This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
admin-access [2024/11/28 22:59] – [SSL Certificate] -Condense hogwild | admin-access [2025/08/23 05:43] (current) – [Telnet Daemon] -Resize screenshot to 332 hogwild | ||
---|---|---|---|
Line 6: | Line 6: | ||
===== Web Admin ===== | ===== Web Admin ===== | ||
- | This section has settings to control who can access | + | Settings here control who can access |
+ | |||
+ | \\ | ||
+ | |||
+ | **Local Access:** here, choose the web protocols allowed for communication with the web interface via LAN. \\ Port and Wireless access options appear, depending on your selection. \\ | ||
+ | |||
+ | \\ | ||
* Disabled - disables all LAN access to FreshTomato' | * Disabled - disables all LAN access to FreshTomato' | ||
- | * HTTP - lets LAN Ethernet clients access the web interface via HTTP. | + | * HTTP - lets LAN Ethernet clients access the web interface via HTTP only. |
- | * HTTP Port - enter the port on which to allow HTTP administration | + | * HTTP Port - enter the port on which to allow HTTP \\ administration |
- | * Allow Wireless Access - lets LAN WiFi clients access the \\ web interface. (Default: enabled). | + | |
- | * HTTPS - allows | + | * HTTPS - lets Ethernet LAN clients access the web interface \\ via HTTPS only. |
- | * HTTPS port: the HTTPS port to use. (Appears only if \\ HTTPS is a chosen option). | + | * HTTPS port: the HTTPS port to use. |
- | * Allow Wireless Access - lets LAN WiFi clients access | + | |
- | * HTTP and HTTPS - allows | + | * HTTP and HTTPS - lets Ethernet LAN clients to access |
* HTTP Port - the port on which HTTP administration | * HTTP Port - the port on which HTTP administration | ||
* HTTPS port: the HTTPS port to use. (shows only if \\ HTTPS is a chosen option). | * HTTPS port: the HTTPS port to use. (shows only if \\ HTTPS is a chosen option). | ||
- | * Allow Wireless Access - lets LAN WiFi clients access | ||
- | | ||
- | \\ {{:: | ||
\\ | \\ | ||
+ | **Listen on LAN1 (br1):** sets whether admin services (web interface/ | ||
- | ==== SSL Certificate ==== | + | If you have multiple LANs, this lets clients on the LAN1/br1 network connect to/manage the router from their local network. |
- | + | ||
- | These options appear if you've chosen " | + | |
\\ | \\ | ||
- | **Common Name (CN): **the human-friendly name of the SSL web administration certificate | + | |
- | Technically, | + | \\ |
- | The certificate is valid only if the requested hostname matches the certificate common name. If you connect to an address that doesn' | + | **Unmount JFFS during upgrade: |
- | Officially, this field is optional. However, it is unwise to leave it empty. Starting with release 2024.4, this field uses " | + | This safeguard feature |
- | **Regenerate: | + | \\ |
- | It then restarts the httpd service to load the new certificate. | + | {{:: |
- | + | ||
- | \\ \\ **Save in NVRAM:** checking this saves the newly-generated certificate in NVRAM. | + | |
\\ | \\ | ||
- | **Remote | + | **Allow Remote |
\\ | \\ | ||
- | | + | **Remote Access:** lets you specify which, if any protocols are allowed remote |
- | * HTTP - allows web access to the WAN interface/Internet \\ only via HTTP protocol. | + | * Disabled |
- | * HTTPS - allows web access | + | * HTTP - remote |
+ | * Port - the HTTP port on which the router will listen \\ for web traffic on the WAN interface. | ||
- | \\ \\ | + | * HTTPS - remote access via HTTPS is permitted. |
+ | * Port - the HTTPS port on which the router will listen | ||
- | **Unmount JFFS during upgrade:** if enabled, unmounts any JFFS partitions during firmware upgrades. | + | \\ \\ |
- | This feature is supported starting with release 2021.2. | + | **SSL Certificate: |
- | \\ | + | These options appear only if " |
- | **Allow Remote Upgrade:** allows authenticated Internet/ | + | \\ {{:: |
\\ | \\ | ||
- | **Remote Access:** lets you specify which, if any protocols are allowed remote access | + | |
+ | * Regenerate - makes FreshTomato generate a new certificate. \\ It then restarts the httpd service to load the new certificate.\\ | ||
+ | * Save in NVRAM - this saves the new certificate in NVRAM. | ||
- | \\ | + | \\ \\ |
- | | + | **UI files path:** here, set the directory containing files that provide |
- | * HTTP - remote access via HTTP will be permitted. | + | |
- | * HTTPS - remote | + | |
\\ | \\ | ||
- | **Allow Wireless Access:** lets WiFi (and Ethernet) clients access the web interface. | + | {{::administration-admin_access-ui_files_path_to_theme_ui-2025.3.png?516}} |
- | + | ||
- | (Default: Disabled). | + | |
\\ | \\ | ||
- | **Directory with GUI files:** here, choose the directory containing files that provide | + | **Theme UI:** here, choose the color scheme of the web interface. |
\\ | \\ | ||
- | **Theme UI:** here, choose the color scheme (theme) of the web interface. (Default: Default). | + | **Open Menus:** menus checked |
+ | |||
+ | Unchecked menu names will display their submenus as nested. | ||
\\ | \\ | ||
- | **Open Menus:** menus checked here shows their submenus as open. | + | {{:: |
- | + | ||
- | Unchecked menu names will display their submenus as nested. | + | |
\\ | \\ | ||
- | ===== SSH Daemon | + | ===== SSH Server |
- | The Secure SHell tunneling protocol lets you make secure local and remote connections to FreshTomato. With the help of the Dropbear service, it also lets you make SSH connections //though | + | The Secure SHell tunneling protocol lets you make secure local and remote connections to FreshTomato. With the help of the Dropbear service, it also lets you make SSH connections //through |
\\ | \\ | ||
- | **Enable | + | **Enable |
+ | |||
+ | When started, the green Up indicator near the bottom of this section appears. | ||
+ | |||
+ | (Default: Enabled). | ||
\\ | \\ | ||
- | **Extended MOTD: | + | **Extended MOTD:** enables the Message of the Day function. |
- | + | ||
- | This displays a custom message when you first log in via Telnet. It can be important information, | + | |
- | \\ {{:: | + | This displays a custom message at log in via Telnet. It can be important information, |
\\ | \\ | ||
- | **Remote Access:** allows SSH connections from remote WAN/ | + | {{::administration-admin_access-ssh_server-2025.3.png?500}} |
\\ | \\ | ||
- | **Remote Forwarding: **enables | + | **Allow Password Login: **lets clients login via SSH with only the normal administrative username/password. |
- | Dropbear provides SSH services on the router, including | + | An authorized encryption key isn't needed. When disabled, SSH requires an authorized key to let clients logon. |
- | For example, say you want to access a PC on your LAN via Remote Desktop. However, you don't want the security risk of using standard port forwarding to open a port for RDP to the Internet. | + | \\ |
- | Instead, you (the SSH client) can make a connection into the router (the SSH Server.) You can configure Dropbear to forward/ | + | **LAN Port: **sets |
- | This way, when you are connected to the the router via SSH, you can run RDP on your machine, connect to 127.0.0.1: | + | Changing this from the default |
- | **Port: | + | (Default: 22). |
- | Changing this from the default is highly recommended. Port 22 is constantly scanned by Internet hackers. (Default: 22). | + | \\ |
- | \\ | + | **Port Forwarding: |
- | **Allow Password Login: | + | Dropbear provides |
- | No authorized encryption key is needed. When disabled, SSH requires an authorized key to allow clients | + | For example, you want to access a PC on your LAN via Remote Desktop. However, you don't want the security risk of using standard port forwarding |
- | \\ | + | Instead, you (the SSH client) can make a connection into the router (the SSH Server.) You can configure Dropbear to forward/ |
- | **Authorized Keys: | + | This way, when you are connected to the the router via SSH, you can run RDP on your machine, connect to 127.0.0.1: |
+ | |||
+ | **WAN Access:** Allows SSH Server access via the WAN interface. | ||
+ | |||
+ | | ||
\\ | \\ | ||
Line 153: | Line 157: | ||
**Stop Now/Start Now:** clicking this instantly stops/ | **Stop Now/Start Now:** clicking this instantly stops/ | ||
- | The button | + | The button |
===== Telnet Daemon ===== | ===== Telnet Daemon ===== | ||
- | (Terminal EmuLation over the NEtwork) | + | The (Terminal EmuLation over the NEtwork) protocol allows LAN and remote connections via a command-line interface. Unlike SSH, Telnet is not secure. |
- | + | ||
- | \\ | + | |
**Enable at Startup:** enables the Telnet Daemon, allowing Telnet connections to FreshTomato. | **Enable at Startup:** enables the Telnet Daemon, allowing Telnet connections to FreshTomato. | ||
+ | |||
+ | \\ {{:: | ||
\\ | \\ | ||
Line 172: | Line 176: | ||
**Stop Now / Start Now. **clicking Stop Now immediately stops the Telnet Daemon. | **Stop Now / Start Now. **clicking Stop Now immediately stops the Telnet Daemon. | ||
- | When Telnet has stopped, the button reads: "Start Now". Clicking "Start Now" immediately starts Telnet again. The Telnet daemon will restart at next reboot (if Enable at Startup is checked). | + | When Telnet has stopped, the button reads: "Start Now". Clicking "Start Now" immediately starts Telnet again. The Telnet daemon will restart at next reboot (if Enable at Startup is checked).\\ |
- | + | ||
- | \\ {{:: | + | |
===== Admin Restrictions ===== | ===== Admin Restrictions ===== | ||
- | **Allowed Remote IP Address:** the IP addresses/ DNS names of hosts to allow to connect to the FreshTomato | + | **Allowed Remote IP Address:** the IP addresses/ |
Addresses can be individual, comma-separated, | Addresses can be individual, comma-separated, | ||
Line 185: | Line 187: | ||
\\ | \\ | ||
- | **Limit Connection Attempts: ** specifies | + | {{:: |
+ | |||
+ | \\ | ||
+ | |||
+ | **Remote Web Port Protection: | ||
+ | |||
+ | This option is available only when Remote Access is set to HTTP/HTTPS. Some users report that enabling this feature slowed their remote web access connection. | ||
+ | |||
+ | \\ | ||
+ | |||
+ | **Limit Connection Attempts: **Specifies | ||
Checking SSH limits the number of SSH connection attempts to number n at frequency f (in seconds). Checking Telnet works similarly. | Checking SSH limits the number of SSH connection attempts to number n at frequency f (in seconds). Checking Telnet works similarly. | ||
- | \\ {{:: | + | (Default: 3 connection attempts every 60 seconds). |
Line 196: | Line 208: | ||
You are strongly urged to change these from the default settings to keep the router and network secure. | You are strongly urged to change these from the default settings to keep the router and network secure. | ||
- | \\ | + | |
- | **Username:** the FreshTomato logon Username to set. An empty field sets the username: " | + | |
\\ | \\ | ||
Line 207: | Line 219: | ||
**Re-enter to confirm:** enter the password again to confirm it's correct. It will change only when this text and text in the // | **Re-enter to confirm:** enter the password again to confirm it's correct. It will change only when this text and text in the // | ||
- | |||
- | \\ | ||
- | |||
- | {{:: | ||
\\ | \\ |