EasyManua.ls Logo

ELTEX ESR-21 User Manual

Default Icon
650 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image

ESR series service routers
ESR-10, ESR-12V, ESR-12VF, ESR-14VF, ESR-15V, ESR-20, ESR-21,
ESR-30, ESR-100, ESR-200, ESR-1000, ESR-1200, ESR-1500, ESR-1700,
ESR-1511, ESR-3100, ESR-3200
User manual
Firmware version1.18.1

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the ELTEX ESR-21 and is the answer not in the manual?

ELTEX ESR-21 Specifications

General IconGeneral
BrandELTEX
ModelESR-21
CategoryNetwork Router
LanguageEnglish

Summary

1 Introduction

2 Product description

2.3 Main specifications

Lists the key technical specifications for different ESR router models, including interfaces and ports.

4 Management interfaces

4.1 Command line interface (CLI)

Explains the functionality and security aspects of the Command Line Interface for device management.

5 Initial router configuration

5.2 Router connection and configuration

Explains the process of connecting ESR routers and performing basic configuration, including interface setup and security zones.

6 Firmware update

6.1 Updating firmware via system resources

Provides a step-by-step procedure for updating the device's operating system firmware using servers like TFTP, FTP, SCP, and SFTP.

6.2 Updating firmware via bootloader

Details the process of updating router firmware using the bootloader, including specifying TFTP server and firmware file names.

7 Safe configuration recommendations

7.6 Configuration of protection against network attacks mechanisms

Describes algorithms and examples for configuring protection against various network attacks like IP spoofing and SYN floods.

8 Interface management

8.1 VLAN Configuration

Details the configuration algorithm and examples for VLAN setup, including tagged and untagged modes.

9 Tunneling management

9.1 GRE tunnel configuration

Explains GRE tunnel configuration algorithms and provides an example of IP-GRE tunnel setup.

9.2 DMVPN configuration

Details DMVPN configuration algorithms and provides examples for HUB and Spoke setups.

9.3 L2TPv3 tunnel configuration

Explains L2TPv3 tunnel configuration algorithms and provides an example.

9.4 IPsec VPN configuration

Describes IPsec VPN configuration algorithms and provides examples for route-based, policy-based, and remote access VPNs.

10 QoS management

10.1 Basic QoS

Explains basic QoS configuration, including classification and relabeling on the input interface.

10.2 Advanced QoS

Details advanced QoS configuration, allowing classification on both incoming and outgoing interfaces.

11 Routing management

11.2 Static routes configuration

Explains how to add static routes for IPv4 and IPv6, including options like blackhole and unreachable.

11.4 OSFP configuration

Explains OSPF configuration algorithms and provides examples for various scenarios like stub areas and virtual links.

11.5 BGP configuration

Describes BGP configuration algorithms, including precedence, route-map, and neighbor settings.

11.8 VRF configuration

Explains VRF configuration algorithms and provides an example for isolating routing information.

12 MPLS technology management

12.1 LDP configuration

Explains LDP configuration algorithms, including global and neighbor session parameters, and provides an example.

12.5 L2VPN Martini mode configuration

Details L2VPN Martini mode configuration, covering VPWS and VPLS scenarios.

12.7 L3VPN configuration

Explains L3VPN configuration for combining client IP networks and ensuring traffic transfer within a single VRF.

13 Security management

13.1 AAA configuration

Describes AAA configuration algorithms for local, RADIUS, TACACS, and LDAP authentication methods.

13.3 Logging and network attacks protection configuration

Details configuration algorithms for logging system events and protecting against various network attacks.

13.4 Firewall configuration

Describes firewall configuration algorithms, rules, and application filtering (DPI).

13.5 Access list (ACL) configuration

Explains Access Control List configuration algorithms and provides examples for traffic filtering.

13.6 IPS/IDS configuration

Details IPS/IDS configuration algorithms, rule autoupdate, and basic user rule management.

13.8 Content filtering service configuration

Explains content filtering service configuration, including creating profiles and blocking access to specific categories.

13.9 Antispam service configuration

Details Antispam service configuration for detecting and filtering unwanted email messages.

14 Redundancy management

14.1 VRRP configuration

Describes VRRP configuration algorithms and examples for establishing virtual gateways and redundancy.

14.3 Firewall/NAT failover configuration

Details configuration algorithms and examples for firewall and NAT session failover.

14.4 DHCP failover configuration

Explains DHCP failover configuration for IP address database reservation and redundancy.

15 Remote access configuration

15.1 Configuring server for remote access to corporate network via PPTP protocol

Describes PPTP server configuration for establishing secure connections to corporate networks.

15.2 Configuring server for remote access to corporate network via L2TP protocol

Details L2TP server configuration for supporting virtual private networks.

15.3 Configuring server for remote access to corporate network via OpenVPN protocol

Explains OpenVPN server configuration for secure remote access and data transmission.

15.4 Configuring remote access client via PPPoE

Details PPPoE client configuration for establishing virtual connections.

16 Service management

17 Monitoring

18 BRAS (Broadband Remote Access Server) management

19 VoIP management

Related product manuals