTTPS port to use. (Appears only if  \\ HTTPS is a chosen option).
     * Allow Wireless Access - lets LAN WiFi clients access  \\ THE web interface via HTTPS. (Default: enabled).     * Allow Wireless Access - lets LAN WiFi clients access  \\ THE web interface via HTTPS. (Default: enabled).
  
-  * HTTP and HTTPS - allows Ethernet LAN clients to access the \\ web interface via HTTP and HTTPS.+  * HTTP and HTTPS - allows Ethernet LAN clients to access  \\ the web interface via HTTP and HTTPS.
     * HTTP Port - the port on which HTTP administration  \\ traffic will flow. (Default: 80).     * HTTP Port - the port on which HTTP administration  \\ traffic will flow. (Default: 80).
     * HTTPS port: the HTTPS port to use. (shows only if  \\ HTTPS is a chosen option).     * HTTPS port: the HTTPS port to use. (shows only if  \\ HTTPS is a chosen option).
     * Allow Wireless Access - lets LAN WiFi clients access  \\ the web interface. (Default: enabled).     * Allow Wireless Access - lets LAN WiFi clients access  \\ the web interface. (Default: enabled).
  
- \\ {{::administration-admin_access-web_admin-2024.3.png?600}}+ \\   \\ {{::administration-admin_access-web_admin-2024.3.png?539}}
  
  \\  \\
Line 36: Line 36:
 **Common Name (CN): **the human-friendly name of the SSL web administration certificate to generate. **Common Name (CN): **the human-friendly name of the SSL web administration certificate to generate.
  
-Technically speaking, this represents the server name protected by the SSL certificate. In this case, FreshTomato is acting as the server.+Technically, this represents the server name protected by the SSL certificate. In this case, FreshTomato is acting as the server.
  
-The certificate is valid only if the requested hostname matches the certificate common name. Your browser will display a warning message when connecting to an address that doesn't match the common name in the certificate. Thus, if you were to connect to FreshTomato, and the address detected didn't match the one in the certificate, you would receive a warning.+The certificate is valid only if the requested hostname matches the certificate common name. If you connect to an address that doesn't match the certificate'common name, your browser will display a warning message. Thus, if you were to connect to FreshTomato, and the address detected didn't match the one in the certificate, you'receive a warning.
  
-Officially, this field is optional. However, it is unwise to leave it empty. Starting with release 2024.4, this field will use "FT" as the default. \\  \\+Officially, this field is optional. However, it is unwise to leave it empty. Starting with release 2024.4, this field uses "FT" as the default. \\  \\
  
 **Regenerate: **checking this makes FreshTomato generate a new certificate. **Regenerate: **checking this makes FreshTomato generate a new certificate.
Line 82: Line 82:
  \\  \\
  
-**Allow Wireless Access:**  allows WiFi and Ethernet clients to access the web interface. (Default: Disabled).+**Allow Wireless Access:**  lets WiFi (and Ethernetclients access the web interface. 
 + 
 +(Default: Disabled).
  
  \\  \\
  
-**Directory with GUI files:**  here, select the directory containing files that provide the web interface. \\ \\ CAUTION: Don't change this unless you're experienced. It could prevent you from accessing the web interface.+**Directory with GUI files:** here, choose the directory containing files that provide the web interface. \\ \\ CAUTION: Don't change this unless you're experienced. It could prevent access to the web interface.
  
  \\  \\
  
-**Theme UI:**  here, choose the color scheme (theme) of the web interface. (Default: Default).+**Theme UI:** here, choose the color scheme (theme) of the web interface. (Default: Default).
  
  \\  \\
  
-**Open Menus:**  Menus checked here shows their submenus as open.+**Open Menus:** menus checked here shows their submenus as open.
  
-Menu names unchecked will display their submenus as nested.+Unchecked menu names will display their submenus as nested.
  
  \\  \\
Line 103: Line 105:
 ===== SSH Daemon ===== ===== SSH Daemon =====
  
-The Secure SHell tunneling protocol lets you make secure local and remote connections to FreshTomato. With the help of the Dropbear service, it also lets you make SSH connections //though //the router to LAN client devices. Settings here let you enable/disable the SSH Daemon and the Dropbear daemon, and configure their operation.+The Secure SHell tunneling protocol lets you make secure local and remote connections to FreshTomato. With the help of the Dropbear service, it also lets you make SSH connections //through //the router to LAN clients. Settings here let you enable/disable the SSH Daemon and the Dropbear daemon, and configure their operation.
  
  \\  \\
  
-**Enable at Startup:**  checking this starts the SSH Daemon when the router boots. (Default: Enabled).+**Enable at Startup:** checking this starts the SSH when the router boots. 
 + 
 +(Default: Enabled).
  
  \\  \\
  
-**Extended MOTD:**  enables the Message of the Day function.+**Extended MOTD:** enables the Message of the Day function
 + 
 +This displays a custom message as you first log in via Telnet. It can be important information, updates about the system or just a personal greeting from the administrator.
  
-This displays a custom message when you first log in via TelnetIt can be important information, updates about the system or just a personal greeting from the administrator.+ \\ {{::administration-admin_access-ssh_daemon-2024.3.png?550}}
  
  \\  \\
  
-[[https://wiki.freshtomato.org/lib/exe/detail.php?id=admin_access&media=08f771d238b7c8643a5745335ef29a2e.png|{{:08f771d238b7c8643a5745335ef29a2e.png}}]]+**Remote Access:**  allows SSH connections from remote WAN/Internet clients.
  
- \\ +(Default: Disabled).
- +
-**Remote Access:**  allows SSH connections from remote WAN/Internet clients. (Default: Disabled).+
  
  \\  \\
Line 127: Line 131:
 **Remote Forwarding:  **enables the Dropbear service/daemon. **Remote Forwarding:  **enables the Dropbear service/daemon.
  
-Dropbear provides SSH services on the router, including SSH port tunneling and forwarding. Don't confuse this with standard (local) Port Forwarding.+Dropbear provides SSH services on the router, including SSH port tunneling/forwarding. Don't confuse this with standard (local) Port Forwarding.
  
 For example, say you want to access a PC on your LAN via Remote Desktop. However, you don't want the security risk of using standard port forwarding to open a port for RDP to the Internet. For example, say you want to access a PC on your LAN via Remote Desktop. However, you don't want the security risk of using standard port forwarding to open a port for RDP to the Internet.
Line 135: Line 139:
 This way, when you are connected to the the router via SSH, you can run RDP on your machine, connect to 127.0.0.1:1234 and you're securely connected to 192.168.1.66 on your LAN. All traffic flows through SSH, and thus is encrypted. (To be fair, RDP already uses encryption, but it's weaker than SSH encryption). In such cases, the SSH server is known as a "//jump host//", and the final destination PC is known as a "//target host//". \\  \\ This way, when you are connected to the the router via SSH, you can run RDP on your machine, connect to 127.0.0.1:1234 and you're securely connected to 192.168.1.66 on your LAN. All traffic flows through SSH, and thus is encrypted. (To be fair, RDP already uses encryption, but it's weaker than SSH encryption). In such cases, the SSH server is known as a "//jump host//", and the final destination PC is known as a "//target host//". \\  \\
  
-**Port:  **sets the port on which SSH traffic flows.+**Port: **sets the port on which SSH traffic flows
 + 
 +Changing this from the default is highly recommended. Port 22 is constantly scanned by Internet hackers.
  
-Changing this from the default is highly recommended. Port 22 is constantly scanned by Internet hackers. (Default: 22).+(Default: 22).
  
  \\  \\
Line 143: Line 149:
 **Allow Password Login:  **lets clients login via SSH with only the normal administrative username/password. **Allow Password Login:  **lets clients login via SSH with only the normal administrative username/password.
  
-No authorized encryption key is needed. When disabled, SSH requires an authorized key to allow clients to logon.+An authorized encryption key isn'needed. When disabled, SSH requires an authorized key to let clients logon.
  
  \\  \\
  
-**Authorized Keys:**  one or more encryption keys that authorize an SSH client to access to the LAN.+**Authorized Keys:** one or more encryption keys that authorize an SSH client to access to the LAN.
  
  \\  \\
  
-**Stop Now/Start Now:** clicking this instantly stops/starts the SSH daemon, whichever is the opposite of its current state.+**Stop Now/Start Now:** clicking this instantly stops/starts SSH, whichever is the opposite of its current state.
  
-The button will display its current state, and later the opposite option after you click on it.  SSH will start again at next bootup (if //Enable at Startup//is enabled.+The button displays its current state, and then the opposite state after you click on it. SSH will start again at next bootup (if //Enable at Startup// is enabled).
  
  
 ===== Telnet Daemon ===== ===== Telnet Daemon =====
  
-(Terminal EmuLation over the NEtwork) is a protocol which allows LAN and remote connections via a command-line interface. Unlike SSH, Telnet is not secure protocol.+The (Terminal EmuLation over the NEtwork) protocol allows LAN and remote connections via a command-line interface. Unlike SSH, Telnet is not secure.
  
  \\  \\
Line 174: Line 180:
 When Telnet has stopped, the button reads: "Start Now". Clicking "Start Now" immediately starts Telnet again. The Telnet daemon will restart at next reboot (if Enable at Startup is checked). When Telnet has stopped, the button reads: "Start Now". Clicking "Start Now" immediately starts Telnet again. The Telnet daemon will restart at next reboot (if Enable at Startup is checked).
  
- \\ + \\ {{::administration-admin_access-telnet_daemon-2024.3.png?335}}
- +
-{{:8df69e6c26ffe04b52fd742f27ad1a3a.png}}+
  
  
 ===== Admin Restrictions ===== ===== Admin Restrictions =====
  
-**Allowed Remote IP Address:** the IP addresses/ DNS names of hosts to allow to connect to the FreshTomato web interface.+**Allowed Remote IP Address:** the IP addresses/DNS names of hosts to allow to connect to the router'web interface.
  
 Addresses can be individual, comma-separated, or a dash-separated range, ("1.1.1.1-2.2.2.2"). The setting applies to local and remote administration via HTTP, HTTPS, SSH (if enabled) and Telnet (if enabled). Addresses can be individual, comma-separated, or a dash-separated range, ("1.1.1.1-2.2.2.2"). The setting applies to local and remote administration via HTTP, HTTPS, SSH (if enabled) and Telnet (if enabled).
Line 187: Line 191:
  \\  \\
  
-**Limit Connection Attempts: ** specifies whether the number of SSH or Telnet connection attempts will be limited to number (n) at certain frequency (f). (Default: 3 connection attempts every 60 seconds).+**Limit Connection Attempts: **specifies whether the number of SSH/Telnet connection attempts will be limited to number (n) at certain frequency (f).
  
-Checking SSH limits the number of SSH connection attempts to number n at frequency f (in seconds). Checking Telnet works similarly. +(Default: 3 connection attempts every 60 seconds). Checking SSH limits the number of SSH connection attempts to number n at frequency f (in seconds). Checking Telnet works similarly.
- +
- \\+
  
-[[https://wiki.freshtomato.org/lib/exe/detail.php?id=admin_access&media=a7c2f09179ae06e42debf184f16c60aa.png|{{:a7c2f09179ae06e42debf184f16c60aa.png}}]]+ \\ {{::administration-admin_access-admin_restrictions-2024.3.png?688}}
  
  
Line 214: Line 216:
  \\  \\
  
-{{:39f890aeb648c15c4715402a590e36a0.png}}+{{::administration-admin_access-username_password-2024.3.png?523}}
  
  \\  \\
admin-access.1731697832.txt.gz · Last modified: 2024/11/15 19:10 by hogwild