Site Tools


admin_access

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
admin_access [2023/06/23 21:25] – [Username/Password] -condense, formatting hogwildadmin_access [2023/06/23 21:33] (current) – [SSH Daemon] -condense, formatting hogwild
Line 8: Line 8:
 The Web Admin section has settings to control who can access FreshTomato's web interface, how, and from where. It also allows you to choose which menus stay nested or shown. Finally, it also has settings for the web interface's color scheme. The Web Admin section has settings to control who can access FreshTomato's web interface, how, and from where. It also allows you to choose which menus stay nested or shown. Finally, it also has settings for the web interface's color scheme.
  
-**Local Access:  **This let you choose which web protocol(s) are allowed to communicate with the web interface via the LAN. \\ Port and Wireless access options will appear, depending on which selection you choose.+**Local Access:  **This let you choose which web protocol(s) are allowed to communicate with the web interface via the LAN. \\ Port and Wireless access options will appear, depending on the selections you choose.
  
   * Disabled - Choosing this disables all LAN access to FreshTomato's web interface via web protocols.   * Disabled - Choosing this disables all LAN access to FreshTomato's web interface via web protocols.
Line 61: Line 61:
 **Theme UI:**  This lets you choose the color scheme (theme) used for the web interface pages. (Default: Default). **Theme UI:**  This lets you choose the color scheme (theme) used for the web interface pages. (Default: Default).
  
-**Open Menus:**  Checking a menu name here will show all its submenus as open. Any unchecked menu will display its submenus as nested.+**Open Menus:**  Checking a menu name here will show all its submenus as open. Unchecked menu will display their submenus as nested.
  
  
 ===== SSH Daemon ===== ===== SSH Daemon =====
  
-Secure SHell is a tunneling protocol that allows you to make secure local and remote connections to the FreshTomato router. With the help of the Dropbear service, it also allows you to make SSH connections //though //the router, to LAN client devices. Setings in this section let you enable or disable the SSH Daemon and the Dropbear daemon, and configure their operation.+Secure SHell is a tunneling protocol that allows you to make secure local and remote connections to the FreshTomato router. With the help of the Dropbear service, it also allows you to make SSH connections //though //the router, to LAN clients. Setings here enable or disable the SSH and the Dropbear daemon, and configure their operation.
  
 **Enable at Startup:** Checking this starts the SSH Daemon when the router boots. (Default: Enabled). **Enable at Startup:** Checking this starts the SSH Daemon when the router boots. (Default: Enabled).
  
-**Extended MOTD:** Checking this enables the Message of the Day function. This function displays a custom message when you first log in via Telnet. The message can be can be important information or updates about the system or just a personal greeting from the system administrator.+**Extended MOTD:** Checking this enables the Message of the Day function. This displays a custom message when you first log in via Telnet. The message can be important informationupdates about the system or just a personal greeting.
  
  \\  \\
Line 84: Line 84:
 For example, let's say you want to be able to access a Windows PC on your LAN via Remote Desktop, but you don't want the security risk of opening up a port for RDP to the Internet via standard Port Forwarding. Instead, you can make an SSH connection into the router with an SSH port tunnel/forward configured (example: 127.0.0.1:1234 gets tunnelled/forwarded through SSH to 192.168.1.66:3389. This way, when you're connected via SSH to the router, you can open up RDP on the machine running the SSH client, and connect to 127.0.0.1:1234 and you're securely connected to 192.168.1.66 on your LAN. All traffic flows through SSH, and thus is encrypted. (RDP already uses encryption, but it's weaker than that provided by SSH). For example, let's say you want to be able to access a Windows PC on your LAN via Remote Desktop, but you don't want the security risk of opening up a port for RDP to the Internet via standard Port Forwarding. Instead, you can make an SSH connection into the router with an SSH port tunnel/forward configured (example: 127.0.0.1:1234 gets tunnelled/forwarded through SSH to 192.168.1.66:3389. This way, when you're connected via SSH to the router, you can open up RDP on the machine running the SSH client, and connect to 127.0.0.1:1234 and you're securely connected to 192.168.1.66 on your LAN. All traffic flows through SSH, and thus is encrypted. (RDP already uses encryption, but it's weaker than that provided by SSH).
  
-**Port: **Here, you can enter the port number on which you want SSH traffic to flow. (Default: 22). Changing the port from the default is highly recommended, as port 22 is being constantly scanned by Internet hackers.+**Port: **Here, can enter the port number on which SSH traffic will flow. Changing from the default is recommended, as port 22 is being constantly scanned by hackers. (Default: 22).
  
-**Allow Password Login: **Checking this allows clients to login via SSH with only FreshTomato'normal username and password. No authorized encryption key is needed. When disabled, SSH will require an authorized key to allow a client to log on.+**Allow Password Login: **Checking this let clients login via SSH with only the normal administrative username and password. No authorized encryption key is needed. When disabled, SSH will require an authorized key to allow log on.
  
 **Authorized Keys:** Here you can enter one or more encryption keys which authorize an SSH client to access to the LAN. **Authorized Keys:** Here you can enter one or more encryption keys which authorize an SSH client to access to the LAN.
  
-**Stop Now:** Clicking this button immediately stops the SSH daemon. SSH will start again at the next bootup.+**Stop Now:** Clicking this button immediately stops the SSH daemon. SSH will start again at the next bootup. After clicking Stop Now, the button will display as "Start Now". Clicking this will immediately start the SSH daemon.
  
  
Line 97: Line 97:
 (Terminal EmuLation over the NEtwork) is a protocol which allows LAN and remote connections via a command-line interface. Unlike SSH, Telnet is not a secure protocol. (Terminal EmuLation over the NEtwork) is a protocol which allows LAN and remote connections via a command-line interface. Unlike SSH, Telnet is not a secure protocol.
  
-**Enable at Startup:** Checking this enables the Telnet Daemon, allowing connections to FreshTomato via Telnet.+**Enable at Startup:**  Checking this enables the Telnet Daemon, allowing connections to FreshTomato via Telnet.
  
-**Port:** Here, you can enter the port number on which Telnet connections will be made to the router. (Default: 23).+**Port:**  Here, you can enter the port number on which Telnet connections will be made to the router. (Default: 23).
  
-**Stop Now / Start Now**Clicking this button immediately stops the Telnet Daemon. The Telnet daemon will restart at the next reboot (if Enable at Startup is checked). When the Telnet Daemon has stopped, this button will change to read "Start Now". Clicking Start Now immediately starts the Telnet Daemon. When Telnet is finished starting, the text on this button will change back to "Stop Now".+**Stop Now / Start Now:  **Clicking this button immediately stops the Telnet Daemon. The daemon will restart at the next reboot (if Enable at Startup is checked). When the Daemon has stopped, this button will display as "Start Now". Clicking Start Now immediately starts the Daemon. When Telnet is finished starting, the text on this button will change back to "Stop Now".
  
  \\  \\
admin_access.1687551947.txt.gz · Last modified: 2023/06/23 21:25 by hogwild