EasyManua.ls Logo

ELTEX ESR-15V User Manual

Default Icon
650 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image

ESR series service routers
ESR-10, ESR-12V, ESR-12VF, ESR-14VF, ESR-15V, ESR-20, ESR-21,
ESR-30, ESR-100, ESR-200, ESR-1000, ESR-1200, ESR-1500, ESR-1700,
ESR-1511, ESR-3100, ESR-3200
User manual
Firmware version1.18.1

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the ELTEX ESR-15V and is the answer not in the manual?

ELTEX ESR-15V Specifications

General IconGeneral
Ethernet Ports5
VLAN SupportYes
QoSYes
Device TypeRouter
LAN Ports4
Wireless Standard802.11b/g/n
Wireless Frequency Bands2.4 GHz
VPNIPsec, PPTP, L2TP
Weight0.3 kg
Operating Temperature0°C to 40°C
Power Supply12V, 1A

Summary

1 Introduction

1.1 Abstract

Provides a brief overview of the ESR series service routers and the manual's scope.

1.2 Target Audience

Identifies the intended audience as technical personnel familiar with TCP/IP and Ethernet concepts.

1.3 Symbols

Explains the designation and meaning of symbols used in the manual.

1.4 Notes and warnings

Details important notes, tips, recommendations, and warnings for device operation and setup.

2 Product description

2.1 Purpose

Describes the ESR series service routers as high-performance multipurpose network routers.

2.2 Functions

Details the various functions of the device, including interface, MAC table, OSI layer functions, and tunneling.

2.3 Main specifications

Lists the key technical specifications of the ESR routers, including interfaces and performance metrics.

2.4 Design

Describes the physical design of the device, including front, rear, and side panels, connectors, and controls.

2.5 Delivery package

Lists the standard items included in the delivery package for various ESR models.

3 Installation and connection

3.1 Support brackets mounting

Provides instructions for installing support brackets for rack mounting.

3.2 Device rack installation

Details the procedure for installing the device into a standard rack.

3.3 ESR-1000, ESR-1200, ESR-1500, ESR-1511, ESR-1700, ESR-3100, ESR-3200 power module installation

Explains how to install power modules in specific ESR router models.

3.4 Connection to Power Supply

Guides on how to safely connect the device to the power supply, including earthing requirements.

3.5 SFP transceiver installation and removal

Provides instructions for installing and removing SFP transceivers.

4 Management interfaces

4.1 Command line interface (CLI)

Describes the CLI as the primary interface for device management, authorization, and command categories.

4.2 Types and naming procedure of router interfaces

Explains the naming system for various network interfaces, including physical, sub-interfaces, and channel aggregation groups.

4.3 Types and naming procedure of router tunnels

Details the naming conventions for different types of network tunnels used for VPN and traffic tunneling.

5 Initial router configuration

5.1 ESR router factory configuration

Explains the essential basic settings installed by factory configuration, including security zones and default access.

5.2 Router connection and configuration

Covers basic router configuration steps like assigning IP addresses, creating security zones, and configuring services.

6 Firmware update

6.1 Updating firmware via system resources

Provides a procedure for updating the firmware using TFTP, FTP, or SCP servers.

6.2 Updating firmware via bootloader

Explains how to update router firmware using the bootloader, involving TFTP server configuration.

6.3 Secondary bootloader update (U-Boot)

Details the process for updating the secondary bootloader (U-Boot) using a new file saved to flash.

7 Safe configuration recommendations

7.1 General recommendations

Offers general advice for safe operation, such as disabling unused interfaces and setting system clocks.

7.2 Event logging system configuration

Describes algorithms for event logging, including message storage and transmission to external servers.

7.3 Password usage policy configuration

Covers configuration algorithms for password policies, including lifetime, length, and character type requirements.

7.4 AAA policy configuration

Details algorithms for AAA policy, including RADIUS, TACACS, LDAP authentication, and logging.

7.5 Remote management configuration

Recommends disabling Telnet, using crypto-resistant algorithms, and allowing access only from specific IP addresses.

7.6 Configuration of protection against network attacks mechanisms

Covers configuration algorithms for protecting against network attacks like IP spoofing and SYN flood.

8 Interface management

8.1 VLAN Configuration

Explains VLAN configuration, including creating VLANs, setting operation modes, and managing tagged/untagged frames.

8.2 LLDP configuration

Details Link Layer Discovery Protocol (LLDP) configuration for network equipment notification and parameter transmission.

8.3 LLDP MED configuration

Describes LLDP MED configuration for transmitting network policies like VLAN ID, DSCP, and priority.

8.4 Sub-interface termination configuration

Explains how to terminate Ethernet frames of a VLAN on a specific physical interface by creating a sub-interface.

8.5 Q-in-Q termination configuration

Covers Q-in-Q technology for extending VLAN quantity by using two 802.1q tags (Inner and Outer).

8.6 USB modems configuration

Explains how to configure USB modems for organizing additional link channels for router operation.

8.7 STP/RSTP configuration

Details Spanning Tree Protocol (STP) and Rapid STP (RSTP) configuration to prevent network loops.

8.8 PPP through E1 configuration

Explains PPP connection establishment through E1 stream using TOPGATE-WAN-E1 media converter.

8.9 MLPPP Configuration

Describes Multilink PPP (MLPPP) for traffic transition via multiple physical channels, enabling bandwidth enhancement and load balancing.

8.10 Bridge configuration

Explains bridge configuration for connecting Ethernet segments on data-link level without higher-level protocols.

8.11 Dual-Homing configuration

Covers Dual-Homing technology for creating secure connections based on redundant links to prevent failures.

8.12 Mirroring configuration (SPAN/RSPAN)

Details traffic mirroring features for redirecting traffic from a specific port to another port or a remote device.

8.13 LACP configuration

Explains LACP for link aggregation, allowing multiple physical links to be combined into a single logical link.

8.14 AUX configuration

Describes AUX configuration for specifying parameters to interact with external devices connected via serial interfaces.

9 Tunneling management

9.1 GRE tunnel configuration

Explains GRE tunneling protocol for encapsulating OSI model network layer packets into IP packets.

9.2 DMVPN configuration

Details DMVPN technology for creating virtual private networks with dynamic tunnels between hosts.

9.3 L2TPv3 tunnel configuration

Describes L2TPv3 protocol for tunneling 2nd level OSI model packets between two IP nodes.

9.4 IPsec VPN configuration

Explains IPsec protocols for enabling security features for data transferred via IP protocol.

9.5 LT tunnels configuration

Covers LT tunnels for transmission of routing information and traffic between different VRFs.

10 QoS management

10.1 Basic QoS

Explains basic QoS on ESR routers, focusing on classification and relabeling on the input.

10.2 Advanced QoS

Details advanced QoS mode allowing traffic classification on both incoming and outgoing interfaces.

11 Routing management

11.1 Routing information advertising policy

Describes routing information advertising policies for RIP, OSPF, IS-IS, iBPG, and eBPG protocols.

11.2 Static routes configuration

Explains how to add static routes by using commands in global configuration mode.

11.3 RIP configuration

Details RIP configuration, including precedence, routing table capacity, and prefix lists.

11.4 OSFP configuration

Explains OSPF configuration, including precedence, routing tables capacity, and neighbor state information.

11.5 BGP configuration

Covers BGP configuration, including precedence, routing table capacity, and neighbor state information.

11.6 BFD configuration

Explains Bidirectional Forwarding Detection (BFD) protocol operation and configuration.

11.7 PBR routing policy configuration

Describes route-map configuration for filtering and modifying routing information exchanged with neighbors.

11.8 VRF configuration

Explains VRF technology for isolating routing information belonging to different classes.

11.9 MultiWAN configuration

Details MultiWAN technology for establishing fail-safe connections with redundant links and traffic balancing.

11.10 IS-IS configuration

Describes IS-IS protocol configuration, a link-state routing protocol based on Dijkstra Algorithm.

12 MPLS technology management

12.1 LDP configuration

Explains LDP configuration, a tag distribution protocol for finding neighbors and establishing sessions.

12.2 Configuring session parameters in LDP

Details configuration of Hello holdtime, Hello interval, and Keepalive holdtime parameters for LDP sessions.

12.3 Configuring session parameters in targeted-LDP

Explains configuration of session parameters specifically for targeted-LDP.

12.4 LDP tag filtering configuration

Covers LDP tag filtering configuration for allocating MPLS tags to specific FECs.

12.5 L2VPN Martini mode configuration

Describes L2VPN Martini mode configuration, where operation is done by LDP and pseudowire construction is entrusted to BGP.

12.6 L2VPN Kompella mode configuration

Explains L2VPN Kompella mode configuration, where LDP operates with transport labels and pseudowire construction is entrusted to BGP.

12.7 L3VPN configuration

Covers L3VPN service for combining distributed client IP networks and ensuring traffic transfer within a single VRF.

12.8 MPLS traffic balancing

Details MPLS traffic balancing using the load balancer daemon (lbd).

12.9 Operation with the bridge domain within MPLS

Explains how to organize L2VPN service by configuring a bridge domain and creating necessary AC and PW elements.

12.10 Assignment of MTU when operating with MPLS

Emphasizes the importance of correctly configuring the MTU parameter on interfaces for MPLS traffic transmission.

12.11 Inter-AS Option A

Provides configuration examples for L3VPN and L2VPN services based on Inter-AS Option A.

12.12 Inter-AS Option B

Explains Inter-AS Option B configuration, which involves MPLS label assignment without VRF.

12.13 MPLS over GRE

Provides an example of configuring VPN services built through a GRE tunnel.

13 Security management

13.1 AAA configuration

Covers AAA configuration for access provisioning and control, including authentication, authorization, and accounting.

13.2 Command privilege configuration

Explains how to assign user privilege levels to command sets for controlling access to device functions.

13.3 Logging and network attacks protection configuration

Details configuration of logging and protection mechanisms against network attacks like land, SYN flood, and ICMP flood.

13.4 Firewall configuration

Describes firewall configuration as a tool for controlling and filtering network packets based on defined rules.

13.5 Access list (ACL) configuration

Explains Access Control Lists (ACLs) for defining rules that control traffic transmission through interfaces.

13.6 IPS/IDS configuration

Covers IPS/IDS configuration for detecting intrusions, security breaches, and automatically protecting against them.

13.7 Eltex Distribution Manager interaction configuration

Details the interaction configuration with EDM Server for distributing licensed content.

13.8 Content filtering service configuration

Explains content filtering service for restricting access to HTTP sites based on their content categories.

13.9 Antispam service configuration

Covers Antispam service configuration for detecting and filtering unwanted email messages.

14 Redundancy management

14.1 VRRP configuration

Explains VRRP configuration for increased router availability and acting as a default gateway.

14.2 Tracking configuration

Describes the tracking mechanism that activates entities based on VRRP/SLA state.

14.3 Firewall/NAT failover configuration

Details firewall failover configuration for reserving firewall sessions.

14.4 DHCP failover configuration

Explains DHCP failover configuration to reserve a database of IP addresses issued by the DHCP server.

15 Remote access configuration

15.1 Configuring server for remote access to corporate network via PPTP protocol

Guides on configuring a PPTP server for secure remote access to a corporate network.

15.2 Configuring server for remote access to corporate network via L2TP protocol

Details configuring an L2TP server for secure remote access to a corporate network.

15.3 Configuring server for remote access to corporate network via OpenVPN protocol

Explains OpenVPN server configuration for secure remote access and various tasks related to data transmission security.

15.4 Configuring remote access client via PPPoE

Covers PPPoE client configuration for establishing virtual connections using PPP over Ethernet.

15.5 Configuring remote access client via PPTP

Provides instructions for configuring a PPTP client for remote access.

15.6 Configuring remote access client via L2TP

Details L2TP client configuration for establishing virtual private networks.

16 Service management

16.1 DHCP server configuration

Explains how to configure LAN device network settings using the integrated DHCP server.

16.2 Destination NAT configuration

Details Destination NAT (DNAT) function for translating destination IP addresses for packets.

16.3 Source NAT configuration

Covers Source NAT (SNAT) function for substituting source addresses for packets transferred through the network gateway.

16.4 Static NAT configuration

Explains static NAT for unique address matching and translation of addresses.

16.5 HTTP/HTTPS traffic proxying

Details HTTP/HTTPS traffic proxying for URL filtering and content access control.

16.6 NTP configuration

Explains NTP configuration for synchronizing internal clock using IP networks and UDP protocol.

17 Monitoring

17.1 Netflow configuration

Describes Netflow protocol for traffic accounting and analysis, transmitting traffic information to a collector.

17.2 sFlow configuration

Details sFlow configuration, a standard for traffic accounting and analysis in computer and network devices.

17.3 SNMP configuration

Explains SNMP configuration for device management in IP networks featuring TCP/UDP architecture.

17.4 Zabbix-agent/proxy configuration

Covers Zabbix-agent/proxy configuration for monitoring devices and executing remote commands.

17.5 Syslog configuration

Details Syslog configuration for sending and registering system messages about events.

17.6 Integrity check

Explains how to check the integrity of stored executable files.

17.7 Router configuration file archiving

Describes the option of local and/or remote configuration file copying by timer or upon configuration change.

18 BRAS (Broadband Remote Access Server) management

18.1 Configuration algorithm

Provides the configuration algorithm for BRAS management, including RADIUS and DAS server setup.

18.2 Example of configuration with SoftWLC

Gives an example of BRAS configuration with SoftWLC for providing Internet access to authorized users.

18.3 Example of configuration without SoftWLC

Provides an example of BRAS configuration without SoftWLC support.

19 VoIP management

19.1 SIP profile configuration algorithm

Details SIP profile configuration for connecting analogue telephones and fax modems to IP networks.

19.2 FXS/FXO ports configuration algorithm

Explains FXS/FXO ports configuration for connecting telephones and fax modems.

19.3 Dial plan configuration algorithm

Covers dial plan configuration for managing call routing to local numbers and through SIP proxy.

19.4 PBX server configuration algorithm

Details PBX server configuration, including creating routing plans and SIP profiles.

19.5 Registration trunk creation algorithm

Explains the algorithm for creating registration trunks for PBX server.

19.6 VoIP configuration example

Provides an example of VoIP configuration for FXS ports registration on an external SIP server.

19.7 Dial plan configuration example

Illustrates dial plan configuration with regular expressions for call routing.

19.8 FXO port configuration

Details FXO port configuration for making calls to PSTN subscribers.

19.9 Example of VoIP configuration for FXS ports registration on external SIP server

Provides an example of VoIP configuration for FXS ports registration on an external SIP server.

19.10 Example of VoIP configuration on internal PBX server

Details VoIP configuration for internal PBX server, including registration and call transfer.

20 Frequently asked questions

Receiving of routes, which are configured in VRF via BGP or/and OSPF, failed.

Addresses issues with receiving routes in VRF via BGP or OSPF, despite successful adjacency establishment.

SSH/Telnet sessions, which go through ESR router, are closing.

Provides solutions for SSH/Telnet sessions closing, often related to keepalive packet configuration.

LACP does not launch on XG ports of ESR-1000/1200/1500/1700

Addresses issues with LACP not launching on specific XG ports for certain ESR models.

How to clear ESR configuration completely and reset it to factory default?

Explains the procedure to completely clear ESR configuration and reset it to factory default settings.

TECHNICAL SUPPORT

For technical assistance in issues related to handling Eltex Ltd. equipment, please, address to Service Center of the company:

Provides contact information for the Eltex Ltd. Service Center for technical assistance.

Related product manuals