EasyManuals Logo

ELTEX ESR-100 User Manual

ELTEX ESR-100
109 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #10 background imageLoading...
Page #10 background image
10 ESR Series Routers Operation Manual
2.2.5 Traffic tunnelling functions
Table 2.5 Traffic tunnelling functions
Tunnelling
protocols
Tunnelling is a method of packet conversion during their network transfer that
involves the replacement, modification and addition of a new packet network
header. This method may be used for negotiation of transport protocols when the
data is transferred through the transit network as well as for creation of secured
connections where tunnelled data is being encrypted.
Routers support the following types of tunnels:
GREIP packet is encapsulated into another IP packet with GRE (General
Routing Encapsulation) header
IPv4-IPv4tunnel that encapsulates source IP packets into IP packets
with alternative network parameters
L2TPv3tunnel for L2 traffic transmission using IP packets
IPsectunnel with the encryption of transmitted data
L2TP, PPTPtunnels used for establishing a remote 'client-sever' access
2.2.6 Management and configuration functions
Table 2.6 Basic management and configuration functions
Configuration file
download and upload
Device parameters are saved into the configuration file that contains configuration
data for the specific device ports as well as for the whole system. The following
protocols may be used for file transfers: TFTP, FTP, and SCP.
Command line interface
(CLI)
CLI management is performed locally via serial port RS-232, or remotely via Telnet,
SSH. Console command line interface (CLI) is the industrial standard. CLI
interpreter contains the list of commands and keywords that will help the user and
reduce the amount of input data.
Syslog
Syslog protocol is designed for transmission of system event messages and event
logging.
Network utilities:
ping, traceroute
ping and traceroute utilities allow you to check the availability of network devices
and identify data transfer routes in IP networks.
Controlled access
management
privilege levels
Routers support system access level management for users. Access levels enable
responsibility areas management for device administrators. Access levels are
numbered from 1 to 15; Level 15 stands for full access to device management
features.
Authentication
Authentication is a user identity check procedure. Routers support the following
authentication methods:
locallocal user database stored on the device is used for authentication
groupuser database is located on the authentication server RADIUS
and TACACS protocols are user for server interactions.
SSH server
Telnet server
SSH and Telnet server features allow you to establish connection to the device
and perform device management.
Automatic
configuration restore
Device features automatic configuration restore system designed to prevent
remote access loss after re-configuration. If the configuration change is not
confirmed in the defined time, configuration will be rolled back to the last known
state.

Table of Contents

Other manuals for ELTEX ESR-100

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the ELTEX ESR-100 and is the answer not in the manual?

ELTEX ESR-100 Specifications

General IconGeneral
BrandELTEX
ModelESR-100
CategoryNetwork Router
LanguageEnglish

Related product manuals