Site Tools


admin-access

This is an old revision of the document!


Admin Access

Settings here specify who will be allowed to administer the router and access the network, how those users connect, and more. Sections in this menu include: Web Admin, SSH Daemon, Telnet Daemon, Admin Restrictions and Username/Password.

Web Admin

Settings here control who can access the web interface, how, and from where. You can choose which menus stay nested or shown and settings for the interface's color scheme.


Local Access: here, choose the web protocols allowed for communication with the web interface via LAN.
Port and Wireless access options appear, depending on your selection.


  • Disabled - disables all LAN access to FreshTomato's web
    interface via web protocols.
  • HTTP - lets LAN Ethernet clients access the web interface via HTTP only.
    • HTTP Port - enter the port on which to allow HTTP
      administration traffic to flow. (Default: 80).
  • HTTPS - lets Ethernet LAN clients access the web interface
    via HTTPS only.
    • HTTPS port: the HTTPS port to use.
  • HTTP and HTTPS - lets Ethernet LAN clients to access
    the web interface via HTTP and HTTPS.
    • HTTP Port - the port on which HTTP administration
      traffic will flow. (Default: 80).
    • HTTPS port: the HTTPS port to use. (shows only if
      HTTPS is a chosen option).


Listen on LAN1 (br1): sets whether admin services (web interface/SSH/Telnet) listen for connections on the “LAN1 (br1) interface.

If you have multiple LANs, this lets clients on the LAN1/br1 network connect to/manage the router from their local network.


  • Allow Wireless Access - lets LAN WiFi clients access
    the web interface.The WiFi clients will be able to access
    the web interface via whichever methods have been selected
    in Local Access. (Default: enabled).


Unmount JFFS during upgrade: if enabled, unmounts any JFFS partitions during firmware upgrades.

This safeguard feature is supported since r2021.2.



Allow Remote Upgrade: allows authenticated Internet/WAN clients to upgrade firmware via the web interface.


Remote Access: lets you specify which, if any protocols are allowed remote access to the web interface.

  • Disabled - no remote access to the web interface is permitted.
  • HTTP - remote access via HTTP is permitted.
    • Port - the HTTP port on which the router will listen
      for web traffic on the WAN interface.
  • HTTPS - remote access via HTTPS is permitted.
    • Port - the HTTPS port on which the router will listen
      for web traffic on the WAN interface.



SSL Certificate:

These options appear only if “HTTPS” or “HTTP and HTTPS” is selected in Local Access.



  • Common Name (CN) - the plain English name of the SSL web administration certificate to generate.

    This is the server name protected by the SSL certificate.
    In this case, FreshTomato acts as the server. The certificate
    is valid only if the requested hostname matches the
    certificate common name. If you connect to an address
    that doesn't match the certificate's common name, your browser
    will display a warning message. If you were to connect to FreshTomato,
    and the address detected didn't match the one in the certificate,
    you'd receive a warning. Officially, this field is optional.
    However, it's unwise to leave it empty. Starting with r2024.4,
    this field uses “FT” as the default.

  • Regenerate - makes FreshTomato generate a new certificate.
    It then restarts the httpd service to load the new certificate.

  • Save in NVRAM - this saves the new certificate in NVRAM.



UI files path: here, set the directory containing files that provide the web interface.

CAUTION: Don't change this unless you're experienced. It could prevent access to the web interface.



Theme UI: here, choose the color scheme of the web interface. (Default: Default).


Open Menus: menus checked here show their submenus as open.

Unchecked menu names will display their submenus as nested.



SSH Server

The Secure SHell tunneling protocol lets you make secure local and remote connections to FreshTomato. With the help of the Dropbear service, it also lets you make SSH connections through the router to LAN clients. Settings here let you enable/disable the SSH Daemon and the Dropbear daemon, and configure their operation.


Enable on Startup: checking this starts the SSH Server when the router boots.

When started, the green Up indicator near the bottom of this section appears.

(Default: Enabled).


Extended MOTD: enables the Message of the Day function.

This displays a custom message at log in via Telnet. It can be important information, an update notice or a personal greeting from the administrator.



Allow Password Login: lets clients login via SSH with only the normal administrative username/password.

An authorized encryption key isn't needed. When disabled, SSH requires an authorized key to let clients logon.


LAN Port: sets the port on which SSH traffic flows.

Changing this from the default is highly recommended. Port 22 is constantly scanned by Internet hackers.

(Default: 22).


Port Forwarding: enables the Dropbear daemon.

Dropbear provides SSH services on the router, including SSH port tunneling/forwarding. Don't confuse this with standard (local) Port Forwarding.

For example, you want to access a PC on your LAN via Remote Desktop. However, you don't want the security risk of using standard port forwarding to open a port for RDP to the Internet.

Instead, you (the SSH client) can make a connection into the router (the SSH Server.) You can configure Dropbear to forward/tunnel SSH traffic through the router to another network host. In this case, say “127.0.0.1:1234” gets tunneled/forwarded through SSH to a PC with address: “192.168.1.66:3389”.

This way, when you are connected to the the router via SSH, you can run RDP on your machine, connect to 127.0.0.1:1234 and you're securely connected to 192.168.1.66 on your LAN. All traffic flows through SSH, and thus is encrypted. (To be fair, RDP already uses encryption, but it's weaker than SSH encryption). In such cases, the SSH server is known as a ”jump host“, and the final destination PC is known as a ”target host“.

WAN Access: Allows SSH Server access via the WAN interface.


Authorized Keys: here, enter one or more encryption keys that authorize an SSH client to access to the LAN.


Stop Now/Start Now: clicking this instantly stops/starts SSH, whichever is the opposite of its current state.

The button displays its current state, and then the opposite state after you click on it. SSH will start again at next bootup (if Enable at Startup is enabled).

Telnet Daemon

The (Terminal EmuLation over the NEtwork) protocol allows LAN and remote connections via a command-line interface. Unlike SSH, Telnet is not secure.

Enable at Startup: enables the Telnet Daemon, allowing Telnet connections to FreshTomato.




Port: the port number on which Telnet connections will be made to the router. (Default: 23).


Stop Now / Start Now. clicking Stop Now immediately stops the Telnet Daemon.

When Telnet has stopped, the button reads: “Start Now”. Clicking “Start Now” immediately starts Telnet again. The Telnet daemon will restart at next reboot (if Enable at Startup is checked).

Admin Restrictions

Allowed Remote IP Address: the IP addresses/DNS names of hosts to allow to connect to the router's web interface.

Addresses can be individual, comma-separated, or a dash-separated range, (“1.1.1.1-2.2.2.2”). The setting applies to local and remote administration via HTTP, HTTPS, SSH (if enabled) and Telnet (if enabled).



Remote Web Port Protection: sets a firewall rule to prevent brute force attacks on ports used for remote administration.

This option is available only when Remote Access is set to HTTP/HTTPS. Some users report that enabling this feature slowed their remote web access connection.


Limit Connection Attempts: Specifies whether SSH/Telnet connection attempts are limited to (n) attempts per frequency (f).

Checking SSH limits the number of SSH connection attempts to number n at frequency f (in seconds). Checking Telnet works similarly.

(Default: 3 connection attempts every 60 seconds).

Username/Password

You are strongly urged to change these from the default settings to keep the router and network secure.


Username: the FreshTomato logon Username to set. An empty field sets the username: “root”. (Default: “root”).



Password: the FreshTomato logon password you want to set. (Default: “admin”).


Re-enter to confirm: enter the password again to confirm it's correct. It will change only when this text and text in the Password field match.



admin-access.1755796463.txt.gz · Last modified: by hogwild