Site Tools


admin-access

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
admin-access [2022/02/03 16:39] – formatting hogwildadmin-access [2023/06/23 20:44] (current) – [SSL Certificate] -condense hogwild
Line 5: Line 5:
 ===== Web Admin ===== ===== Web Admin =====
  
-The Web Admin section has settings to control who can access FreshTomato's web interface, how, and from where. It also allows you to choose which menus stay nested or shown as well as settings for the web interface's color scheme.+The Web Admin section has settings to control who can access FreshTomato's web interface, how, and from where. It also allows you to choose which menus stay nested or shown. Finally, it also has settings for the web interface's color scheme. 
 + \\ 
  
-==== Local Access ====+**Local Access:  **This let you choose which web protocol(s) are allowed to communicate with the web interface via the LAN. \\ Port and Wireless access options will appear, depending on which selection you choose.
  
-This menu let you choose which web protocol(s) are allowed for communication to the web interface via the LAN. +  * Disabled Choosing this disables all LAN access to FreshTomato's web interface via web protocols. 
- +  * HTTP Choosing this allows LAN Ethernet clients to access the web interface via the HTTP protocol
-  * DisabledChoosing this disables all access to FreshTomato's web interface via web protocols. +    * HTTP Port - Here, enter the port number on which you want HTTP administration traffic to flow. (Default: 80). 
-  * HTTP Port: Choosing this allows LAN client access to FreshTomato via the HTTP web protocol. +    * Allow Wireless Access - Checking this lets LAN WiFi clients access the web interface. (Default: enabled)
-  * HTTPSChoosing this allows LAN client access to FreshTomato via the HTTPS \\ (SSL-encrypted web) protocol. +  * HTTPS Choosing this allows LAN Ethernet clients to access the web interface via the HTTPS (SSL-encrypted web) protocol
-  * HTTP and HTTPSChoosing this allows LAN client access via both HTTP and HTTPS protocols. +    * HTTPS port: Here, enter the HTTPS port number to use. (appears only if HTTPS is among the chosen options). 
- +    * Allow Wireless Access - Checking this lets LAN WiFi clients access the web interface via HTTPS. (Default: enabled)
-**HTTP Port:** In this field, enter the port number on which you want HTTP administration traffic to flow. (Default: 80).+  * HTTP and HTTPS Choosing this allows LAN Ethernet clients to access the web interface via both HTTP and HTTPS protocols. 
 +    * HTTP Port - Here, enter the port number on which you want HTTP administration traffic to flow. (Default: 80). 
 +    * HTTPS port: Here, enter the HTTPS port number to use. (appears only if HTTPS is among the chosen options). 
 +    * Allow Wireless Access - Checking this lets LAN WiFi clients access the web interface. (Default: enabled).
  
  \\  \\
Line 23: Line 27:
  
  \\  \\
- 
-**HTTPS port:** Here, enter the https port number you wish to use. (This option appears only if HTTPS is among the chosen options). 
  
 ==== SSL Certificate ==== ==== SSL Certificate ====
Line 34: Line 36:
 **Save in NVRAM: **TBD. **Save in NVRAM: **TBD.
  
-==== Remote Access ====+**Remote Access:**  This lets you choose whether and how a user can remotely access FreshTomato's web interface.
  
-This menu lets you choose whether and how a user can remotely access FreshTomato's web interface.+  * Disabled - This prevents all access to FreshTomato's web interface via the WAN port/Internet. \\ Only LAN clients will be able to access the web interface. For security reasons, this is \\ the default and recommended setting. 
 +  * HTTP - This allows web access to FreshTomato'WAN interface/Intenet via the \\ HTTP web protocol. 
 +  * HTTPS - This allows web access to FreshTomato's WAN interface/Internet via the \\ HTTPS (SSL-encrypted web) secure protocol.
  
-  * Disabled: This prevents all access to FreshTomato's web interface via the WAN port/Internet. \\ Only LAN clients will be able to access the web interface. For security reasons, this is \\ the default and recommended setting. + \\ **Unmount JFFS during upgrade:** Checking this unmounts any existing JFFS partition during firmware upgrades. :-(!
-  HTTPThis allows web access to FreshTomato's WAN interface/Intenet via the \\ HTTP web protocol. +
-  * HTTPSThis allows web access to FreshTomato's WAN interface/Internet via the \\ HTTPS (SSL-encrypted web) secure protocol.+
  
-**Allow Wireless Access:**  Checking this allows wireless clients, as well as Ethernet clients to access the web interface. (Default: Disabled).+**Allow Remote Upgrade:** Enabling this allows authenticated Internet/WAN clients to perform firmware upgrades via the web interface.
  
-**Directory with GUI files:**  Here, you select the directory which contains the files which provide the graphical web interface. \\ CAUTION: It's not recommended to change this setting unless you're experienced. An error could make you unable to access the web interface.+**Remote Access:** This menu lets you specify which, if any protocols will be allowed when remotely accessing the web interface.
  
-**Color Scheme:**  Here, you can choose the color scheme used for the web interface pages. (Default: Default).+  * Disabled - No Remote access to the web interface will be permitted. 
 +  * HTTP - Remote access via the HTTP protocol will be permitted. 
 +  * HTTPS - Remote access via the HTTPS protocol will be permitted. 
 + 
 + \\ 
 + 
 +**Allow Wireless Access:**  Checking this allows WiFi and Ethernet clients to access the web interface. (Default: Disabled). 
 + 
 +**Directory with GUI files:**  Here, select the directory which contains the files that provide the graphical web interface. \\ CAUTION: Do not change this setting unless you're experienced. An error could prevent you from accessing the web interface. 
 + 
 +**Theme UI:**  This lets you choose the color scheme (theme) used for the web interface pages. (Default: Default)
 + 
 +**Open Menus:**  Checking a menu name here will show all its submenus as open. Unchecked menus will display their submenus as nested.
  
-**Open Menus:**  Checking any menu name here will show all that menu's submenus as open. Any unchecked menu will display its submenus as nested. 
  
 ===== SSH Daemon ===== ===== SSH Daemon =====
  
-**S**ecure **SH**ell is a tunneling protocol which allows you to make secure local and remote connections to the FreshTomato router. With the help of the Dropbear service, it also allows you to make SSH connections //though //the router, to LAN client devices. Setings in this section let you enable or disable the SSH Daemon and the Dropbear daemon, and configure their operation.+Secure SHell is a tunneling protocol that allows you to make secure local and remote connections to the FreshTomato router. With the help of the Dropbear service, it also allows you to make SSH connections //though //the router, to LAN client devices. Setings in this section let you enable or disable the SSH Daemon and the Dropbear daemon, and configure their operation.
  
-**Enable at Startup:** Checking this starts the SSH Daemon when the router boots. (Default: Enabled).+**Enable at Startup:**  Checking this starts the SSH Daemon when the router boots. (Default: Enabled).
  
-**Extended MOTD:** Checking this enables the Message of the Day function. This function displays a custom message when you first log in via Telnet. The message can be can be important information or updates about the system or just a personal greeting from the system administrator.+**Extended MOTD:**  Checking this enables the Message of the Day function. This function displays a custom message when you first log in via Telnet. The message can be can be important information or updates about the system or just a personal greeting from the system administrator.
  
  \\  \\
Line 64: Line 77:
  \\  \\
  
-==== Remote Access ====+**Remote Access:**  Checking this allows SSH connections from remote WAN/Internet clients. (Default: Disabled).
  
-Checking this allows SSH connections from remote (WAN/Internet) clients. (Default: Disabled).+**Remote Forwarding:  **Checking this enables the Dropbear service. This service/daemon provides SSH services on the router and supports SSH port tunneling/forwardingDo not confuse this with standard (localPort Forwarding.
  
-**Remote Forwarding: **Checking this enables the Dropbear serviceThis server/daemon provides SSH services on the router and supports SSH port tunneling/forwardingDo not confuse this with standard (localPort Forwarding.+For example, let's say you want to be able to access a Windows PC on your LAN via Remote Desktop, but you don't want the security risk of opening up a port for RDP to the Internet via standard Port Forwarding. Instead, you can make an SSH connection into the router with an SSH port tunnel/forward configured (example: 127.0.0.1:1234 gets tunnelled/forwarded through SSH to 192.168.1.66:3389. This way, when you're connected via SSH to the router, you can open up RDP on the machine running the SSH client, and connect to 127.0.0.1:1234 and you're securely connected to 192.168.1.66 on your LAN. All traffic flows through SSH, and thus is encrypted. (RDP already uses encryption, but it's weaker than that provided by SSH).
  
-As an example, say you want to be able to access a Windows PC on your LAN via Remote Desktop, but you don't want the security risk of opening up a port for RDP to the Internet directly, via standard Port Forwarding. Insteadyou can make an SSH connection into the router with an SSH port tunnel/forward configured (example: 127.0.0.1:1234 gets tunnelled/forwarded through SSH to 192.168.1.66:3389. That way, when you're connected via SSH to the router, you can open up Remote Desktop on the machine running the SSH client, and connect to 127.0.0.1:1234 and you're securely connected to the machine 192.168.1.66 on your LAN. All the traffic flows across SSH, and thus is encrypted. (RDP does already use mild encryption, but it's not as secure as SSH).+**Port:  **Hereenter the port number on which SSH traffic will flowChanging the port from the default is highly recommended. Port 22 is constantly scanned by Internet hackers. (Default: 22).
  
-**Port: **Here, you can enter the port number on which you want SSH traffic to flow(Default: 22)Changing the port number from the default is highly recommendedas port 22 is being constantly scanned by Internet hackers.+**Allow Password Login **Checking this allows clients to login via SSH with only the normal administrative username and passwordNo authorized encryption key is neededWhen disabledSSH will require an authorized key to allow a client to log on.
  
-**Allow Password Login: **Checking this allows clients to login via SSH with only FreshTomato's normal username and passwordNo authorized encryption key is neededWhen disabledSSH will require an authorized key to allow a client to log on.+**Authorized Keys:**  Here enter one or more encryption keys which authorize an SSH client to access to the LAN. 
 + 
 +**Stop Now:** Clicking this button immediately stops the SSH daemonSSH will start again at the next bootupAfter clickingthe button will then display as "Start Now". Clicking it will immediately start the SSH daemon.
  
-**Authorized Keys:** Here you can enter one or more encryption keys which authorize an SSH client to access to the LAN. 
  
 ===== Telnet Daemon ===== ===== Telnet Daemon =====
  
-(Terminal EmuLation over the NEtwork) is a protocol which allows LAN and remote connections via a command-line interface. Telnet is not a secure protocol.+(Terminal EmuLation over the NEtwork) is a protocol which allows LAN and remote connections via a command-line interface. Unlike SSH, Telnet is not a secure protocol.
  
 **Enable at Startup:** Checking this enables the Telnet Daemon, allowing connections to FreshTomato via Telnet. **Enable at Startup:** Checking this enables the Telnet Daemon, allowing connections to FreshTomato via Telnet.
  
-**Port:** Here, you can enter the port number on which Telnet connections will be made to the router.+**Port:** Here, you can enter the port number on which Telnet connections will be made to the router. (Default: 23).
  
-**Stop Now / Start Now. **Clicking this button immediately stops the Telnet Daemon. Note that after the Telnet daemon is stopped via this method, it will be restarted during FreshTomato'next reboot (if Enable at Startup is checked). When the Telnet Daemon has stopped, the button will change to read "Start Now". Clicking Start Now immediately starts the Telnet Daemon. When Telnet is finished starting, the text on this button will change back to "Stop Now".+**Stop Now / Start Now. **Clicking this button immediately stops the Telnet Daemon. The Telnet daemon will restart at the next reboot (if Enable at Startup is checked). When the Telnet Daemon has stopped, this button will change to read "Start Now". Clicking Start Now immediately starts the Telnet Daemon. When Telnet is finished starting, the text on this button will change back to "Stop Now".
  
  \\  \\
Line 103: Line 117:
  
 [[https://wiki.freshtomato.org/lib/exe/detail.php?id=admin_access&media=a7c2f09179ae06e42debf184f16c60aa.png|{{:a7c2f09179ae06e42debf184f16c60aa.png}}]] [[https://wiki.freshtomato.org/lib/exe/detail.php?id=admin_access&media=a7c2f09179ae06e42debf184f16c60aa.png|{{:a7c2f09179ae06e42debf184f16c60aa.png}}]]
 +
  
 ===== Username/Password ===== ===== Username/Password =====
  
-The Username/Password section is used to set FreshTomato's main logon Username and Password. You are strongly urged to change these from the default settings to keep the router and network secure.+You are strongly urged to change these from the default settings to keep the router and network secure.
  
 **Username:** Here, enter the FreshTomato logon Username you wish to set. Leaving this field empty sets the username as "root". (Default: "root"). **Username:** Here, enter the FreshTomato logon Username you wish to set. Leaving this field empty sets the username as "root". (Default: "root").
Line 117: Line 132:
  
 {{:39f890aeb648c15c4715402a590e36a0.png}} {{:39f890aeb648c15c4715402a590e36a0.png}}
 +
 + \\
 +
 + \\
  
  
admin-access.1643906347.txt.gz · Last modified: 2022/02/03 16:39 by hogwild