ESR series service routers.ESR-Series. User manual
•
•
•
•
•
•
•
2.2.5  Traffic tunneling functions
Table 5 – Traffic tunneling functions
Tunnelingprotocols Tunneling is a method of packet conversion during their network transfer that 
involves the replacement, modification and addition of a new packet network 
header. This method may be used for negotiation of transport protocols when the 
data is transferred through the transit network as well as for creation of secured 
connections where tunneled data is being encrypted.
Routers support the following types of tunnels:
GRE – IP packet/Ethernet frame is encapsulated into another IP packet with 
GRE (General Routing Encapsulation) header;
IPv4-IPv4 – tunnel that encapsulates source IP packets into IP packets with 
alternative network parameters;
L2TPv3 – tunnel for L2 traffic transmission using IP packets;
IPsec – tunnel with the encryption of transmitted data;
L2TP, PPTP, PPPoE, OpenVPN – tunnels used for establishing a remote 
'client-sever' access.
2.2.6  Management and configuration functions
Table 6 – Basic management and configuration functions
Configuration file download and upload Device parameters are saved into the configuration file that contains 
configuration data for the specific device ports as well as for the 
whole system. The following protocols may be used for file transfers: 
TFTP, FTP, and SCP.
Command line interface (CLI) CLI management is performed locally via serial port RS-232, or 
remotely via Telnet, SSH. Console command line interface (CLI) is the 
industrial standard. CLI interpreter contains the list of commands and 
keywords that will help the user and reduce the amount of input data.
Syslog Syslog protocol is designed for transmission of system event 
messages and event logging.
Ping, traceroute 
network utilities
Ping and traceroute utilities allow you to check the availability of 
network devices and identify data transfer routes in IP networks.
Controlled access management – privilege 
levels
Routers support system access level management for users. Access 
levels enable responsibility areas management for device 
administrators. Access levels are numbered from 1 to 15; Level 15 
stands for full access to device management features.
Authentication Authentication is a user identity check procedure. Routers support the 
following authentication methods:
local – local user database stored on the device is used for 
authentication;
group – user database is located on the authentication server. 
RADIUS and TACACS protocols are user for server interactions.