Do you have a question about the ELTEX ESR-1511 and is the answer not in the manual?
Device Type | Router |
---|---|
WAN Ports | 1 |
LAN Ports | 4 |
Dimensions | 190 x 130 x 30 mm |
Power Supply | 5V 1A |
Flash Memory | 16 MB |
Console Port | No |
Operating Temperature | 0°C to +40°C |
Weight | 0.25 kg |
Firewall | Yes |
QoS | Yes |
Ethernet Ports | 4 |
USB Ports | 1 |
Ports | 5 (1 WAN + 4 LAN) |
VPN Support | PPTP, L2TP |
Storage Temperature | -20°C to 70°C |
Humidity | 10% to 90% (non-condensing) |
Lists the primary hardware specifications of various ESR router models, including interfaces and ports.
Instructions for installing support brackets on the device for rack mounting.
Steps for installing the device into a standard rack, ensuring proper alignment and security.
Procedure for installing power modules in supported ESR router models, including main and reserve slots.
Guidelines for safely connecting the device to AC or DC power supply, including earthing requirements.
Details on using the Command Line Interface for device management, authorization, and command categories.
Describes essential basic settings installed from the factory, allowing gateway use with SNAT.
Details the two security zones ('Trusted' and 'Untrusted') and interface division for network connection.
Covers connecting the ESR series router to public data networks and basic router configuration.
Options for connecting to the device, including Ethernet LAN and RS-232 console port.
Explains how changes made in the configuration take effect after applying commands and the rollback mechanism.
Outlines the initial steps for router configuration, including password change, user creation, and network parameters.
Procedure for updating firmware on a running operating system using TFTP, FTP, or SCP servers.
Steps for updating router firmware via the bootloader, including TFTP server address and file name.
Process for updating the secondary bootloader (U-Boot) to the flash.
General advice for safe operation, including disabling unused interfaces, setting system clock, and firewall configuration.
Describes algorithms for configuring event logging, including message storage, rotation, and transmission to an external server.
Details on configuring password policies, including change requests, lifetime, length, and character type requirements.
Explains AAA policy configuration, including recommendations for role-based access and personal accounts.
Recommendations for secure remote access, including disabling Telnet, using crypto-resistant algorithms, and limiting access by IP address.
Recommendations for configuring protection against various network attacks, including IP spoofing and TCP flag anomalies.
Steps for configuring basic QoS, including enabling QoS, setting trust mode, and mapping DSCP/CoS values.
Steps for advanced QoS configuration, including creating access lists, class maps, and policy maps.
Covers AAA configuration for access provisioning and control, including Authentication, Authorization, and Accounting.
Steps for configuring local user authentication methods and privilege elevation.
Details on configuring AAA authentication using RADIUS servers, including connection and key settings.
Explains AAA configuration using TACACS servers for authentication and accounting.
Provides steps for configuring AAA authentication using LDAP servers, including base DN and search scope.
Describes how to assign user privilege levels to command sets for fine-grained access control.
Details configuration for logging system events and protecting against network attacks like ICMP flood and SYN flood.
Explains the functionality and configuration of the firewall for controlling and filtering network packets.
Steps for configuring firewall operation modes, session lifetimes, and security zones.
Steps for creating ACLs, defining rules, actions, and matching criteria.
Details IPS/IDS configuration for detecting and preventing intrusions and security breaches using signature-based analysis.
Steps for creating a basic IPS/IDS security policy and assigning it to interfaces.
Procedure for configuring automatic updates for IPS/IDS rules from external sources.
Steps for basic content filtering configuration, including DNS server setup and IPS/IDS policy creation.
Steps for basic Antispam service configuration, including network name, domain, and DNS settings.
Explains VRRP configuration for increased router availability, acting as a default gateway.
Steps for configuring VRRP on interfaces, including virtual IP, router ID, priority, and group settings.
Details firewall and NAT failover configuration for reserving firewall sessions.
Steps for configuring firewall failover modes, source/destination addresses, and VRRP group binding.
Explains DHCP failover configuration for reserving IP addresses issued by the DHCP server.
Steps for configuring DHCP failover modes, local/remote addresses, and VRRP group binding.
Steps for creating a PPTP server profile, including remote gateway, user authentication, and security zone settings.
Steps for creating an L2TP server profile, specifying IP addresses, authentication, and security settings.
Steps for configuring OpenVPN server, including certificates, encryption, and user authentication.
Steps for creating a PPPoE tunnel, specifying user credentials, and interface settings.
Steps for creating a PPTP tunnel, specifying remote gateway, user authentication, and security zone.
Steps for creating an L2TP tunnel, specifying user credentials, authentication, and security settings.
Covers configuring LAN device network settings using the integrated DHCP server.
Steps for enabling DHCP server, setting DSCP values, and configuring IP address pools.
Steps for configuring DNAT, including creating pools, rulesets, and specifying actions.