Hello
When enabling SSH, there is an option to restrict the access to the local network
It could be useful to add a way to enter one or more 1IP addresses outside the local network range.
Goal: Allowing remote maintenance without opening to all the internet.
Feature Request: SSH fine grained IP access
Re: Feature Request: SSH fine grained IP access
firewall can help to do this.
To contact our team, please send email to following addresses, remember to replace (at) with @:
Support team: support(at)terra-master.com (for technical support only)
Service team: service(at)terra-master.com (for purchasing, return, replacement, RMA service)
Support team: support(at)terra-master.com (for technical support only)
Service team: service(at)terra-master.com (for purchasing, return, replacement, RMA service)
Re: Feature Request: SSH fine grained IP access
Yes, fully agree on the technical side.
On the UX/UI side, however it is unclear which setting will take over precedence in the iptables conf when playing with the settings at 2 different locations.
E.g. with the current TOS version, if I check the "only local network" for SSH, there is no rule displayed in the firewall control panel part.
Re: Feature Request: SSH fine grained IP access
"Allow only within local network" means the accessing user IP need to be in the same segment with your tnas IP, and this feature only valid for SSH access. So you can set your firewall rules for access from outside. They do not conflict with each other.
To contact our team, please send email to following addresses, remember to replace (at) with @:
Support team: support(at)terra-master.com (for technical support only)
Service team: service(at)terra-master.com (for purchasing, return, replacement, RMA service)
Support team: support(at)terra-master.com (for technical support only)
Service team: service(at)terra-master.com (for purchasing, return, replacement, RMA service)