EasyManuals Logo

ELTEX ESR Series User Manual

ELTEX ESR Series
575 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #91 background imageLoading...
Page #91 background image
ESR-Series. User manual
91
7 Safe configuration recommendations
General recommendations
Event logging system configuration
Recommendations
Warnings
Configuration example
Password usage policy configuration
Recommendations
Configuration example
AAA policy configuration
Recommendations
Warnings
Configuration example
Remote management configuration
Recommendations
Configuration example
Configuration of protection against network attacks mechanisms
Recommendations
Configuration example
The safe configuration recommendations are general and suitable for most installations. These
recommendations greatly improve the safe operation of the unit, but are not exhaustive. Depending on the
application of the device, other safety parameters must also be configured. In some specific cases, the
implementation of these recommendations may result in a non-functional network. When configuring the
device, firstly it is necessary to follow the technical requirements and regulations of the networks in which the
device will be used.
7.1 General recommendations
It is recommended to always disable unused physical interfaces with the shutdown The command is
described in detail in the Interface monitoring and configuration section of the CLI Command Reference.
It is recommended to always set the system clock to synchronize with trusted network time sources
(NTP). The NTP setup algorithm is described in the NTP configuration section of this manual. For
detailed information on the NTP configuration commands, see System timer management in the CLI
Command Reference.
It is recommended to disable the NTP broadcast client, which is enabled by default in the factory
configuration.
It is not recommended to use the ip firewall disable command that disables firewalling. Always assign
appropriate security zones to interfaces and configure the correct firewall rules. The firewall
configuration algorithm is described in the Firewall configuration section of this manual. For detailed
information on the Firewall configuration commands, see Firewall management in the CLI Command
Reference.
7.2 Event logging system configuration
Event logging system configuration algorithms are described in the «Syslog configuration» subsection of the
Monitoring section of this manual.
For detailed information on the Event logging system configuration commands, see SYSLOG management
section in the CLI Command Reference.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the ELTEX ESR Series and is the answer not in the manual?

ELTEX ESR Series Specifications

General IconGeneral
ModelESR Series
CategoryNetwork Router
ManufacturerELTEX
ManagementWeb interface, CLI, SNMP
Operating Temperature0°C to 40°C
DimensionsVaries by model
WeightVaries by model
Routing ProtocolsOSPF, BGP
WAN InterfacesEthernet, SFP
LAN InterfacesEthernet, SFP
VPN SupportIPsec, L2TP, PPTP
FirewallStateful packet inspection, ACLs
Power over Ethernet (PoE)Available on some models
QoSTraffic prioritization

Related product manuals