This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| admin_access [2023/06/23 18:46] – [Remote Access] -clarity hogwild | admin_access [2025/11/15 20:04] (current) – [Admin Restrictions] hogwild | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== Admin Access ====== | ====== Admin Access ====== | ||
| - | The Admin Access | + | This menu contains settings |
| ===== Web Admin ===== | ===== Web Admin ===== | ||
| - | The Web Admin section has settings to control | + | This section has settings to control: |
| - | **Local Access: | + | \\ |
| - | | + | - Who can access FreshTomato' |
| - | | + | - How they can control it, and; |
| - | * HTTP Port - Here, enter the port number on which you want HTTP administration traffic to flow. (Default: 80). | + | - From where they can control it. |
| - | * Allow Wireless Access - Checking this lets LAN WiFi clients access the web interface. (Default: enabled). | + | |
| - | | + | |
| - | * HTTPS port: Here, enter the HTTPS port number to use. (appears only if HTTPS is among the chosen options). | + | |
| - | * Allow Wireless Access - Checking this lets LAN WiFi clients access the web interface via HTTPS. (Default: enabled). | + | |
| - | * HTTP and HTTPS - Choosing this allows LAN Ethernet clients to access the web interface via both HTTP and HTTPS protocols. | + | |
| - | * HTTP Port - Here, enter the port number on which you want HTTP administration traffic to flow. (Default: 80). | + | |
| - | * HTTPS port: Here, enter the HTTPS port number to use. (appears only if HTTPS is among the chosen options). | + | |
| - | * Allow Wireless Access - Checking this lets LAN WiFi clients access the web interface. (Default: enabled). | + | |
| - | \\ | + | |
| - | + | ||
| - | [[https:// | + | |
| \\ | \\ | ||
| + | **Local Access: | ||
| - | ==== SSL Certificate ==== | + | * Disabled - disables LAN access to FreshTomato' |
| + | * HTTP - allows Ethernet clients to access the web interface via HTTP. | ||
| + | * HTTP Port - the port on which HTTP administration traffic will flow. \\ (Default: 80). | ||
| + | * Allow Wireless Access - lets LAN WiFi clients access the web interface. \\ (Default: enabled). \\ \\ | ||
| + | * HTTPS - allows LAN Ethernet clients to access the web interface via HTTPS. | ||
| + | * HTTPS port - the HTTPS port to use. \\ (appears only if HTTPS is in the chosen options). | ||
| + | * Allow Wireless Access - lets LAN WiFi clients access the web interface via HTTPS. \\ (Default: enabled). \\ \\ | ||
| + | * HTTP and HTTPS - lets LAN Ethernet clients to access the web interface via HTTP and HTTPS. | ||
| + | * HTTP Port - the port number on which HTTP administration traffic will flow. \\ (Default: 80). | ||
| + | * HTTPS port: the HTTPS port number to use. \\ (Appears only if HTTPS is in the chosen options). | ||
| + | * Allow Wireless Access - lets LAN WiFi clients access the web interface. \\ (Default: enabled). | ||
| - | **Common Name (CN): **Here, enter the human-friendly name of the SSL web administrative certificate you wish to generate. | + | \\ |
| - | **Regenerate: **TBD. | + | [[https://wiki.freshtomato.org/ |
| - | **Save in NVRAM: **TBD. | + | \\ |
| - | **Remote Access: | ||
| - | * Disabled - This prevents all access to FreshTomato' | + | ==== SSL Certificate ==== |
| - | * HTTP - This allows web access to FreshTomato' | + | |
| - | * HTTPS - This allows web access to FreshTomato' | + | |
| - | \\ **Unmount JFFS during upgrade:** Checking this unmounts any existing | + | **Common Name (CN): **the human-friendly name of the SSL web administrative certificate you wish to generate. \\ \\ **Regenerate: **generates a new certificate, |
| - | **Allow Remote Upgrade: | + | * Disabled - prevents all access to FreshTomato' |
| - | + | * HTTP - allows web access to FreshTomato' | |
| - | **Remote Access: | + | * HTTPS - allows web access to FreshTomato' |
| - | + | \\ | |
| - | * Disabled - No Remote access to the web interface will be permitted. | + | \\ **Unmount JFFS during upgrade:** unmounts any existing JFFS partition during firmware upgrades. \\ |
| - | * HTTP - Remote | + | \\ |
| - | * HTTPS - Remote | + | * Disabled - no Remote access to the web interface will be permitted. |
| + | * HTTP - remote | ||
| + | * HTTPS - remote | ||
| \\ | \\ | ||
| - | **Allow Wireless Access: | + | **Allow Wireless Access:** allows WiFi and Ethernet clients to access the web interface. (Default: Disabled). \\ |
| + | \\ | ||
| + | **Directory with GUI files:** here, select the directory of files that provide the web interface. \\ // | ||
| + | \\ | ||
| + | **Theme UI:** lets you select the color scheme (theme) used for the web interface pages. | ||
| - | **Directory with GUI files: | + | (Default: Default). |
| - | + | \\ | |
| - | **Theme UI:** This lets you choose the color scheme (theme) used for the web interface pages. | + | **Open Menus: |
| - | + | ||
| - | **Open Menus: | + | |
| ===== SSH Daemon ===== | ===== SSH Daemon ===== | ||
| - | **S**ecure **SH**ell | + | Secure SHell is a tunneling protocol that allows you to make secure local and remote connections to the FreshTomato router. With the help of the Dropbear service, it also allows you to make SSH connections //though //the router, to LAN clients. Setings |
| + | \\ | ||
| + | **Enable at Startup:** Checking this starts the SSH Daemon when the router boots. (Default: Enabled). \\ | ||
| + | \\ | ||
| + | \\ | ||
| + | **Extended MOTD:** Checking this enables the Message of the Day function. This displays a custom message when you first log in via Telnet. The message can be important information, | ||
| + | \\ | ||
| + | \\ | ||
| + | [[https:// | ||
| + | \\ | ||
| + | \\ | ||
| + | \\ | ||
| + | **Remote Access: | ||
| + | \\ | ||
| + | **Remote Forwarding: **enables the Dropbear service. This service/ | ||
| - | **Enable at Startup:** Checking this starts the SSH Daemon when the router boots. (Default: Enabled). | + | //For example//: |
| - | + | ||
| - | **Extended MOTD:** Checking this enables the Message of the Day function. This function displays a custom message when you first log in via Telnet. The message can be can be important information or updates about the system or just a personal greeting from the system administrator. | + | |
| - | + | ||
| - | \\ | + | |
| - | + | ||
| - | [[https://wiki.freshtomato.org/ | + | |
| - | + | ||
| - | + | ||
| - | ==== Remote Access ==== | + | |
| - | + | ||
| - | Checking this allows SSH connections from remote WAN/ | + | |
| - | + | ||
| - | **Remote Forwarding: **Checking this enables the Dropbear service. This service/ | + | |
| - | + | ||
| - | For example, say you want to be able to access a Windows PC on your LAN via Remote Desktop, but you don't want the security risk of opening up a port for RDP to the Internet via standard Port Forwarding. Instead, you can make an SSH connection into the router with an SSH port tunnel/forward configured (example: 127.0.0.1: | + | |
| - | + | ||
| - | **Port: **Here, you can enter the port number on which you want SSH traffic to flow. (Default: 22). Changing the port from the default is highly recommended, | + | |
| - | + | ||
| - | **Allow Password Login: **Checking this allows clients to login via SSH with only FreshTomato' | + | |
| - | + | ||
| - | **Authorized Keys:** Here you can enter one or more encryption keys which authorize an SSH client to access to the LAN. | + | |
| + | Say you want to access a Windows PC on your LAN via Remote Desktop, but you don't want the security risk of opening up a port for RDP to the Internet via Port Forwarding. Instead, you can make an SSH connection into the router with an SSH port tunnel/ | ||
| + | | ||
| + | **Port: **the port on which SSH traffic will flow. It's best to change this from the default, as port 22 is being constantly scanned by hackers. (Default: 22). \\ | ||
| + | | ||
| + | **Allow Password Login: **lets clients login via SSH with only the administrative username and password. No encryption key is needed. When disabled, SSH will require an authorized key to allow log on. \\ | ||
| + | | ||
| + | **Authorized Keys:** here, enter one or more encryption keys to authorize an SSH client to access to the LAN. \\ | ||
| + | | ||
| + | **Stop Now:** immediately stops the SSH daemon. SSH will start again at next boot. After clicking Stop Now, the button displays as "Start Now". Clicking this immediately starts the SSH daemon. \\ | ||
| + | | ||
| ===== Telnet Daemon ===== | ===== Telnet Daemon ===== | ||
| - | (Terminal EmuLation over the NEtwork) is a protocol | + | The Telnet |
| - | + | \\ | |
| - | **Enable at Startup: | + | **Enable at Startup: |
| - | + | \\ | |
| - | **Port: | + | **Port:** the port on which Telnet connections will be made to the router. |
| - | + | \\ | |
| - | **Stop Now / Start Now. **Clicking this button | + | **Stop Now / Start Now: |
| - | + | \\ | |
| - | {{: | + | When the Daemon has stopped, |
| + | \\ | ||
| + | | ||
| + | {{: | ||
| + | \\ | ||
| ===== Admin Restrictions ===== | ===== Admin Restrictions ===== | ||
| - | **Allowed Remote IP Address: | + | **Allowed Remote IP Address: |
| + | \\ | ||
| + | **Limit Connection Attempts: | ||
| + | \\ | ||
| + | Checking SSH limits the number of SSH connection attempts to number " | ||
| + | \\ | ||
| + | \\ | ||
| + | [[https:// | ||
| - | **Limit Connection Attempts: **Here, you can specify whether you want SSH or Telnet connection attempts to be limited to a certain number of attempts (n) at a certain frequency (f). (Default: 3 connection attempts allowed every 60 seconds). | ||
| - | |||
| - | Checking SSH limits the number of SSH connection attempts to number n at frequency f (in seconds). Checking Telnet limits the number of Telnet connection attempts to number n at frequency s (in seconds). | ||
| - | |||
| - | [[https:// | ||
| ===== Username/ | ===== Username/ | ||
| - | The Username/ | + | Here, you can set the main logon Username and Password. You are strongly urged to change these from the default to keep the network secure. |
| - | + | \\ | |
| - | **Username: | + | **Username: |
| - | + | \\ | |
| - | **Password: | + | **Password: |
| - | + | \\ | |
| - | **Re-enter to confirm: | + | **Re-enter to confirm: |
| + | | ||
| + | \\ | ||
| {{: | {{: | ||
| - | + | | |
| + | \\ | ||
| + | | ||