EasyManuals Logo

ELTEX ESR-3100 User Manual

Default Icon
650 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #18 background imageLoading...
Page #18 background image
ESR series service routers.ESR-Series. User manual
18
2.2.5 Traffic tunneling functions
Table 5 – Traffic tunneling functions
Tunnelingprotocols Tunneling is a method of packet conversion during their network transfer that
involves the replacement, modification and addition of a new packet network
header. This method may be used for negotiation of transport protocols when the
data is transferred through the transit network as well as for creation of secured
connections where tunneled data is being encrypted.
Routers support the following types of tunnels:
GRE – IP packet/Ethernet frame is encapsulated into another IP packet with
GRE (General Routing Encapsulation) header;
IPv4-IPv4 – tunnel that encapsulates source IP packets into IP packets with
alternative network parameters;
L2TPv3 – tunnel for L2 traffic transmission using IP packets;
IPsec – tunnel with the encryption of transmitted data;
L2TP, PPTP, PPPoE, OpenVPN – tunnels used for establishing a remote
'client-sever' access.
2.2.6 Management and configuration functions
Table 6 – Basic management and configuration functions
Configuration file download and upload Device parameters are saved into the configuration file that contains
configuration data for the specific device ports as well as for the
whole system. The following protocols may be used for file transfers:
TFTP, FTP, and SCP.
Command line interface (CLI) CLI management is performed locally via serial port RS-232, or
remotely via Telnet, SSH. Console command line interface (CLI) is the
industrial standard. CLI interpreter contains the list of commands and
keywords that will help the user and reduce the amount of input data.
Syslog Syslog protocol is designed for transmission of system event
messages and event logging.
Ping, traceroute
network utilities
Ping and traceroute utilities allow you to check the availability of
network devices and identify data transfer routes in IP networks.
Controlled access management – privilege
levels
Routers support system access level management for users. Access
levels enable responsibility areas management for device
administrators. Access levels are numbered from 1 to 15; Level 15
stands for full access to device management features.
Authentication Authentication is a user identity check procedure. Routers support the
following authentication methods:
local – local user database stored on the device is used for
authentication;
group – user database is located on the authentication server.
RADIUS and TACACS protocols are user for server interactions.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the ELTEX ESR-3100 and is the answer not in the manual?

ELTEX ESR-3100 Specifications

General IconGeneral
BrandELTEX
ModelESR-3100
CategoryNetwork Router
LanguageEnglish

Related product manuals