EasyManua.ls Logo

ELTEX ESR-1200 User Manual

Default Icon
650 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image

ESR series service routers
ESR-10, ESR-12V, ESR-12VF, ESR-14VF, ESR-15V, ESR-20, ESR-21,
ESR-30, ESR-100, ESR-200, ESR-1000, ESR-1200, ESR-1500, ESR-1700,
ESR-1511, ESR-3100, ESR-3200
User manual
Firmware version1.18.1

Table of Contents

Other manuals for ELTEX ESR-1200

Question and Answer IconNeed help?

Do you have a question about the ELTEX ESR-1200 and is the answer not in the manual?

ELTEX ESR-1200 Specifications

General IconGeneral
FirewallYes
Operating Temperature0°C to +40°C
Storage Temperature-40°C to +70°C
VPN SupportYes
TypeRouter
Ports2 x WAN, 1 x USB
WAN Ports2 x 10/100/1000BASE-T

Summary

Product description

Purpose

Describes the ESR series routers as high-performance multi-purpose network routers for robust corporate environment protection.

Functions

Lists and describes various functions including interface, MAC table, OSI layer functions, and tunneling.

Main specifications

Lists the main specifications of the ESR routers, including interfaces, power, weight, and dimensions.

Management interfaces

Command line interface (CLI)

Describes the CLI for device management, user authorization, and command categories.

Initial router configuration

ESR router factory configuration

Explains the factory configuration including essential settings and security zones.

Router connection and configuration

Covers connecting the ESR routers and performing basic configuration tasks.

Firmware update

Updating firmware via system resources

Provides instructions for updating firmware using TFTP, FTP, or SCP servers.

Updating firmware via bootloader

Details the process of updating firmware via the bootloader, including TFTP server setup.

Safe configuration recommendations

General recommendations

Offers general recommendations for safe operation, such as disabling unused interfaces and setting system clocks.

Password usage policy configuration

Details configuration algorithms for password usage policy, including recommendations and examples.

Remote management configuration

Covers recommendations and configuration examples for remote management, including disabling Telnet and generating encryption keys.

Configuration of protection against network attacks mechanisms

Provides algorithms and examples for configuring protection against network attacks like IP spoofing and SYN flood.

Interface management

VLAN Configuration

Details the configuration algorithm for VLANs, including creating VLANs, specifying names, and setting operation modes.

Tunneling management

GRE tunnel configuration

Describes GRE tunneling protocol for encapsulating OSI model network layer packets into IP packets.

DMVPN configuration

Introduces DMVPN technology for creating virtual private networks with dynamic tunnels.

IPsec VPN configuration

Explains IPsec protocols for enabling security features like identity validation, integrity check, and encryption.

QoS management

Basic QoS

Covers basic QoS in ESR routers, focusing on classification and relabeling on the input.

Advanced QoS

Explains advanced QoS modes, allowing traffic classification on both incoming and outgoing interfaces.

Routing management

Static routes configuration

Explains static routing, allowing explicit route definition during router configuration without dynamic protocols.

BGP configuration

Covers BGP configuration for exchanging subnet reachability information among autonomous systems.

PBR routing policy configuration

Details Route-map configuration for filtering and modifying routing information, including BGP attributes and ACL-based routing.

VRF configuration

Explains VRF technology for isolating routing information belonging to different classes.

MultiWAN configuration

Covers MultiWAN technology for establishing fail-safe connections and balancing traffic between multiple providers.

MPLS technology management

LDP configuration

Describes LDP as a tag distribution protocol for finding neighbors and exchanging hello messages.

L2VPN Martini mode configuration

Describes L2VPN Martini mode for Ethernet frame transmission through MPLS, using LDP for label allocation.

L2VPN Kompella mode configuration

Explains L2VPN Kompella mode, using LDP for transport labels and BGP for pseudowire construction.

L3VPN configuration

Covers L3VPN service for combining distributed client IP networks and ensuring traffic transfer within a single VRF.

Security management

AAA configuration

Explains AAA for access provisioning and control, covering authentication, authorization, and accounting.

Command privilege configuration

Describes how to assign user privilege levels to command sets for controlling access.

Logging and network attacks protection configuration

Covers configuration algorithms for logging and protection against network attacks like ICMP flood and SYN flood.

Firewall configuration

Explains the firewall as a tool for controlling and filtering network packets based on defined rules.

Access list (ACL) configuration

Defines ACLs as lists containing rules for traffic transmission through interfaces.

IPS/IDS configuration

Explains IPS/IDS as a system for detecting and preventing intrusions and security breaches.

Content filtering service configuration

Describes the content filtering service for restricting access to HTTP sites based on content categories.

Antispam service configuration

Covers the Antispam service for detecting and filtering unwanted email messages.

Redundancy management

Remote access configuration

Service management

Monitoring

BRAS (Broadband Remote Access Server) management

VoIP management

Related product manuals