EasyManua.ls Logo

ELTEX ESR-200 User Manual

Default Icon
650 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image

ESR series service routers
ESR-10, ESR-12V, ESR-12VF, ESR-14VF, ESR-15V, ESR-20, ESR-21,
ESR-30, ESR-100, ESR-200, ESR-1000, ESR-1200, ESR-1500, ESR-1700,
ESR-1511, ESR-3100, ESR-3200
User manual
Firmware version1.18.1

Table of Contents

Other manuals for ELTEX ESR-200

Question and Answer IconNeed help?

Do you have a question about the ELTEX ESR-200 and is the answer not in the manual?

ELTEX ESR-200 Specifications

General IconGeneral
BrandELTEX
ModelESR-200
CategoryNetwork Router
LanguageEnglish

Summary

4 Management interfaces

4.1 Command line interface (CLI)

Details how to use the Command Line Interface (CLI) for device management, user authorization, and command categories.

5 Initial router configuration

5.2 Router connection and configuration

Covers connecting the ESR router and performing basic configuration tasks like IP addressing and security zones.

6 Firmware update

6.1 Updating firmware via system resources

Provides procedures for updating the router firmware using TFTP, FTP, or SCP servers.

7 Safe configuration recommendations

7.1 General recommendations

Offers general advice for improving safe operation, such as disabling unused interfaces and setting system clock.

7.3 Password usage policy configuration

Details configuration for password policies, including lifetime, length, character types, and default password changes.

7.5 Remote management configuration

Provides recommendations for secure remote management, including disabling Telnet and using crypto-resistant algorithms.

7.6 Configuration of protection against network attacks mechanisms

Details algorithms for configuring network attack protection, such as IP spoofing, TCP flags, and fragmented packets.

8 Interface management

8.1 VLAN Configuration

Explains VLAN concepts and provides algorithms for creating VLANs, setting interface modes, and configuring tagged/untagged frames.

9 Tunneling management

9.1 GRE tunnel configuration

Describes GRE tunnel configuration, including L3 interface setup and tunnel creation.

9.2 DMVPN configuration

Explains DMVPN technology for creating virtual private networks, enabling dynamic tunnels between hosts.

9.4 IPsec VPN configuration

Explains IPsec protocols for enabling security features like identity validation, integrity check, and encryption.

10 QoS management

10.1 Basic QoS

Covers basic QoS in ESR routers, focusing on classification and relabeling on the input interface.

10.2 Advanced QoS

Details advanced QoS modes, allowing traffic classification on both incoming and outgoing interfaces.

11 Routing management

11.2 Static routes configuration

Explains how to define static routes explicitly during router configuration for specific network paths.

11.5 BGP configuration

Explains BGP configuration for exchanging subnet reachability information among autonomous systems (AS).

11.7 PBR routing policy configuration

Explains PBR routing policy configuration using route-maps for filtering and modifying routing information.

11.8 VRF configuration

Describes VRF technology for isolating routing information belonging to different classes or clients.

12 MPLS technology management

12.1 LDP configuration

Explains LDP configuration for tag distribution and neighbor discovery, supporting various operation modes.

12.5 L2VPN Martini mode configuration

Describes L2VPN Martini mode for ethernet frames transmission through MPLS domain, using LDP for pseudowire negotiation.

12.7 L3VPN configuration

Explains L3VPN service for combining distributed client IP networks and ensuring traffic transfer within a single VRF.

13 Security management

13.1 AAA configuration

Details AAA (Authentication, Authorization, Accounting) for access provisioning and control, performed by login and password.

13.2 Command privilege configuration

Explains assigning baseline user privilege levels to command sets for controlling CLI access and functionality.

13.3 Logging and network attacks protection configuration

Covers configuration algorithms for logging system events and protecting against network attacks like land, SYN flood, and ICMP flood.

13.4 Firewall configuration

Describes firewall configuration for controlling and filtering transmitted network packets based on defined rules.

13.5 Access list (ACL) configuration

Explains Access Control Lists (ACLs) for defining traffic transmission rules through interfaces.

13.6 IPS/IDS configuration

Details IPS/IDS configuration for detecting intrusions, security breaches, and automatically protecting the network.

13.8 Content filtering service configuration

Explains content filtering service to restrict access to HTTP sites based on categories, using IPS user rules.

14 Redundancy management

14.1 VRRP configuration

Covers VRRP configuration for increased router availability, acting as a default gateway for network computers.

15 Remote access configuration

15.1 Configuring server for remote access to corporate network via PPTP protocol

Explains PPTP server configuration for establishing secure connections via a tunnel for remote access.

15.2 Configuring server for remote access to corporate network via L2TP protocol

Details L2TP server configuration for supporting virtual private networks and secure tunneling.

15.3 Configuring server for remote access to corporate network via OpenVPN protocol

Covers OpenVPN server configuration for implementing Virtual Private Networks (VPN) and remote access.

16 Service management

16.1 DHCP server configuration

Covers configuring LAN device network settings using the integrated DHCP server.

16.2 Destination NAT configuration

Explains Destination NAT (DNAT) for translating destination IP addresses for packets transferred through the network gateway.

16.3 Source NAT configuration

Details Source NAT (SNAT) function for substituting source addresses for packets transferred through the network gateway.

19 VoIP management

19.1 SIP profile configuration algorithm

Details the SIP profile configuration algorithm for setting up VoIP services, including proxy and registration servers.

Related product manuals