This page is an overview of the Administration section of RUTX11 devices.
The General section is used to set up some of device managerial parameters, such as changing device name. For more information on the General section, refer to figure and table below.
The Access Control page is used to manage remote and local access to device.
Important: turning on remote access leaves your device vulnerable to external attackers. Make sure you use a strong password.SSH
The Root CA section is used to add a root CA certificate file to the device. There is a default file already preloaded on the device which will be overwritten by any uploaded file. The certificates must be in .pem format, maximum file size is 300 KB. These certificates are only needed if you want to use HTTPS for your services and the default file should be sufficient in most cases.
The Logging Settings section is used to configure how and where the device stores system log data. The system log is a file that contains information on various system related events and is useful to engineers for troubleshooting the device.
The Troubleshoot section is used to download various files that contain information used for troubleshooting the device. Refer to the figure and table below for information on the Troubleshoot page.
* More on TCP dump in the next section.
TCP dump is a program used to capture packets moving through network interfaces. By default, the device does not store TCP dump information. You must enable TCP dump and save the changes before you can download the file.
If you enable TCP dump, you will notice additional configuration fields appear. Refer to the figure and table below for realted information.
The Diagnostics section is used to execute simple network diagnostic tests, including ping, traceroute and nslookup.
The Recipients section is used to configure phone groups and email users, which can later be used along with SMS or email related services, such as Events Reporting.
A Phone Group is a collection of phone numbers that can be used as the recipient in SMS & call related services instead of specifying every number individually. The phone group list is empty by default thus, you must first add at least one new group before you can add phone numbers to it. To create and begin editing a phone group, follow these steps:
After clicking ‘Edit’ you should be redirected to that phone group’s configuration page where you can start adding phone numbers to it.
When email related services (such as Events Reporting) are used, the device logs in to the specified email account and reads the inbox (e.g., Email to SMS) or sends out a message (e.g., SMS to Email) depending on the configured service. In this context, an Email Account is an configuration instance that contains the necessary data required in order to log into an email account.
The email accounts list is empty by default thus, you must first add at least one new account before you can configure it. To create and begin editing an email account, follow these steps:
After clicking ‘Edit’ you should be redirected to that email account’s settings page where you can start configuring the account.
The Overview setup section is used to select which widgets will be shown in the RUTX11_Overview window.
The Certificates page is used for convenient TLS certificate and key generation and management. Generated files can be exported and used on other machines or locally on this device with functions that use TLS/SSL, such as MQTT, OpenVPN, IPsec and others.
The Certificate Generation tab provides the possibility to generate TLS certificates required for secure authentication and communication encryption used by some of the devices services.
There are five distinct generation methods (denoted by the selected ‘File Type’).
Generating each type of file (excluding ‘Simple’) requires setting some parameters. This section provides an overview for parameters used in TLS certificate generation.
Core parameters or simply parameters that apply to each file type are the size and common name of the generated file(s).
Subject information is not mandatory but can be used as user-friendly way to identify the ownership of certificate files by including such information as the owner’s location and company name.
The Sign the certificate slider control whether the certificate will be signed automatically or manually after the generation is complete.
A Private Key Decryption Password is a parameter used to decrypt private keys protected by a password.
The Certificate Signing section is used to validate (sign) unsigned certificates.
The Certificate Manager page displays information on all certificate and key files stored on the device and provides the possibility export these files for use on another machine or import files generated elsewhere.
The Certificate Import section provides the possibility to import certificates and files generated on another machine. To upload such a file simply click ‘Browse’, locate the file on your computer and click ‘Import’
The Certificates, Keys and Requests section display files generated on or imported to the device along with the most important information related to them.
By default, the lists are empty. A set certificates generated using ‘Simple’ file type would look something like this:
The ‘Export’ buttons are used to download the files from the device onto your local machine. The ‘X’ buttons located to the right of each entry are used to delete related files.
The Unsaved changes section is used to see and apply or revert all unsaved changes.
Your email address will not be published. Required fields are marked *
Save my name, email, and website in this browser for the next time I comment.