TP-LINK TL-ER6020 Betriebsanweisung

Stöbern Sie online oder laden Sie Betriebsanweisung nach Router TP-LINK TL-ER6020 herunter. TP-Link TL-ER6020 User Guide Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 168
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - Gigabit Dual-WAN VPN Router

TL-ER6020 SafeStreamTM Gigabit Dual-WAN VPN Router Rev: 1.0.0 1910010695

Seite 2 - CE Mark Warning

-5-  Dual-WAN Ports + Providing two 10/100/1000M WAN ports for users to connect two Internet lines for bandwidth expansion. + Supporting multiple Lo

Seite 3 - CONTENTS

-95- Figure 3-63 L2TP/PPTP Tunnel The following items are displayed on this screen:  General Enable VPN-to-Internet: Specify whether to enable VPN

Seite 4

-96- Account Name: Enter the account name of L2TP/PPTP tunnel. It should be configured identically on server and client. Password: Enter the passwo

Seite 5

-97- Remote Subnet: Enter the IP address range of your remote network. (It's always the IP address range of LAN on the remote peer of VPN tunnel

Seite 6 - Package Contents

-98- In this table, you can view the information of IP Pools and edit them by the action buttons. 3.5.3.3 List of L2TP/PPTP Tunnel This page display

Seite 7 - Chapter 1 About this Guide

-99- Figure 3-66 General The following items are displayed on this screen:  General PPPoE Server: Specify whether to enable the PPPoE Server funct

Seite 8

-100- Idle Timeout: Enter the maximum idle time. The session will be terminated after it has been inactive for this specified period. It can be 0-100

Seite 9 - Chapter 2 Introduction

-101- Figure 3-67 IP Address Pool The following items are displayed on this screen:  IP Address Pool Pool Name: Specify a unique name to the IP Ad

Seite 10 - 2.2 Features

-102- Figure 3-68 Account The following items are displayed on this screen:  Account Account Name: Enter the account name. This name should not be

Seite 11 - 2.3 Appearance

-103- Description: Enter the description for management and search purposes. Up to 28 characters can be entered. Status: Activate or inactivate the e

Seite 12

-104- The following items are displayed on this screen:  Exceptional IP IP Address Range: Specify the start and the end IP address to make an excep

Seite 13 - 2.3.2 Rear Panel

-6-  Supports Diagnostic (Ping/Tracert) and Online Detection VPN  Supports IPsec VPN and provides up to 50 IPsec VPN tunnels  Supports IPSec VP

Seite 14 - Chapter 3 Configuration

-105- Figure 3-71 E-Bulletin The following items are displayed on this screen:  General Enable E-Bulletin: Specify whether to enable electronic bu

Seite 15

-106- Content: Enter the content of the bulletin. Object: Select the object of this bulletin. Options include:  ANY: The bulletin will be released

Seite 16 -  NAT Mode

-107- latest IP address, the server will update the mappings between the domain name and IP address in DNS database. Therefore, the users can use the

Seite 17 - 3.1.3 WAN

-108- Domain Name: Enter the Domain Name that you registered with your DDNS service provider. DDNS Service: Activate or inactivate DDNS service here.

Seite 18

-109- Account Name: Enter the Account Name of your DDNS account. If you have not registered, click <Go to register> to go to the website of No-

Seite 19

-110- Figure 3-74 PeanutHull DDNS The following items are displayed on this screen:  PeanutHull DDNS Account Name: Enter the Account Name of your

Seite 20

-111- Domain Name: Displays the domain names obtained from the DDNS server. Up to 16 domain names can be displayed here.  List of PeanutHull Accoun

Seite 21

-112- DDNS Status: Displays the current status of DDNS service  Offline: DDNS service is disabled.  Connecting: client is connecting to the serve

Seite 22 - Figure 3-8 WAN - PPPoE

-113-  General UPnP Function: Enable or disable the UPnP function globally.  List of UPnP Mapping After UPnP is enabled, all UPnP connection rul

Seite 23

-114- New User Name: Enter a new user name for the Router. New Password: Enter a new password for the Router. Confirm New Password: Re-enter the new

Seite 24

-7-  LEDs LED Status Indication On The Router is powered on PWR Off The Router is powered off or power supply is abnormal Flashing The Router w

Seite 25

-115- Telnet Idle Timeout: Enter a timeout period that the Router will log the remote PCs out of the Web-based Utility after a specified period (Te

Seite 26

-116- Application Example Network Requirements Allow the IP address within 210.10.10.0/24 segment to manage the Router with IP address of 210.10.10.5

Seite 27

-117- Figure 3-81 Export and Import The following items are displayed on this screen:  Configuration Version Displays the current Configuration ve

Seite 28

-118- Figure 3-82 Reboot Click the <Reboot> button to reboot the Router. The configuration will not be lost after rebooting. The Internet co

Seite 29

-119- Figure 3-84 License 3.7.4 Statistics 3.7.4.1 Interface Traffic Statistics Interface Traffic Statistics screen displays the detailed traffic

Seite 30

-120- Interface: Displays the interface. Rate Rx: Displays the rate for receiving data frames. Rate Tx: Displays the rate for transmitting data fram

Seite 31

-121- Figure 3-86 IP Traffic Statistics The following items are displayed on this screen:  General Enable IP Traffic Statistics: Allows you to ena

Seite 32

-122- Figure 3-87 Diagnostics The following items are displayed on this screen:  Ping Destination IP/Domain: Enter destination IP address or Doma

Seite 33

-123- of destination automatically. After clicking the <Start> button, the Router will send Tracert packets to test the connectivity of the gat

Seite 34 - 3.1.4 LAN

-124- WAN Status: Display the detecting results. 3.7.6 Time System Time is the time displayed while the Router is running. On this page you can con

Seite 35

-8- 2.3.2 Rear Panel The rear panel of TL-ER6020 is shown as the following figure.  Power Socket Connect the female connector of the power cord to

Seite 36 - 3.1.4.4 DHCP Reservation

-125- Note: ● If Get GMT function cannot be used properly, please add an entry with UDP port of 123 to the firewall software of the PC. ● The tim

Seite 37 - 3.1.5 DMZ

-126- The Logs of switch are classified into the following eight levels. Severity Level Description Emergency 0 The system is unusable. Alert 1 Act

Seite 38 - 3.1.5.1 DMZ

-127- Chapter 4 Application 4.1 Network Requirements The company has established the server farms in the headquarters to provide the Web, Mail and

Seite 39 - 3.1.6 MAC Address

-128- 4.2 Network Topology 4.3 Configurations You can configure the Router via the PC connected to the LAN port of this Router. To log in to the R

Seite 40

-129- 4.3.1.1 System Mode Set the system mode of the Router to the NAT mode. Choose the menu Network→System Mode to load the following page. Select

Seite 41 - 3.1.7 Switch

-130- Figure 4-3 Link Backup 4.3.2 VPN Setting To enable the hosts in the remote branch office (WAN: 116.31.85.133, LAN: 172.31.10.1) to access the

Seite 42 - 3.1.7.2 Port Mirror

-131- Authentication: MD5 Encryption: 3DES DH Group: DH2 Click the <Add> button to apply. Figure 4-4 IKE Proposal  IKE Policy Choose the me

Seite 43

-132- Figure 4-5 IKE Policy Tips: For the VPN Router in the remote branch office, the IKE settings should be the same as the Router in the headquart

Seite 44 - 3.1.7.3 Rate Control

-133- ESP Encryption: 3DES Click the <Save> button to apply. Figure 4-6 IPsec Proposal  IPsec Policy Choose the menu VPN→IPsec→IPsec Policy

Seite 45 - 3.1.7.4 Port Config

-134- Figure 4-7 IPsec Policy Tips: For the VPN Router in the remote branch office, the IPsec settings should be consistent with the Router in the h

Seite 46 - 3.1.7.5 Port Status

-9- Chapter 3 Configuration 3.1 Network 3.1.1 Status The Status page shows the system information, the port connection status and other informatio

Seite 47 - 3.2 User Group

-135-  L2TP/PPTP Tunnel Choose the menu VPN→L2TP/PPTP→L2TP/PPTP Tunnel to load the following page. Check the box of Enable VPN-to-Internet to allo

Seite 48 - 3.2.2 User

-136- 4.3.3 Network Management To manage the enterprise network effectively and forbid the Hosts within the IP range of 192.168.0.30-192.168.0.50 t

Seite 49 - 3.2.3 View

-137- Choose the menu User Group→User to load the configuration page. Click the <Batch> button to enter the batch processing screen. Then cont

Seite 50 - 3.3 Advanced

-138- Application: Click the <Application List> button and select the applications desired to be blocked on the popup window.Status: Activat

Seite 51 - 3.3.1.2 One-to-One NAT

-139- Figure 4-12 Bandwidth Setup 2) Interface Bandwidth Choose the menu Network→WAN→WAN1 to load the configuration page. Configure the Upstream Ban

Seite 52 - 3.3.1.3 Multi-Nets NAT

-140- Figure 4-14 Bandwidth Control Rule 4.3.3.4 Session Limit Choose the menu Advanced→Session Limit→Session Limit to load the configuration page.

Seite 53

-141- 4.3.4.1 LAN ARP Defense You can configure IP-MAC Binding manually or by ARP Scanning. For the first time configuration, please bind most of th

Seite 54

-142- Choose the menu Firewall→Anti ARP Spoofing→IP-MAC Binding to load the configuration page. To add the host with IP address of 192.168.1.20 and M

Seite 55 - 3.3.1.4 Virtual Server

-143- 4.3.4.3 Attack Defense Choose the menu Firewall→Attack Defense→Attack Defense to load the configuration page. Select the options desired to be

Seite 56

-144- Figure 4-21 Port Mirror 2) Statistics Choose the menu Maintenance→Statistics to load the page. Load the Interface Traffic Statistics page to v

Seite 57 - 3.3.1.5 Port Triggering

-10- Figure 3-2 Network Topology - NAT Mode If your Router is connecting the two networks of different areas in a large network environment with a n

Seite 58

-145- Figure 4-23 IP Traffic Statistics After all the above steps, the enterprise network will be operated based on planning.

Seite 59 - 3.3.2 Traffic Control

-146- Chapter 5 CLI TL-ER6020 provides a Console port for CLI (Command Line Interface) configuration, which enables you to configure the Router by a

Seite 60 - 3.3.2.1 Setup

-147- Figure 5-2 Connection Description 4. Select the port (The default port is COM1) to connect in Figure 5-3, and click OK. Figure 5-3 Select th

Seite 61 - 3.3.2.2 Bandwidth Control

-148- Figure 5-4 Port Settings 6. Choose File → Properties → Settings on the Hyper Terminal window as Figure 5-5 shows, then choose VT100 or Auto de

Seite 62

-149- 7. The DOS prompting “TP-LINK>” will appear after pressing the Enter button in the Hyper Terminal window as Figure 5-6 shows. Figure 5-6 L

Seite 63 - 3.3.3 Session Limit

-150- Mode Accessing Path Prompt Logout or Access the next mode User EXEC Mode Primary mode once it is connected with the Router. TP-LINK > Use

Seite 64 - 3.3.4 Load Balance

-151- enable - Enter the privileged mode exit - Exit the CLI (only for telnet) history - Show command history ip - Display or Set the IP

Seite 65 - 3.3.4.2 Policy Routing

-152- 5.4 Command Introduction TL-ER6020 provides a number of CLI commands for users to manage the Router and user information. For better understan

Seite 66 - 3.3.4.3 Link Backup

-153- 5.4.3 sys The sys command is used for system management, including Backup and Restore, Factory Default, Reboot, Firmware Upgrade and so on. T

Seite 67

-154- ● Pay special attention that the specified account must be with appropriate permissions since the functions such as export, import and firmwar

Seite 68 - 3.3.4.4 Protocol

-11- Figure 3-4 Network Topology – Classic Mode Choose the menu Network→System Mode to load the following page. Figure 3-5 System Mode You can sele

Seite 69 - Routing

-155- TP-LINK > user get Username: admin Password: admin Query the user name and password of the current Guest. TP-LINK > user set passwor

Seite 70

-156- TP-LINK > history 1. history 2. sys show 3. history View the history command. TP-LINK > history clear 1. history 2. sys show 3

Seite 71 - 3.3.5.2 RIP

-157- Appendix A Hardware Specifications Standards IEEE 802.3, IEEE 802.3u, IEEE 802.3ab, IEEE 802.3x, TCP/ IP, DHCP, ICMP, NAT、PPPoE, SNTP, HTTP, DN

Seite 72

-158- Appendix B FAQ Q1. What can I do if I cannot access the web-based configuration page? 1. For the first login, please try the following steps:

Seite 73 - 3.3.5.3 Route Table

-159- Q3: What can I do if the Router with the remote management function enabled cannot be accessed by the remote computer? 1. Make sure that t

Seite 74 - 3.4 Firewall

-160- Appendix C Glossary Glossary Description DSL (Digital Subscriber Line) A technology that allows data to be sent or received over existing tr

Seite 75

-161- Glossary Description H.323 H.323 allows dissimilar communication devices to communicate with each other by using a standardized communicatio

Seite 76 - 3.4.1.2 ARP Scanning

-162- Glossary Description MAC address(Media Access Control address) Standardized data link layer address that is required for every port or devic

Seite 77 - 3.4.2 Attack Defense

-163- Glossary Description Telnet(Telecommunication Network protocol) Telnet is used for remote terminal connection, enabling users to log in to r

Seite 78 - Figure 3-49 Attack Defense

-12-  Non-NAT Mode In this mode, the Router functions as the traditional Gateway and forwards the packets via routing protocol. The Hosts in differ

Seite 79 - MAC Filtering

-13- Figure 3-6 WAN – Static IP The following items are displayed on this screen:  Static IP Connection Type: Select Static IP if your ISP has a

Seite 80 - 3.4.4 Access Control

-14- Upstream Bandwidth: Specify the bandwidth for transmitting packets on the port. Downstream Bandwidth: Specify the bandwidth for receiving packet

Seite 81

-I- COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Oth

Seite 82 - 3.4.4.3 Access Rules

-15-  Dynamic IP Connection Type: Select Dynamic IP if your ISP assigns the IP address automatically. Click <Obtain> to get the IP address

Seite 83

-16-  Dynamic IP Status Status: Displays the status of obtaining an IP address from your ISP.  “Disabled” indicates that the Dynamic IP connectio

Seite 84 - 3.4.4.4 Service

-17- Figure 3-8 WAN - PPPoE

Seite 85

-18- The following items are displayed on this screen:  PPPoE Settings Connection Type: Select PPPoE if your ISP provides xDSL Virtual Dial-up co

Seite 86 - App Control

-19- ISP Address: Optional. Enter the ISP address provided by your ISP. It's null by default. Service Name: Optional. Enter the Service Name pro

Seite 87 - 3.4.5.2 Database

-20-  PPPoE Status Status: Displays the status of PPPoE connection.  “Disabled” indicates that the PPPoE connection type is not applied.  “Co

Seite 88 - 3.5 VPN

-21- Figure 3-9 WAN - L2TP The following items are displayed on this screen:  L2TP Settings Connection Type: Select L2TP if your ISP provides a

Seite 89 - 3.5.1.1 IKE Policy

-22- Account Name: Enter the Account Name provided by your ISP. If you are not clear, please consult your ISP. Password: Enter the Password provided

Seite 90

-23- Primary DNS/ Secondary DNS: If Static IP is selected, configure the DNS. If Dynamic IP is selected, the obtained DNS is displayed. Upstream Ba

Seite 91 - 3.5.1.2 IKE Proposal

-24- 5) PPTP If your ISP (Internet Service Provider) has provided the account information for the PPTP connection, please choose the PPTP connection

Seite 92 - 3.5.2 IPsec

-II- CONTENTS Package Contents...1 Cha

Seite 93 - 3.5.2.1 IPsec Policy

-25- <Disconnect> to disconnect the Internet connection and release the current IP address. Account Name: Enter the Account Name provided by

Seite 94 -  IKE Mode

-26- Primary DNS/ Secondary DNS: If Static IP is selected, configure the DNS. If Dynamic IP is selected, the obtained DNS is displayed. Upstream Ba

Seite 95 -  Manual Mode

-27- Figure 3-11 WAN – Bigpond The following items are displayed on this screen:  BigPond Settings Connection Type: Select BigPond if your ISP p

Seite 96 - 3.5.2.2 IPsec Proposal

-28- Auth Domain: Enter the domain name of authentication server. It's only required when the address of Auth Server is a server name. Auth Mode

Seite 97

-29- Default Gateway: Displays the IP address of the default gateway assigned by your ISP. Note: To ensure the BigPond connection re-established norm

Seite 98 - 3.5.2.3 IPsec SA

-30- Choose the menu Network→LAN→DHCP to load the following page. Figure 3-13 DHCP Settings The following items are displayed on this screen:  D

Seite 99 - 3.5.3 L2TP/PPTP

-31- Primary DNS: Optional. Enter the Primary DNS server address provided by your ISP. It is recommended to enter the IP address of the LAN port of t

Seite 100

-32-  DHCP Reservation MAC Address: Enter the MAC address of the computer for which you want to reserve the IP address. IP Address: Enter the res

Seite 101 - It should be configured

-33- Figure 3-16 DMZ – Public Mode In Private mode, the DMZ port allows the Hosts in DMZ to access Internet via NAT mode which translates private IP

Seite 102

-34- Figure 3-18 DMZ The following items are displayed on this screen:  DMZ Status: Activate or inactivate this entry. The DMZ port functions a

Seite 103 - 3.6 Services

-III- 3.3.3 Session Limit ...58 3.3.4 Load

Seite 104 -  General

-35- Set the MAC Address for LAN port: In a complex network topology with all the ARP bound devices, if you want to use TL-ER6020 instead of the curr

Seite 105 - 3.6.1.2 IP Address Pool

-36- MAC Clone: It’s only available for WAN port. Click the <Restore Factory MAC> button to restore the MAC address to the factory default valu

Seite 106 - 3.6.1.3 Account

-37- The following items are displayed on this screen:  Statistics Unicast: Displays the number of normal unicast packets received or transmitted o

Seite 107 -  Account

-38- Choose the menu Network→Switch→Port Mirror to load the following page. Figure 3-21 Port Mirror The following items are displayed on this screen

Seite 108 - 3.6.1.4 Exceptional IP

-39- The entry in Figure 3-21 indicates: The outgoing packets sent by port 1, port 2, port 3 and port 5 (mirrored ports) will be copied to port 4 (mi

Seite 109 - 3.6.2 E-Bulletin

-40- Figure 3-22 Rate Control The following items are displayed on this screen:  Rate Control Port: Displays the port number. Ingress Limit: Spe

Seite 110 -  E-Bulletin

-41- Figure 3-23 Port Config The following items are displayed on this screen:  Port Config Status: Specify whether to enable the port. The packet

Seite 111 - 3.6.3 Dynamic DNS

-42- 3.1.7.6 Port VLAN A VLAN (Virtual Local Area Network) is a network topology configured according to a logical scheme rather than the physical l

Seite 112 - 3.6.3.1 DynDNS

-43- 3.2.1 Group On this page you can define the group for management. Choose the menu User Group→Group to load the following page. Figure 3-26 G

Seite 113 - 3.6.3.2 No-IP

-44-  User Config User Name: Specify a unique name for the user. IP Address: Enter the IP Address of the user. It cannot be the network address or

Seite 114 - 3.6.3.3 PeanutHull

-IV- 4.2 Network Topology...128 4.3 Con

Seite 115 -  PeanutHull DDNS

-45- User Name: Select the name of the desired User. Available Group: Displays the Groups that the User can join. Selected Group: Displays the Groups

Seite 116 - 3.6.3.4 Comexe

-46- The following items are displayed on this screen:  NAPT Source Port Range: Enter the source port range between 2049 and 65000, the span of whi

Seite 117 - 3.6.4 UPnP

-47- Interface: Select an interface for forwarding data packets. DMZ Forwarding: Enable or disable DMZ Forwarding. The packets transmitted to the Tra

Seite 118 - 3.7 Maintenance

-48- Subnet/Mask: Enter the subnet/mask to make the address range for the entry. Interface: Select the interface for the entry. You can select LAN or

Seite 119 - 3.7.1.2 Login Parameter

-49- Configuration procedure 1. Establish the Multi-Nets NAT entries with Subnet/Mask of VLAN2 and VLAN3. The configured entries are as follows:

Seite 120 - 3.7.1.3 Remote Management

-50- Choose the menu Advanced→Routing→Static Route to load the following page. The Static Route entry is as follows: 3.3.1.4 Virtual Server Virtua

Seite 121 - 3.7.2 Management

-51- Figure 3-32 Virtual Server The fo layed Virtual Server entries. Up to 28 characters can be Interface: Select an interface for forwarding dat

Seite 122 - 3.7.2.3 Reboot

-52- Note: ● The External port and Internal Port should be set in the range of 1-65535. ● The external ports of different entries should be diffe

Seite 123 - 3.7.3 License

-53- p to 28 characters can be entered. Interface: Select an interface for forwarding data packets. Trigger Port: Enter the trigger port number or th

Seite 124 - 3.7.4 Statistics

-54- 3.3.1.6 Some special protocols such as (Application Layer Gateway) service is enabled. Choose the menu Advanced→NAT→ALG to load the following p

Seite 125

-1- Package Contents The following items should be found in your package:  One TL-ER6020 Router  One Power Cord  One Console Cable  Two mounti

Seite 126 - 3.7.5 Diagnostics

-55- 3.3.2.1 Setup Choose the menu Advanced→Traffic Control→Setup to load the following page. Figure 3-35 Configuration The following items are dis

Seite 127

-56-  Interface B ndwidth Interface: tal bandwidth is equal to Bandwidth: e Downstream Bandwidth of WAN port can be configured on WAN page. aDispla

Seite 128 - 3.7.5.2 Online Detection

-57-  Band Rule Direction: WAN port cannot be selected if Mode: h user equals to the current addresses d Bandwidth Specify the Guaranteed Upstrea

Seite 129 - 3.7.6 Time

-58- Note: ● The premise for single rule taking effect is that the bandwidth of the interface for this rule is sufficient and not used up. ● It i

Seite 130 - 3.7.7 Logs

-59-  Session Limit ion: Status: Activate or inactivate the entry. ssions for the hosts within group1 ed. Limit. Choose the menu Advanced→Sessio

Seite 131

-60- Figure 3-39 Configuration With the box before Enable Application Optimized Routing checked, the Router will consider the source IP address and

Seite 132 - Chapter 4 Application

-61- The following items are displa is screen:  Generalyed on th Protocol: Select the protocol for the entry in the drop-down list. If the protoco

Seite 133 - 4.3 Configurations

-62- On this page, you can configure the Link Backup function based on actual need to reduce the traffic burden of WAN port and improve the network e

Seite 134 - 4.3.1.3 Link Backup

-63- Timing: Link Backup will be enabled if the specified effective time is reached. All the traffic on the primary WAN will switch to the backup WAN

Seite 135 - 4.3.2 VPN Setting

-64- Figure 3-42 Protocol The following items are displayed on this screen:  Protocol Name: Enter a name to indicate a protocol. The name will di

Seite 136 -  IKE Policy

-2- Chapter 1 About this Guide This User Guide contains information for setup and management of TL-ER6020 Router. Please read this guide carefully b

Seite 137 -  IPsec Proposal

-65- Choose the menu Advanced→Routing→Static Route to load the following page. Figure 3-43 Static Route The following items are displayed on this sc

Seite 138 -  IPsec Policy

-66- The first entry in Figure 3-43 indicates: If there are packets being sent to a device with IP address of 211.162.1.0 and subnet mask of 255.255.

Seite 139 - 4.3.2.2 PPTP VPN Setting

-67- The distance of RIP refers to the hop counts that a data packet passes through before reaching its destination, the value range of which is 1–15

Seite 140 -  L2TP/PPTP Tunnel

-68- Authentication: network situation, and the password should not be more than 15 characters. All Interfaces: Here you can operate all the interfac

Seite 141 - 4.3.3 Network Management

-69- Flags: The Flags of route entry. The Flags describe certain characteristics of the route. Logical Interface: The logical interface of route entr

Seite 142 - 4.3.3.2 App Control

-70- Figure 3-46 IP-MAC Binding The following items are displayed on this screen:  General It is recommended to check all the options. You should

Seite 143 - 4.3.3.3 Bandwidth Control

-71- You can view the information of the entries and edit them by the Action buttons. The first entry in Figure 3-46 indicates: The IP address of 192

Seite 144

-72- Indicates that the IP and MAC address of this entry are already bound. To bind the entries in the list, check these entries and click the <I

Seite 145 - 4.3.4 Network Security

-73- Figure 3-49 Attack Defense The following items are displayed on this screen:  General Flood Defense: Flood attack is a commonly used DoS (De

Seite 146 - 4.3.4.1 LAN ARP Defense

-74- Packet Anomaly Defense: Packet Anomaly refers to the abnormal packets. It is recommended to select all the Packet Anomaly Defense options. Enabl

Seite 147 - 4.3.4.2 WAN ARP Defense

-3- Appendix A Hardware Specifications Lists the hardware specifications of this Router. Appendix B FAQ Provides the possible solutions to the prob

Seite 148 - 4.3.4.4 Traffic Monitoring

-75-  List of Rules You can view the information of the entries and edit them by the Action buttons. 3.4.4 Access Control 3.4.4.1 URL Filtering

Seite 149

-76-  Group: URL Filtering will take effect to all the users in group.Mode: Select the mode for URL Filtering. “Keyword’’ indicates that all the UR

Seite 150

-77- 3.4.4.2 Web Filtering On this page, you can filter the desired web components. Choose the menu Firewall→Access Control→Web Filtering to load th

Seite 151 - Chapter 5 CLI

-78- Policy: Select a policy for the entry:  Block: When this option is selected, the packets obeyed the rule will not be permitted to pass through

Seite 152

-79- Priority: Select this option to specify the priority for the added entries. The latest enabled entry will be displayed at the end of the list by

Seite 153

-80- Figure 3-54 Service The following items are displayed on this screen:  Service Name: Enter a name for the service. The name should not be mo

Seite 154 - 5.2 Interface Mode

-81- 3.4.5 App Control 3.4.5.1 Control Rules On this page, you can enable the Application Rules function. Choose the menu Firewall→App Control→Cont

Seite 155 - 5.3 Online Help

-82- Application: Click the <Application List> button to select applications from the popup checkbox. The applications include IM, Web IM, SNS,

Seite 156

-83- 3.5 VPN VPN (Virtual Private Network) is a private network established via the public network, generally via the Internet. However, the private

Seite 157 - 5.4 Command Introduction

-84- 3.5.1.1 IKE Policy On this page you can configure the related parameters for IKE negotiation. Choose the menu VPN→IKE→IKE Policy to load the

Seite 158 - 5.4.3 sys

-4- Chapter 2 Introduction Thanks for choosing the SafeStreamTM Gigabit Dual-WAN VPN Router TL-ER6020. 2.1 Overview of the Router The SafeStreamTM

Seite 159 - 5.4.4 user

-85- Exchange Mode: Select the IKE Exchange Mode in phase 1, and ensure the remote VPN peer uses the same mode.  Main: Main mode provides identity

Seite 160 - 5.4.5 history

-86- DPD Interval: Enter the interval after which the DPD is triggered.  List of IKE Policy In this table, you can view the information of IKE Poli

Seite 161 - 5.4.6 exit

-87- Encryption: Specify the encryption algorithm for IKE negotiation. Options include:  DES: DES (Data Encryption Standard) encrypts a 64-bit bloc

Seite 162

-88- 3.5.2.1 IPsec Policy On this page, you can define and edit the IPsec policy. Choose the menu VPN→IPsec→IPsec Policy to load the following pag

Seite 163 - Appendix B FAQ

-89- Mode: Select the network mode for IPsec policy. Options include:  LAN-to-LAN: Select this option when the client is a network.  Client-to-LA

Seite 164

-90- Phase2. As it is independent of the key created in Phase1, this key can be secure even when the key in Phase1 is de-encrypted. Without PFS, the

Seite 165 - Appendix C Glossary

-91- AH Authentication Key-Out: Specify the outbound AH Authentication Key manually if AH protocol is used in the corresponding IPsec Proposal. The o

Seite 166

-92- Figure 3-61 IPsec Proposal The following items are displayed on this screen:  IPsec Proposal Proposal Name: Specify a unique name to the IP

Seite 167

-93- ESP Authentication: Select the algorithm used to verify the integrity of the data for ESP authentication. Options include:  MD5: MD5 (Message

Seite 168

-94- outgoing SPI value are different. However, the Incoming SPI value must match the Outgoing SPI value at the other end of the tunnel, and vice ver

Kommentare zu diesen Handbüchern

Keine Kommentare