EasyManua.ls Logo

ELTEX ESR Series User Manual

ELTEX ESR Series
575 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image

ESR series service routers
ESR-10, ESR-12V, ESR-12VF, ESR-14VF, ESR-20,
ESR-21, ESR-100, ESR-200, ESR-1000, ESR-1200,
ESR-1500, ESR-1511, ESR-3100, ESR-1700
User manual (29.06.2021)
Firmware version1.13.0

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the ELTEX ESR Series and is the answer not in the manual?

ELTEX ESR Series Specifications

General IconGeneral
ModelESR Series
CategoryNetwork Router
ManufacturerELTEX
ManagementWeb interface, CLI, SNMP
Operating Temperature0°C to 40°C
DimensionsVaries by model
WeightVaries by model
Routing ProtocolsOSPF, BGP
WAN InterfacesEthernet, SFP
LAN InterfacesEthernet, SFP
VPN SupportIPsec, L2TP, PPTP
FirewallStateful packet inspection, ACLs
Power over Ethernet (PoE)Available on some models
QoSTraffic prioritization

Summary

4 Management interfaces

4.1 Command line interface (CLI)

Explains the Command Line Interface for device management, including access methods and security.

5 Initial router configuration

5.1 ESR router factory settings

Information on essential basic settings installed with the factory configuration for immediate use.

5.2 Router connection and configuration

Covers basic router configuration, including IP addresses, security zones, and services like NAT and Firewall.

6 Firmware update

6.1 Updating firmware via system resources

Procedure for updating firmware using TFTP, FTP, or SCP servers.

6.2 Updating firmware via bootloader

Instructions for updating router firmware via the bootloader, including TFTP server configuration.

7 Safe configuration recommendations

7.1 General recommendations

General recommendations for safe installation, including disabling unused interfaces and setting system clock.

7.3 Password usage policy configuration

Configuration algorithms for password policy, including length, complexity, and history.

7.4 AAA policy configuration

Configuration algorithms for AAA policy, including RADIUS, TACACS, and LDAP authentication.

7.5 Remote management configuration

Recommendations and examples for secure remote management configuration.

7.6 Configuration of protection against network attacks mechanisms

Algorithms and recommendations for configuring network attack protection mechanisms.

8 Interface management

8.1 VLAN Configuration

Details on configuring VLANs, including algorithms and examples for tagged and untagged modes.

8.2 LLDP configuration

Explains LLDP configuration for network equipment discovery and parameter exchange.

9 Tunneling management

9.1 GRE tunnel configuration

Details GRE tunnel configuration, including algorithms and IP-GRE tunnel examples.

9.2 DMVPN configuration

Explains DMVPN configuration for creating virtual private networks with dynamic tunnels.

9.3 L2TPv3 tunnel configuration

Provides configuration algorithms and examples for L2TPv3 tunnels for Layer 2 OSI packets.

9.4 IPsec VPN configuration

Covers IPsec VPN configuration, including route-based, policy-based, and remote access methods.

10 QoS management

10.1 Basic QoS

Configuration for basic QoS, focusing on traffic classification and relabeling on input.

11 Routing management

11.1 Routing information advertising policy

Describes policies for advertising routing information via RIP, OSPF, IS-IS, iBPG, and eBPG protocols.

11.2 Static routes configuration

Explains static routing configuration without dynamic routing protocols.

11.5 BGP configuration

Explains BGP configuration for subnet reachability information exchange among autonomous systems.

12 MPLS technology management

12.1 LDP configuration

Details LDP configuration, including algorithms and examples for peer communication.

12.7 L3VPN configuration

Details L3VPN service configuration for combining distributed client IP networks within a single VRF.

13 Security management

13.1 AAA configuration

Covers AAA (Authentication, Authorization, Accounting) for access provisioning and control.

13.3 Configuration of logging and protection against network attacks

Provides algorithms for configuring logging and protection against various network attacks.

13.4 Firewall configuration

Explains firewall configuration for controlling and filtering network packets based on defined rules.

13.5 Access list (ACL) configuration

Details Access Control List (ACL) configuration for defining traffic transmission rules.

13.6 IPS/IDS configuration

Covers IPS/IDS configuration, including base setup, rule updates, and user rule creation.

14 Redundancy management

14.1 VRRP configuration

Covers VRRP configuration for increased router availability and default gateway redundancy.

15 Remote access configuration

15.1 Configuring server for remote access to corporate network via PPTP protocol

Details PPTP server configuration for establishing secure VPN tunnels over unsecured networks.

15.2 Configuring server for remote access to corporate network via L2TP protocol

Explains L2TP server configuration for establishing virtual private networks and data security.

15.3 Configuring server for remote access to corporate network via OpenVPN protocol

Covers OpenVPN server configuration for secure remote access and data transmission.

16 Service management

16.1 DHCP server configuration

Covers integrated DHCP server configuration for LAN device network settings.

16.2 Destination NAT configuration

Explains Destination NAT (DNAT) for translating destination IP addresses for public network access.

18 BRAS (Broadband Remote Access Server) management

19 VoIP management

Related product manuals