TP-Link TL-ER6120 SafeStream manuel d'utilisation
- Voir en ligne ou télécharger le manuel d’utilisation
- 167 pages
- N/A
Aller à la page of
Les manuels d’utilisation similaires
-
Router
TP-Link TD-8840B
62 pages -
Router
TP-LINK Touch P5 AC1900
115 pages 13.07 mb -
Router
TP-LINK Deco P9
1 pages 3.06 mb -
Router
TP-LINK Archer MR400
93 pages 7.3 mb -
Router
TP-Link Archer C8
143 pages -
Router
TP-LINK TL-WR945N
110 pages 5.66 mb -
Router
TP-LINK Archer MR600
1 pages 12.13 mb -
Router
TP-Link 54Mbps Wireless Router
72 pages
Un bon manuel d’utilisation
Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation TP-Link TL-ER6120 SafeStream. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel TP-Link TL-ER6120 SafeStream ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.
Qu'est ce que le manuel d’utilisation?
Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation TP-Link TL-ER6120 SafeStream décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.
Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.
Donc, ce qui devrait contenir le manuel parfait?
Tout d'abord, le manuel d’utilisation TP-Link TL-ER6120 SafeStream devrait contenir:
- informations sur les caractéristiques techniques du dispositif TP-Link TL-ER6120 SafeStream
- nom du fabricant et année de fabrication TP-Link TL-ER6120 SafeStream
- instructions d'utilisation, de réglage et d’entretien de l'équipement TP-Link TL-ER6120 SafeStream
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes
Pourquoi nous ne lisons pas les manuels d’utilisation?
Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage TP-Link TL-ER6120 SafeStream ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles TP-Link TL-ER6120 SafeStream et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service TP-Link en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées TP-Link TL-ER6120 SafeStream, comme c’est le cas pour la version papier.
Pourquoi lire le manuel d’utilisation?
Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif TP-Link TL-ER6120 SafeStream, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.
Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation TP-Link TL-ER6120 SafeStream. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.
Table des matières du manuel d’utilisation
-
Page 1
TL-ER6120 Gigabit Dual-WAN VPN Router Rev: 1.0.1 1910010558[...]
-
Page 2
-I- COPYRIGHT & TRADEMARKS Specifications are subjec t to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., L TD. Other brands and product names are trademarks of their respective holders. No part of the specificat ions may be reproduced in any form or by any means or used to make any derivative such as translation, [...]
-
Page 3
-II- CONTENTS Package Contents .................................................................................................................. 1 Chapter 1 About this Guide ................................................................................................... 2 1.1 Intended Re aders ...................................................[...]
-
Page 4
-III- 3.3.3 Session Li mit ........................................................................................................... 57 3.3.4 Load Balanc e ...........................................................................................................58 3.3.5 Routin g ...................................................................[...]
-
Page 5
-IV- 4.2 Network T opol ogy............................................................................................................... 126 4.3 Configur ations ................................................................................................................. ... 126 4.3.1 Internet Setting ..........................................[...]
-
Page 6
-1- Package Content s The following items should be found in your box: ¾ One TL-ER6120 Router ¾ One power cord ¾ One console cable ¾ One ground cable ¾ Two mounting brackets and other fittings ¾ Quick Installation Guide ¾ Resource CD for TL-ER6120 Router , including: • This User Guide • Other Helpful Information Note: Make sure that the [...]
-
Page 7
-2- Chapter 1 About this Guide This User Guide contains information for se tup and management of TL-E R6120 Router . Please read this guide carefully before operation. 1.1 Intended Readers This Guide is intended for Network Engineer and Network Administrator. 1.2 Conventions In this Guide the following conventions are used: ¾ The Router or TL-ER61[...]
-
Page 8
-3- Appendix A Hardwar e S pecifications Lists the hardware specific ations of this Router . Appendix B F AQ Provides the possible solutions to the problems that may occur during the installation and operation of the router . Appendix C Glossary Lists the glossary used in this guide.[...]
-
Page 9
-4- Chapter 2 Introduction Thanks for choosing the SafeS tream TM Gigabit Dual-W AN VPN Router TL-ER6120. 2.1 Overview of the Router The SafeS tream TM Gigabit Dual-W AN VPN Router TL-ER 6120 from TP-LINK possesses excellent data processing capability and multiple powerfu l functions including IP sec/PPTP/L2TP VPN, Load Balance, Access Control, Ban[...]
-
Page 10
-5- z Dual-W AN Ports + Providing two 10/100/1000M WAN ports for use r s to connect two Internet lines for bandwidth expansion. + Supporting multiple Load Balance modes, including Bandwidth Based Balance Routing, Application Optimized Routing, and Polic y Routing to optimize bandwidth usage. + Featured Link Backup to switch all the new sessions fro[...]
-
Page 11
-6- ¾ Supports Diagnostic (Ping/T r acert) and Online Detection VPN ¾ Supports IPsec VPN and provides up to 100 IPsec VPN tunnels ¾ Supports IPSec VPN in LAN-to-LAN or Client-to-LAN ¾ Provides DES, 3DES, AES128, AES152, AES 256 encryption, MD5, SHA1 authentication ¾ Supports IKE Pre-Share Key and DH1/DH2/DH5 Key Exchanges ¾ Supports PPTP/L2TP[...]
-
Page 12
-7- z LEDs LED Status Indication On The Router is powered on PWR Off The Router is powered off or power supply is abnormal Flashing The Router works properly SYS On/Off The Router works improperly On There is a device link ed to the corresponding port Off There is no device linked to the corresponding port Link/Act Flashing The corresponding port i[...]
-
Page 13
-8- 2.3.2 Rear Panel The rear panel of TL-ER6120 is shown as the following figure. z Power Socket Connect the female connector of the power cord to this power socket, and the male connector to the AC power outlet. Please make sure the voltage of the pow er supply meets the requirement of the input voltage (100-240V~ 50/60Hz). z Grounding Terminal T[...]
-
Page 14
-9- Chapter 3 Configuration 3.1 Network 3.1.1 S t atus The S tatus page shows the system information, the port connection st atus and other information related to this Router . Choose the menu Network → Stat us to load the following page. Figure 3-1 S t atus 3.1.2 System Mode The TL-ER6120 Router can work in three modes: NA T , Non-NA T and Class[...]
-
Page 15
-10- Figure 3-2 Network T opology - NA T Mode If your Router is connecting the two networks of di fferent areas in a large network environment with a network topology as the Figure 3-3 shown, and forwards the packets between these two networks by the Routing rules, you can set it to Non-NA T mode. Figure 3-3 Network T opology – Non-NA T Mode If y[...]
-
Page 16
-1 1- Figure 3-4 Network T opology – Classic Mode Choose the menu Network → System Mode to load the following page. Figure 3-5 System Mode Y ou can select a System Mode for your R outer according to your network need. z NA T Mode NA T (Network Address T r anslation) mode allows the Router to translate private IP addresses within internal networ[...]
-
Page 17
-12- z Non-NA T Mode In this mode, the Router functi ons as the traditional Gateway and fo rwards the packets via routing protocol. The Hosts in dif ferent subnets can co mm unicate with one another via the routing rules whereas no NA T is employed. For ex ample: If the DMZ port of the Rout er is in WAN mode, the Hosts in the subnet of DMZ port can[...]
-
Page 18
-13- Figure 3-6 W AN – S tatic IP The following items are displayed on this screen: ¾ St atic IP Connection T ype: Select S tatic IP if your ISP has assigned a static IP address for your computer . IP Address: Enter the IP address assigned by your ISP . If you are not clear , please consult your ISP . Subnet Mask: Enter the Subnet Mask assigned [...]
-
Page 19
-14- Secondary DNS: Optional. If a Secondary DNS Server address is available, enter it. Up stream Bandwidth: S pecify the bandwidth for transmitting p ackets o n the port. Downstream Bandwidth: S pecify the b andwidth for receiving p ackets on the port. 2) Dynamic IP If your ISP (Internet Service Provider) assigns the IP address automatic ally , pl[...]
-
Page 20
-15- ¾ Dyn am ic I P Connection T ype: Select Dynamic IP if your ISP assigns the IP address automatically . Click <Obt ain> to get the IP address from your ISP’s serv er . Cli ck <Release> to release the current IP address of W AN port. Host Name: Optional. This field allows you to give a name for t he Router . It's blank by def[...]
-
Page 21
-16- ¾ Dynamic IP S t atus Statu s: Displays the status of obt aining an IP address fr om your ISP . z “Disabled” indicates that the Dynamic IP connection type is not applied. z “Connecting” indicates that the Router is obtaining the IP parameters from your ISP . z “Connected” indicates that the Router has successfully obtained the IP [...]
-
Page 22
-17- Figure 3-8 W AN - PPPoE[...]
-
Page 23
-18- The following items are displayed on this screen: ¾ PPPoE Settings Connection T ype: Select PPPoE if your ISP provides xDSL Virtual Dial-up connection. Click <Connect> to dial-up to the Internet and obtain the IP a ddress. Click <Disconnect> to disconnect the Internet connection and release the current IP address. Account Name: En[...]
-
Page 24
-19- be set in the range of 576-1492. The default MTU is 1480. It is recommended to keep the default value if no other MTU value is provided by your ISP . ISP Address: Optional. Enter the ISP address provided by your ISP . It's null by default. Service Name: Optional. Enter the Service Name provided by your ISP . It's null by default. Pri[...]
-
Page 25
-20- ¾ PPPoE St atus Statu s: Displays the status of PPPoE connection. z “Disabled” indicates that the PPPoE connection type is not applied. z “Connecting” indicates that the Router is obtaining the IP parameters from your ISP . z “Connected” indicates that the Router has successfully obtained the IP parameters from your ISP . z “Dis[...]
-
Page 26
-21- Figure 3-9 W AN - L2TP The following items are displayed on this screen: ¾ L2TP Settings Connection T ype: Select L2TP if your ISP provides a L2TP connection. Click <Connect> to dial-up to the Internet and obtain the IP address. Click <Disco nnect> to disconnect the Internet connection and release the current IP address.[...]
-
Page 27
-22- Account Name: Enter the Account Name provided by your ISP . If you are not clear , please consult your ISP . Password: Enter the Password provided by your IS P . Server IP: Enter the Server IP provided by your ISP . MTU: MTU (Maximum T ransmission Unit) is the maximum data unit transmitted by the physical network. It can be set in the range of[...]
-
Page 28
-23- Default Gateway: If S tatic IP i s selected, c onfigure the default gateway . If Dynamic IP is selected, the obt ained default gateway is displayed. Primary DNS/Secondary DNS: If S tatic IP is selected, c onfigure the DNS. If Dynamic IP is selected, the obtained DNS is displayed. Up stream Bandwidth: S pecify the bandwidth for transmitting pac[...]
-
Page 29
-24- 5) PPTP If your ISP (Internet Service Provider) has provi ded the account informati on for the PPTP connection, please choose the PPTP connection type. Figure 3-10 W AN - PPTP The following items are displayed on this screen: ¾ PPTP Settings Connection T ype: Select PPTP if your ISP provides a PPTP connection. Click <Connect> to dial-up[...]
-
Page 30
-25- IP address. Click <Disco nnect> to disconnect the Internet connection and release the current IP address. Account Name: Enter the Account Name provided by your ISP . If you are not clear , please consult your ISP . Password: Enter the Password provided by your IS P . Server IP: Enter the Server IP provided by your ISP . MTU: MTU (Maximum[...]
-
Page 31
-26- Default Gateway: If S tatic IP i s selected, c onfigure the default gateway . If Dynamic IP is selected, the obt ained default gateway is displayed. Primary DNS/Secondary DNS: If S tatic IP is selected, c onfigure the DNS. If Dynamic IP is selected, the obtained DNS is displayed. Up stream Bandwidth: S pecify the bandwidth for transmitting pac[...]
-
Page 32
-27- connection, please choose t he BigPond connection type. Figure 3-1 1 W AN - PPTP The following items are displayed on this screen: ¾ BigPond Settings Connection T ype: Select BigPond if your ISP provides a Big Pond connection. Click <Connect> to dial-up to the Internet and obtain the IP address. Click <Disconnect> to disconnect th[...]
-
Page 33
-28- Auth Server: Enter the address of authentication server . It can be IP address or server name. Auth Domain: Enter the domain name of authentication server . It's only required when the address of Auth Server is a server name. Auth Mode: Y ou can select the proper Active mode according to your need. z Manual: Select this option to manually[...]
-
Page 34
-29- no response from your ISP . Please ensure that your settings are correct and y our network is connected well. Consult your ISP if this problem remains. IP Address: Displays the IP address a ssigned by your ISP . Subnet Mask: Displays the Subnet Mask assigned by your ISP . Default Gateway: Displays the IP address of the default g ateway assigne[...]
-
Page 35
-30- Note: If the LAN IP address is changed, you must use t he new IP address to log into the Router . T o guarantee a normal communication, be sure to set t he Gateway address and the Subn et Mask of the Hosts on the LAN to the new LAN IP a ddress and the Subnet Mask of the Router . 3.1.4.2 DHCP The Router with its DHCP (Dynamic Host Configuration[...]
-
Page 36
-31- Lease Time: S pecify the length of ti me the DHCP server will reserve the IP address for each computer . After the IP address expired, the client will be automatically assigned a new one. Default Gateway: Optional. Enter the Gateway address to be assigned. It is recommended to enter the IP address of the LAN port of the Router . Default Domain[...]
-
Page 37
-32- Figure 3-15 DHCP Reservation The following items are displayed on this screen: ¾ DHCP Reservation MAC Address: Enter the MAC address of the computer for which you want to reserve the IP address. IP Address: Enter the reserved IP address. Description: Optional. Enter a description for the entry . Up to 28 characters can be entered. Statu s: Ac[...]
-
Page 38
-33- 3.1.5 DMZ DMZ (Demilitarized Zone) is a netwo rk which has fewer default firewa ll restrictions than th e LAN does. TL-ER6120 provides a DMZ port to allow all the loca l hosts connected to this port to be exposed to the Internet for some special-purpose services, such as such as Inter net gaming and video-conferencing. The DMZ physical port ca[...]
-
Page 39
-34- Choose the menu Network → DMZ → DMZ to load the following page. Figure 3-18 DMZ The following items are displayed on this screen: ¾ DMZ Statu s: Activate or inactivate this entry . The DMZ port functions as a normal LAN port when it’s disabled. Mode: Select the mode for DMZ por t to control the connection way among DMZ, LAN and Internet[...]
-
Page 40
-35- Set the MAC Address for LAN port: In a complex network topology with all the ARP bound devices, if you want to use TL-ER6120 instead of the current router in a network node, you c an just set the MAC address of TL-ER6120‘s LAN port the same to the MAC address of the previous r outer , which can avoid all the devices under this network node t[...]
-
Page 41
-36- to apply . Note: T o avoid a conflict of MAC address on the local area network, it’s not allowed to set the MAC address of the Router ’s LAN port to the MAC address of the current management PC. 3.1.7 Switch Some basic switch port management functions are prov ided by TL-ER6120, wh ich facilitates you to monitor the traffic and manage the [...]
-
Page 42
-37- Unicast: Displays the number of normal unicast packet s received or transmitted on the port. Broadcast: Displays the number of normal broadcast packe ts received or transmitted on the port. Pause: Displays the number of flow control frames received or transmitted on the port. Multicast: Displays the number of normal multicast packet s received[...]
-
Page 43
-38- Figure 3-21 Port Mirror The following items are displayed on this screen: ¾ General Enable Port Mirror: Check the box to enable t he Port Mirror function. If unchecked, it will be disabled. Mode: Select the mode for the port mirr or function. Options include: z Ingress: When this mode is selected, only the incoming packet s sent by the mirror[...]
-
Page 44
-39- The entry in Figure 3-21 indicates: The outgoing packets sent by port 1, port 2, port 3 and port 5 (mirrored ports) will be copied to port 4 (mirroring port). Tips: If both the mirrored port and the mirroring port are the LAN ports, these two L AN ports should be in the same Port VLAN. For example, if port 3 (the mirror ing port) and port 4 (t[...]
-
Page 45
-40- Figure 3-22 Rate Control The following items are displayed on this screen: ¾ Rate Control Port: Displays the port number . Ingress Limit: S pecify whether to enable t he Ingress Limit feature. Ingress Mode: Select the Ingress Mode for each port. Options include: z All Frames: Select this option to limit all the frames. z Broadcast&Multica[...]
-
Page 46
-41- Figure 3-23 Port Config The following items are displayed on this screen: ¾ Port Config Statu s: S pecify whether to enable the port. The packet s can be transported via this port after being enabled. Flow Control: Allows you to enable/disable the Flow Control function. Negotiation Mode: Select the Negotiation Mode for the port. All Port s: A[...]
-
Page 47
-42- 3.1.7.6 Port VLAN A VLAN (Virtual Local Area Network) is a network topology configured accord ing to a logical scheme rather than the physical layout, which allows you to divide the physical LAN into multiple logical LANs so as to control the communication among the ports . The VLAN function can prevent t he broadcast storm in LANs and enhance[...]
-
Page 48
-43- 3.2.1 Group On this page you can define the group for management. Choose the menu User Group → Group to load the following page. Figure 3-26 Group Configuration The following items are displayed on this screen: ¾ Group Config Group Name: S pecify a unique name for the group. Description: Give a description for the group. It's optional.[...]
-
Page 49
-44- ¾ User Config User Name: S pecify a unique name for the user . IP Address: Enter the IP Address of the user . It cannot be the network address or broadcast address of the port. Description: Give a description to the user fo r identification. It's o ptional. ¾ List of User In this table, you can view the information of the Users and edit[...]
-
Page 50
-45- Group Structure: Click this button to view the tree struct ure of this group. All the members of this group will be displayed, includi ng Users and sub-Groups. The Group Names are displayed in bold. A vailable Member: Displays the Users and the Groups which can be added into this group. Selected Member: Displays the members of this group, incl[...]
-
Page 51
-46- ¾ NA T -DMZ NA T -DMZ: Enable or disable NA T -DMZ. NA T DM Z is a special service of NA T application, which can be considered as a default forwardin g rule. When NA T DMZ ( Pseudo DMZ) is enabled, all the data initiated by external network falling short of the current connections or forwarding rules will be forwarded to the preset NA T DMZ [...]
-
Page 52
-47- The first entry in Figure 3-30 indicates: The IP address of host1 in local network is 192.168.0.128 and the W AN IP address after NA T mapping is spec ified to be 222.135.48.128. The data packets are transmitted from W AN1 port. DMZ Forwarding and this entry are both activated. Note: One-to-One NA T entries t ake effect o nly when the Connecti[...]
-
Page 53
-48- The first entry in Figure 3-31 indicates that: This is a Multi-Ne ts NA T entry named tplink1. The subnet under the LAN port of the Router is 192.168.2.0/24 and this ent ry is activated. After the co rresponding S tatic Route entry is set, the hos ts within this subnet can access the Internet through the Router via NA T . Note: ● Multi-Nets [...]
-
Page 54
-49- Configuration procedure 1. Establish the Multi-Nets NA T entries with Subnet/Mask of VLAN2 and VLAN3. The configured entries are as follows: 2. Then set the corresponding S tatic Route entry , en ter the IP address of t he interface connecting the Router and the three layer swit ch into the Next Hop field. Choose the menu Advanced → Routi ng[...]
-
Page 55
-50- 3.3.1.4 V irtual Server Virtual server set s up public services in your private network, such as DN S, Email and FTP , and defines a service port. All the serv ice requests to this port will be transmitted to the LAN server appointed by the Router via IP address. Choose the menu Advanced → NA T → Virt ual Server to load the following page.[...]
-
Page 56
-51- Statu s: Activate or inactivate the entry . Note: ● The External port and Internal Port should be set in the range of 1-65535. ● The extern al ports of dif ferent entries should be different, whereas the internal ports can be the same. ¾ List of Rules In this table, you can view the information of the entries and edit them by the Action b[...]
-
Page 57
-52- ¾ Port T riggering Name: Enter a name for Port Triggering entri es. Up to 28 characters can be entered. T rigger Port: Enter the trigger port number or the rang e of port. Only when the trigger port initiates connection w ill all the corresponding incoming ports open and provide service for the applications, otherwise the incoming ports will [...]
-
Page 58
-53- Choose the menu Advanced → NA T → ALG to load the following p age. Figure 3-34 ALG The following items are displayed on this screen: ¾ ALG FTP ALG: Enable or disable FTP ALG . The default setting is enabled. It is recommended to keep the def ault setting if no special requirement. H.323 ALG: Enable or disable H.323 ALG . The default setti[...]
-
Page 59
-54- Figure 3-35 Configuration The following items are displayed on this screen: ¾ General Disable Bandwidth Control: Select this option to disable Bandwidth Control. Enable Bandwidth Control all the time: Select this option to enable Bandwidth Control all the time. Enable Bandwidth Control When: With this option selected, the Bandwidth Control wi[...]
-
Page 60
-55- Interface: Displays the current enabled W AN port(s). The T otal bandwid th is equal to the sum of bandwidth of the enabled W AN port s. Up stream Bandwidth: Displays the bandwidth of each W A N port for transmitting dat a. The Upstream Bandwid th of W AN port can be configured on W AN page. Downstream Bandwidth: Displays the bandwidth of each[...]
-
Page 61
-56- ¾ Bandwidth Control Rule Direction: Select the data stream dir ection for the entry . The direction of arr owhead indicates the data stream direction The DMZ port displays in the drop-down list only when the DMZ port is enabled. WAN-ALL means all W AN ports through which the data fl ow might pass. Individual W AN port cannot be selected if W [...]
-
Page 62
-57- Note: ● The premise for single r ule taking ef fect is that the bandwidth of the interface for this rule is sufficient and not used up. ● It is impossible to satisfy all the guaranteed bandw idth if the tot al guaranteed bandwidth specified by all Bandwidth Control rules for certain in terface exceeds the physical bandwid th of this interf[...]
-
Page 63
-58- ¾ Session Limit Group: Select a group to define the controlled users. Max. Sessions: Enter the max. Sessions for the users. Description: Give a description for the entry . Statu s: Activate or inactivate the entry . ¾ List of Session Limit Y ou can view the informati on of the entries and edit t hem by the Action buttons. The first entry in [...]
-
Page 64
-59- Figure 3-39 Configuration With the box before Enable Application Optimized Routing checked, the Router will consider the source IP address and destination IP address of the packet s as a whole and record the W AN port they pass through. And then the p acket s with the sa me source IP address and destination IP address or destination port will [...]
-
Page 65
-60- The following items are displayed on this screen: ¾ General Protocol: Select the protocol for the entry in the drop-down list. If the protocol you want to set is not in the lis t, you can add it to the list on 3.3.4.4 Protocol page. Source IP: Enter the source IP range for the entry . 0.0.0.0 - 0.0.0.0 means any IP is acceptable. Destination [...]
-
Page 66
-61- On this page, you can configur e the Link Backup function based on actual need to reduce the traffic burden of W AN port and improve the network efficie ncy . Choose the menu Advanced → Load Balance → Li nk Backup to load the following p age. Figure 3-41 Link Backup The following items are displayed on this screen: ¾ General W AN Ports: D[...]
-
Page 67
-62- W AN at the ending of the ef fective time. Failover: S pecify the premise for Failover Mode. The backup W AN port will be enabled only when the premise is met. Backup Effective Time: S pecify the backup ef fective time if T iming Mode has been selected. Then the backup W AN port will be enabled, while t he primary W AN port is disabled in the [...]
-
Page 68
-63- Figure 3-42 Protocol The following items are displayed on this screen: ¾ Protocol Name: Enter a name to indicate a protocol. The name will display in the drop-down list of Protocol on Access Rule page. Number: Enter the Number of the prot ocol in the range of 0-255. ¾ List of Protocol Y ou can view the informati on of the entries and edit t [...]
-
Page 69
-64- Choose the menu Advanced → Routi ng → S t atic Route to load the following page. Figure 3-43 Static Route The following items are displayed on this screen: ¾ St atic Route Destination: Enter the destination hos t the route leads to. Subnet Mask: Enter the Subnet Mask of the destination network. Next Hop: Enter the gateway IP address to wh[...]
-
Page 70
-65- The first entry in Figure 3-43 indicates: If there are packets being sent to a device with IP address of 21 1.162.1.0 and subnet mask of 255.255.255.0, the Rout er will forward the packet s from W A N1 port to the next hop of 21 1.200.1.1. Application Example There is a network topology as the following figure shown: If the LAN port of TL-ER61[...]
-
Page 71
-66- 3.3.5.2 RIP RIP (Routing Information Protocol) is a dynamic route protocol using di stance vector algorithm to select the optimal path. With features of easy configurat ion, management and implementat ion, it is widely used in small and medium-sized networks such as the campus network. The distance of RIP refers to the hop count s that a data [...]
-
Page 72
-67- Statu s: Enable or disable RIP protocol. RIP V ersion: Select RIPv1 or RIPv2. RIPv2 s upports multicast and broadcast. Password Authentication: If RIPv2 is enabled, set the Password Au thentication accordi ng to the actual network situation, and the password s hould not be more than 15 characters. All Interfaces: Here you can operate all the i[...]
-
Page 73
-68- Destination: The Destination of route entry . Gateway: The Gateway of route entry . Flags: The Flags of route entry . The Flags describe certain characteristics of the route. Logical Interface: The logical interface of route entry . Physical Interface: The physical interface of route entry . Metric The Metric of route entry . 3.4 Firewall 3.4.[...]
-
Page 74
-69- Figure 3-46 IP-MAC Binding The following items are displayed on this screen: ¾ General It is recommended to check all the options. Y ou s hould import the IP and MAC address of the host to IP-MAC Binding List and enable the corresponding entr y before enabling “Permit the packet s matching the IP-MAC Binding entries only”. When suffered A[...]
-
Page 75
-70- ¾ List of Rules Y ou can view the informati on of the entries and edit t hem by the Action buttons. The first entry in Figure 3-46 indicates: The IP address of 192.168.1.101 and MAC address of 00-19-66-83-53-CF have been bound and this entry is activated. Note: If all the entries in the binding list are disabled and “Permit the packets of I[...]
-
Page 76
-71- Indicates that this entry is imported to the list on IP-MAC Binding p age, but not effective yet. Indicates that the IP and MAC addres s of this entry are already bound. T o bind the entries in the list, check these entri es and click the <Import> button, then the settings will take ef fect if the entries do not c onflict with the existe[...]
-
Page 77
-72- Figure 3-49 Attack Defense The following items are displayed on this screen: ¾ General Flood Defense: Flood attack is a commonly used DoS (Denial of Service) att ack, including TCP SYN, UDP , ICMP and so on. It is recommended to select all the Flood Defens e options and specify the corresponding thresholds. Keep the def ault settings if you a[...]
-
Page 78
-73- Packet Anomaly Defense: Packet Anomaly refers to the abnormal p ackets. It is recommended to select all the Packet Anomaly Defense options. Enable Att ack Defense Logs: With this box checked, the Rout er will record the defense logs. 3.4.3 MAC Filtering On this page, you can control the Internet access of local hosts by spec ifying their MAC a[...]
-
Page 79
-74- ¾ List of Rules Y ou can view the informati on of the entries and edit t hem by the Action buttons. 3.4.4 Access Control 3.4.4.1 URL Filtering URL (Uniform Resource Locator) specifies wher e an identified resource is available and the mechanism for retrieving it. URL Filt er functions to filter the Internet URL address, so as to provide a con[...]
-
Page 80
z Group: URL Filtering will t ake effect to all the users in group. Mode: Select the mode for URL Filtering. “Keyword’’ indicates that all the URL addresses including the specif ied keywords will be filtered. “URL Path” indicates that the URL address will be filtered only when it exactly matches the specified URL. Description: Give a desc[...]
-
Page 81
-76- 3.4.4.2 Web Filtering On this page, you can filter the desired web components. Choose the menu Firewall → Access Control → Web Filtering to load the following p age. Figure 3-52 Web Filtering Check the box before Enable Web Filt ering and select the web components to be filtered. 3.4.4.3 Access Rules Choose the menu Firewall → Access Con[...]
-
Page 82
-77- rule will not be permitted to pass through the Router . y Allow: When this option is selected, the packet s obeyed the rule will be allowed to pass through the Router . Service: Select the service for the entry . Only the service belonging to the specified service type is limited by the entry . For example, if you select “Block” for Policy[...]
-
Page 83
-78- ¾ List of Rules Y ou can view the information of the entries and edit them by the Action butt ons. The smaller the valu e is, the higher the priority is. The first entry in Figure 3-53 indicates: The TELNET p acket s transmitted from the hosts within the network of 192.168.0.0/24 will be not allowed to pass through the Router at 8:00-20:00 fr[...]
-
Page 84
-79- The following items are displayed on this screen: ¾ Service Name: Enter a name for the service. T he name should not be more than 28 characters. The name will display in the drop-down list of Protocol on Access Rule page. Protocol: Select the protocol for the servic e. The system predefined protocols include TCP , UDP and TCP/UDP . Dest. Port[...]
-
Page 85
-80- Figure 3-55 Application Rules The following items are displayed on this screen: ¾ General Check the box before Enable Application Control to make the Applicat ion Control function take ef fect. The specified applic ation used by the specified loca l users will be not allowed to access the Internet if the App lication Control entry is enabled.[...]
-
Page 86
-81- Effective Time: S pecify the t ime for the entry to take e ffect . Description: Give a description for the entry . Statu s: Activate or inactivate the entry . ¾ List of Rules Y ou can view the informati on of the entries and edit t hem by the Action buttons. The first entry in Figure 3-55 indicates: The group1 is applied with Application Rule[...]
-
Page 87
-82- technology is developed and used to establish the private network through the public network, which can guarantee a secured data exchange. VPN adopts the tunneling technology to establish a private connection between tw o endpoints. It is a connection secured by encrypting the data and using point -to-point authenticat ion. The following diagr[...]
-
Page 88
-83- Figure 3-58 IKE Policy The following items are displayed on this screen: ¾ IKE Policy Policy Name: S pecify a unique name to the IKE policy for ident ification and management purposes. The IKE policy can be applied to IPsec policy . Exchange Mode: Select the IKE Exchange Mode in phase 1, and ensure the remote VPN peer uses the same mode. z Ma[...]
-
Page 89
-84- scenarios with lower requirem ent for identity protection. Local ID T ype: Select the local ID type for I KE negotiation. IP Address: uses an IP address as the ID in IKE negotiation. FQDN: uses a name as the ID. Local ID: The local W AN IP will be inputted automatically if IP Address type is selected. If Name type is selected, enter a name for[...]
-
Page 90
-85- Figure 3-59 IKE Proposal The following items are displayed on this screen: ¾ IKE Proposal Proposal Name: S pecify a unique name to the IK E proposal for identification and management purposes. The IKE proposal can be applied to IPsec proposal. Authentication: Select the authentication algor ithm for IKE negotiation. Options include: z MD5: MD[...]
-
Page 91
-86- z AES192: Uses the AES algorit hm and 192-bit key for encryption. z AES256: Uses the AES algorit hm and 256-bit key for encryption. DH Group: Select the DH (Dif fie-Hellman) group to be used in key negotiation phase 1. The DH Grou p sets the strength of the algorithm in bits. Options include DH1, DH2 and DH5. z DH1: 768 bits z DH2: 1024 bits z[...]
-
Page 92
-87- Figure 3-60 IPsec Policy The following items are displayed on this screen: ¾ General Y ou can enable/disable IPsec func tion for the Router here. ¾ IPsec Policy Policy Name: S pecify a u nique name to the IPsec policy . Up to 28 characters can be entered.[...]
-
Page 93
-88- Mode: Select the network mode for IP sec policy . Options include: z LAN-to-LAN: Select this option when the client is a network. z Cl ie nt -to -L AN : Select th is option when the client is a host. Local Subnet: S pecify IP address range on your local LAN to identify which PCs on your LAN are covered by this policy . It's formed by IP a[...]
-
Page 94
-89- PFS: Select the PFS (Perfect Forward Security) for IKE mode to enhance security . This setting should match the remote peer . With PFS feature, IKE negotiates to create a new key in Phase2. As it is i ndepend ent of the key created in Phase1, this key can be secure even when the key in Phase1 is de-encrypted. Without PFS, the key in Phase2 is [...]
-
Page 95
-90- Key-In: protocol is used in the co rresponding IPsec Proposal. The inbound key here must match the outbound ESP encryption key at the other end of the tunnel, and vice versa. Outgoing SPI: S pecify the Outgoing SPI (S ecurity Parameter Index) manually . The Outgoing SPI here must match the Incoming SPI value at the ot her end of the tunnel, an[...]
-
Page 96
-91- 3.5.2.2 IPsec Proposal On this page, you can define and edit the IPsec proposal. Choose the menu VPN → IPsec → IPsec Proposal to load the following page. Figure 3-61 IPsec Proposal The following items are displayed on this screen: ¾ IPsec Proposal Proposal Name: S pecify a unique name to the IPsec Proposal for identification and managemen[...]
-
Page 97
less than the 64th power of 2 in bits and generates a 160-bit message digest. ESP Authentication: Select the algorithm used to ve rify the integrity of the data for ESP authentication. Options include: z MD5: MD5 (Message Digest Algorithm) t akes a message of arbitrary length and generates a 128-bit message digest. z SHA: SHA (Secure Has h Algorith[...]
-
Page 98
-93- Figure 3-62 IPsec SA Figure 3-62 displays the connection status of the NO.1 entry in t he List of IPsec policy in Figure 3-60 . As shown in the figure, the Rout er is using W AN2 for tunnel con nection, and the IP address of W AN2 and the default gateway of remote peer are 172.30 .70.151 and 172.30.70.161 res pectively . Security protocol and [...]
-
Page 99
-94- Figure 3-63 L2TP/PPTP T unnel The following items are displayed on this screen: ¾ General Enable VPN-to-Internet: S pecify whether to enable VPN -to-Internet function. If enabled, the VPN client is permitted to access the LAN of the server and Internet. Hello Interval: S pecify the interval to send hello p acket s. ¾ L2TP/PPTP T unnel Protoc[...]
-
Page 100
-95- Mode: S pecify the working mode for this Router . Options include: z Client: In this mode, the device send s a request to the remote L2TP/PPTP server init iatively for establishing a tunnel. z Server: In this mode, t he Router responds the request from the remote client for establishing a tunnel. Account Name: Enter the account name of L2TP/PP[...]
-
Page 101
-96- Client: Enter the IP address of the c lient which is allowed to connect to this L2TP/PPTP server . The default IP "0.0.0.0" means any IP address is accept able. IP Pool: Select the IP Pool Name to specify the address range for the server's IP assignment. This it em is available for Server mode. Remote Subnet: Enter the IP addres[...]
-
Page 102
-97- Pool Name: S pecify a unique name to the IP Address Pool for identification and mana gement purpos es. IP Address Range: S pecify the st art and the end IP address for IP Pool. The start IP address should not exceed the end address and the IP ranges must not o verlap. ¾ List of IP Po ol In this table, you can view the information of IP Pools [...]
-
Page 103
-98- The PPPoE configuration can be implemented on General , IP Address Pool , Account , Exceptional IP and List of Account pages. 3.6.1.1 General On this page, you can conf igure PPPoE function globally . Choose the menu Services → PPPoE Server → General to load the following page. Figure 3-66 General The following items are displayed on this [...]
-
Page 104
-99- Max Echo-Request s: S pecify the maximum number of Echo-R equests sent by the server to wait for response. The default is 10. The link will be dropped when the number of the unacknowledged LCP echo requests reaches your specified Max Echo-Requests. Idle Timeou t: Enter the maximum idle time. The session will be terminated af ter it has been in[...]
-
Page 105
-100- Figure 3-67 IP Address Pool The following items are displayed on this screen: ¾ IP Address Pool Pool Name: S pecify a unique name to the IP A ddress Pool for identification and management purposes. IP Address Range: S pecify the start and the end IP address for IP Pool. The start IP address should not exceed the end address and the IP addres[...]
-
Page 106
-101- Figure 3-68 Account The following items are displayed on this screen: ¾ Account Account Name: Enter the account name. This name should not be the same with the one in L2TP/PPTP connection settings. Password: Enter the password. IP Address Assigned Mode: Select the IP Address Assigned Mode for IP assignment. z S tatic: Select this option to a[...]
-
Page 107
-102- Description: Enter the description for management and search purposes. Up to 28 characters can be entered. Statu s: Activate or inactivate the entry . MAC Binding: Select a MAC Binding type from t he pull-down list. Options include: z Disable: Select this option to disable the MAC Binding function. z Manual: Select this option to bind the acc[...]
-
Page 108
-103- The following items are displayed on this screen: ¾ Exceptional IP IP Address Range: S pecify the st art and the end IP address to make an exceptional IP address range. This range should be in the sa me IP range with LAN port or DMZ port of the Router . The start IP addr ess should not exceed the end address and the IP address ranges must no[...]
-
Page 109
-104- Figure 3-71 E-Bulletin The following items are displayed on this screen: ¾ General Enable E-Bulletin: S pecify whether to enable el ectronic bulletin function . Interval: S pecify the interval to release the bulletin. Enable Logs: S pecify whether to log the E-Bulletin. ¾ E-Bulletin Tit le : Enter a title for the bulletin.[...]
-
Page 110
-105- Content: Enter the content of the bulletin. Object: Select the object of this bulletin. Options include: z ANY: The bulletin will be released to all the users and the PCs on the LAN. z Group: The bulletin will be released to the users in the selected group. You can click < > button to add a group to the selected group and click < >[...]
-
Page 111
-106- latest IP add ress, the server will update the mappings between the domai n name and IP address in DNS database. Therefore, the users can use the same domain name to ac cess the DDNS client even if the IP address of the DDNS cli ent has changed. DDNS is usually us ed for the Internet users to access the private website and FTP server , both o[...]
-
Page 112
-107- DDNS St atus: Displays the current statu s of DDNS service z Offline: DDNS service is disabled. z Connecting: client is connecting to the server . z Online: DDNS works normally . z Authorization fails: The Account Name or Password is incorrect. Please check and enter it again. ¾ List of DynDNS Account In this table, you can view the existing[...]
-
Page 113
-108- DDNS St atus: Displays the current statu s of DDNS service z Offline: DDNS service is disabled. z Connecting: client is connecting to the server . z Online: DDNS works normally . z Authorization fails: The Account Name or Password is incorrect. Please check and enter it again. ¾ List of No-IP Account In this table, you can view the existing [...]
-
Page 114
-109- DDNS St atus: Displays the current status of DDNS service z Offline: DDNS service is disabled. z Connecting: client is connecting to the server . z Online: DDNS works normally . z Authorization fails: The Account Name or Passwo rd is incorrect. Please check and enter it again. Domain Name: Displays the domain names obtained fr om the DDNS ser[...]
-
Page 115
-1 10- Domain Name 1: Enter the Domain Name that you registered with your DDNS service provider . Domain Name 2: Optional. Enter the Domain Name that you registered with your DDNS service provider . Domain Name 3: Optional. Enter the Domain Name that you registered with your DDNS service provider . Domain Name 4 Optional. Enter the Domain Name that[...]
-
Page 116
- 111 - Figure 3-76 UPnP The following items are displayed on this screen: ¾ General UPnP Funct ion: Enable or disable the UPnP function globally . ¾ List of UPnP Mappin g After UPnP is enabled, all UPnP connection rules will be displayed in the list of UPnP Mapping. Up to 64 UPnP service connections are supported in TL-ER6120. The NO.1 entry in [...]
-
Page 117
-1 12- Figure 3-77 Password The following items are displayed on this screen: ¾ Administrator Current User Name: Enter the current user name of the Router . Current Password: Enter the current password of the Router . New User Name: Enter a new user name for the Router . New Password: Enter a new password for the Router . Confirm New Password: Re-[...]
-
Page 118
-1 13- ¾ General Web Management Port: Enter the Web Management Port for the Router . T elnet Management Port: Enter the T elnet Management Port for the Router . Web Idle T imeout: Enter a timeout period that the Router will log you out of the Web-based Utility af ter a specified period ( Web Idle Timeout ) of inactiv ity . T elnet Idle T imeout: E[...]
-
Page 119
-1 14- 3.7.1.3 Remote Management On this page you can configure the Remote Managem ent function. This featur e allows managing your Router from a remote location via the Internet. Choose the menu Maintenance → Setup → Remote Management to load the following page. Figure 3-79 Remote Management The following items are displayed on this screen: ¾[...]
-
Page 120
-1 15- 3.7.2.2 Export and Import Choose the menu Maintenance → Management → Export and Import to load the following page. Figure 3-81 Export and Import The following items are displayed on this screen: ¾ Configuration V ersion Displays the current Configur ation version of the Router . ¾ Export Click the <Export> button to save the curr[...]
-
Page 121
-1 16- Figure 3-82 Reboot Click the <Reboot> button to reboot the Router . The configuration will not be lost after rebooting. The Internet connection will be temporarily interrupted while rebooting. Note: T o avoid damage, please don't turn off the device while rebooting. 3.7.2.4 Firmware Upgrade Choose the menu Maintenance → Manageme[...]
-
Page 122
-1 17- Figure 3-84 License 3.7.4 S t atistics 3.7.4.1 Interface T raffic St atistics Interface T raf fic S tatistics screen displays the det ailed traf fic information of each port and extra information of W AN ports. Choose the menu Maintenance → St atistics → Interface T raffic Statistics to load the following p age. Figure 3-85 Interface T r[...]
-
Page 123
-1 18- Rate Rx : Displays the rate for receiving data frames. Rate Tx: Displays the rate for transmitting data frames. Packets Rx: Displays the number of packet s received on the interface. Packets Tx: Displays the number of packet s transmitted on the interface. Bytes Rx: Displays the bytes of packet s received on the interface. Bytes Tx: Displa[...]
-
Page 124
-1 19- ¾ T raffic St atistics Direction: Select the direction in the drop-down list to get the Flow S tatistics o f the specified direction. ¾ IP T raffic St atistics This table displays the det ailed traf fic information of corresponding PCs. Sorted by: Select the rule for displayi ng the traffic information. 3.7.5 Diagnostics 3.7.5.1 Diagnostic[...]
-
Page 125
-120- Figure 3-87 Diagnostics The following items are displayed on this screen: ¾ Ping Destination IP/Domain: Enter destination IP address or Domain name here. Then select a port for testing, if you select “A uto”, the Router will select the interface of destination automatically . After clickin g <S tart> button, the Router will send Pi[...]
-
Page 126
-121- ¾ T racer t Destination IP/Domain: Enter destination IP address or Domain name here. Then select a port for testing, if Auto is selected, the Router will select the interface of destination automatically . After clicking the <S tart> button, the Router will send T racert pa ckets to test the connectivity of the gateways during the jour[...]
-
Page 127
-122- ¾ List of W AN status Port: Displays the detected W AN port. Detection: Displays whether the Online Detection is enabled. W AN St atus: Display the detecting results. 3.7.6 Ti me System T ime is the time displayed while the Rout er is running. On this page you can configure the system time and the settings here will be used for ot her time-b[...]
-
Page 128
-123- ¾ Config Get GMT : When this option is selected, you can configure the time zone and the IP Address for the NTP Server . T he Router will get GMT automatically if it has connected to a NTP Server . z T ime Zone: Select your local time. z Primary/Secondary NTP Server: Enter the IP Address for the NTP Server . Manual: With this option selected[...]
-
Page 129
-124- Severity: Displays the severity level of the log information. Y ou can select a severity level to display the log information with the same level. Send System Logs: Select Send System Logs and specif y the server IP , then the new added logs will be sent to the specified server . The Logs of switch are classified into the following eight leve[...]
-
Page 130
-125- Chapter 4 Application 4.1 Network Requirement s The company has established the server farms in the headquarters to provide the Web, Mail and FTP services for all the staf f in the headquarters an d the branch offices, and to transmit the commercial confidential data to it s p artners. The dedicated line access service wa s used by this comp [...]
-
Page 131
-126- 4.2 Network T opology 4.3 Configurations Y ou can configure the Router via th e PC connected to the LAN port of this Router . T o log in to the Router , the IP address of your PC should be in the same subnet of the LAN por t of this Router . (The default subnet of LAN port is 192.168.0.0/24.). The IP ad dress of your PC can be obtained automa[...]
-
Page 132
-127- 4.3.1.1 System Mode Set the system mode of the Router to the NA T mode. Choose the menu Netw ork → System Mode to load the following p age. Select the NA T mode and the <Save> button to apply . Figure 4-1 System Mode 4.3.1.2 Internet Connection Configure the St atic IP connection type for the W A N1 and W AN2 ports of the Router . Cho[...]
-
Page 133
-128- Figure 4-3 Link Backup 4.3.2 VPN Setting T o enable the hosts in the remote branch of fice (W AN: 1 16.31.85.133, LAN: 172.31.10.1) to access the servers in the headquarters, you can create the VPN tunnel via the TP-LINK VPN routers between t he headquarters and the remote branch office to guar antee a secured communication. The following tak[...]
-
Page 134
-129- Authentication: MD5 Encryption: 3DES DH Group: DH2 Click the <Add> button to apply . Figure 4-4 IKE Proposal z IKE Policy Choose the menu VPN → IKE → IKE Policy to load the configuration p age. Settings: Policy Name: IKE_1 Exchange Mode: Main IKE Proposal: proposal_I KE_1 (you just created) Pre-shared Key: aabbccddee SA Lifetime: 36[...]
-
Page 135
-130- Figure 4-5 IKE Policy Tips: For the VPN Router in the remote branch office, t he IKE settings should be the same as the Router in the headquarters. 2) IPsec Setting T o configure the IPsec function, you sh ould create an IPsec Proposal firstly . z IPsec Proposal Choose the menu VPN → IPsec → IPsec Proposal to load the following page. Sett[...]
-
Page 136
-131- ESP Encryption: 3DES Click the <Save> button to apply . Figure 4-6 IPsec Proposal z IPsec Policy Choose the menu VPN → IPsec → IPsec Policy to load the configuration p age. Settings: IPsec: Enable Policy Name: IPsec_1 S tatus: Activate Mode LAN-to-LAN Local Subnet: 192.168.0.0/24 Remote Subnet: 172.31.10.0/24 WA N : WA N1 Remote Gat[...]
-
Page 137
-132- Figure 4-7 IPsec Policy Tips: For the VPN Router in the remote branch office, the IPsec settings should be consistent with the Router in the headquarters. The Remote Gateway of the remote Router should be set to the IP address of the Router in the headquarters. After the IPsec VPN tunnel of the two peers is est ablished successfully , y ou ca[...]
-
Page 138
-133- 4.3.2.2 PPTP VPN Setting z IP Address Pool Choose the menu VPN → L2TP/PPTP → IP Address Pool to load the following page. Enter the Pool Name and the IP Address Range as the following figure shown. Click the <Add> button to apply . z L2TP/PPTP T unnel Choose the menu VPN → L2TP/PPTP → L2TP/PPTP T unnel to load the following page.[...]
-
Page 139
-134- Settings: L2TP/PPTP: Enable Protocol: PPTP Mode: Server Username: PPTP Password: abcdefg T unnel: Client-to-LAN IP Pool: PPTP_Dialup_User (you just created) Click the <Save> button to apply . 4.3.3 Network Management T o manage the enterprise network effectively and forbid the Hosts within the IP range of 192.168.0.30-192.168.0.50 to us[...]
-
Page 140
-135- 4.3.3.1 User Group Create a User Group with all the Hosts in the IP range of 192.168.0.30-1 92.168.0.50 as its group members. z Group Choose the menu User Group → Group to load the following page. Enter the Group Name and the Description to create a Group as the following figure shows. Figure 4-9 Group Config z User Choose the menu User Gro[...]
-
Page 141
-136- Figure 4-10 User Config - Batch z View Choose the menu User Group → Vie w to load the configuration p age. Add all the Users you just created into the Group 1 and click the <Save> button to apply . 4.3.3.2 App Control Choose the menu Firewall → App Control → Control Rules to load the configuration page. Check the box before Enable[...]
-
Page 142
-137- Figure 4-1 1 App Rules 4.3.3.3 Bandwid th Control T o enable Bandwidth Control, you s hould configure the total bandwid th of interfaces and the detailed bandwidth control rule first. 1) Enable Bandwidth Control Choose the menu Advanced → T raffic Control → Setup to load the configuration page. Check the box before Enable Bandwidt h Contr[...]
-
Page 143
-138- 2) Interface Bandw id th Choose the menu Network → WA N → WA N 1 to load the configurat ion page. Configure the Upstream Bandwidth and Do wnstream Bandw id th of the interface as Figur e 4-13 shows. The entered bandwidth value should be c onsistent with the ac tual bandwidth value. 3) Bandwidth Control Rule Choose the menu Advanced → T [...]
-
Page 144
-139- Max. Sessions: 250 S tatus: Activate Click the <Add> button to apply . Figure 4-15 Session Limit 4.3.4 Network Security Y ou can enable the IP-MAC Binding f unction to defend the ARP attack fr om local or public network and enable Sending GARP packet s function to defend ARP attack. Moreover , you can enable DoS Defense function to impl[...]
-
Page 145
-140- Figure 4-17 Scanning Result Choose the menu Firewall → Anti ARP S poofing → IP-MAC Binding to load the configuration p age. Select the ARP entries needed to be bound or c lick the <Select All> button, and then click the <Import>button. The ARP List will di splay as the following figure shows. Figure 4-18 ARP List 2) Set IP-MAC[...]
-
Page 146
-141- Figure 4-19 IP-MAC Binding 4.3.4.2 W AN ARP Defense T o prevent the WAN ARP attack, you can bind the default gateway and IP address of W AN port. Obtain the MAC address of W AN port by ARP Scanning first. Choose the menu Firewall → Anti ARP S poofing → ARP Scanning to load the configuration p age. Enter the default gateway of the W AN por[...]
-
Page 147
-142- Figure 4-20 Att ack Defense 4.3.4.4 T raffic Monitoring 1) Port Mirror Choose the menu Network → Sw itch → Port Mirror to load the configuration page. Check the bo x before Enable Port Mirror and select the Ingress&Egress mode. Select the Port 5 for the Mirroring Port and the Port 3 and the Port 4 for the Mirrored ports. Click the <[...]
-
Page 148
-143- Figure 4-21 Port Mirror 2) St atistics Choose the menu Maintenance → St atistics to load the page. Load the Interface T raffic S t atistics p age to view the traffic st atistics of each physical interface of the Router as Figure 4-22 shows. Figure 4-22 Interface T raf fic S tatistics Load the IP T raffic St atistics p age, and Check the box[...]
-
Page 149
-144- Figure 4-23 IP T raf fic S tatistics After all the above step s, the enterpris e network will be operated based on planning.[...]
-
Page 150
-145- Chapter 5 CLI TL-ER6120 provides a Console po rt for CLI (Comm and Line Interface) confi guration, which enables you to configure the Router by accessing the CLI from c onsole (such as Hyper T ermi nal) or T elnet. The following part will introduce the step s to a ccess CLI via Hyper T erminal and some common CLI commands. 5.1 Configuration T[...]
-
Page 151
-146- Figure 5-2 Connection Description 4. Select the port (The default port is COM1) to connect in Figure 5-3 , and click OK . Figure 5-3 Select the port to connect 5. Configure the port selected in the ste p above as the following Figure 5-4 shows. Configure Bit s per second as 1 15200, Dat a bit s as 8, Parity as None, Stop bit s as 1, Flow cont[...]
-
Page 152
-147- Figure 5-4 Port Settings 6. Choose File → Properties → Settings on the Hyper T erminal window as Figure 5-5 shows, then choose VT100 or Auto detect for Emulation and click OK . Figure 5-5 Connection Properties Settings[...]
-
Page 153
-148- 7. The DOS prompting “TP-LINK>” will appea r after pressing the Enter button in the Hyper T erminal window as Figure 5-6 shows. Figure 5-6 Log in the Router 5.2 Interface Mode The CLI of TL-ER6120 offers two command mode s: User EXEC Mode and Privileged EXEC Mode. User EXEC Mode only allows users to do some si mple operations such as v[...]
-
Page 154
-149- Mode Accessing Path Prompt Logout or Access the next mode User EXEC Mode Primary mode once it is connected with the Router . TP-LINK > Use the exit command to disconnect the Router (except t hat the Router is connected through the Console port). Use the enable command to access Privileged EXEC mode. Privileged EXEC Mode Use the enable comm[...]
-
Page 155
-150- enable - Enter the privileged mode exit - Exit the CLI (only for telnet) history - Show command history ip - Display or Set the IP configuration ip-mac - Display or Set the IP mac bind configuration sys - System manager user - User configuration 2) T ype a command and a question mark separated by space. If there are keywords in this command, [...]
-
Page 156
-151- 5.4 Command Introduction TL-ER6120 provides a number of CLI commands for users to manage the Router and user information. For better understanding, each command is followed by note which is the meaning of the command. 5.4.1 ip The ip command is used to view or configure the IP address and subnet mask of the interfaces. V iew command can be us[...]
-
Page 157
-152- 5.4.3 sys The sys command is used for system management, incl uding Backup and Restore, Factory Default, Reboot, Firmware Upgrade and so on. TP-LINK # sys reboot This command will r eboot system, Continue?[Y/N] Reboot the system. Y me ans YES, N means NO. TP-LINK # sys restore This command will restore system, Continue?[Y/N] Restore to factor[...]
-
Page 158
-153- ● Pay special attention t hat the specified a ccount must be with approp riate permissions since the functions such as export, import and firmwa re upgrade require read-wri te operation on FTP server . TP-LINK # sys import config Server address: [192.168.1.101] Username: [admin] Password: [admin] File name: [config.bin] Import the configura[...]
-
Page 159
-154- TP-LINK > user get Username: admin Password: admin Query the user name and password of the current Guest. TP-LINK > user set password Enter old password: Enter new password: Confirm new password: Modify the password of the Guest. TP-LINK # user get Username: admin Password: admin Query the user name and password of the Administrator . T[...]
-
Page 160
-155- TP-LINK > history 1. history 2. sys show 3. history View the history command. TP-LINK > history clear 1. history 2. sys show 3. history 4. history clear Clear the history command. 5.4.6 exit The exit command is used to exit the syst em when logging in by T elnet. TP-LINK > exit Exit CLI.[...]
-
Page 161
-156- Appendix A Hardware S pecifications St andards IEEE 802.3, IEEE 802.3u, IEEE 802.3ab, IEEE 802.3x, TCP/ IP , DHCP , ICMP , NA T 、 PPPoE, SNTP , HTTP , DNS, L2TP , PPTP , IPsec T wo 10/100/1000M Auto-Negotiation W AN RJ45 port (Auto MDI/MDIX) T wo 10/100/1000M Auto-Negotiation LA N RJ45 ports (Auto MDI/MDIX) One 10/100/1000M Auto- Negotiatio[...]
-
Page 162
-157- Appendix B F AQ Q1. What can I do if I cannot access the web-based configuration page? 1. For the first login, pl ease try the following steps: 1) Make sure the cable is well connected to t he LAN port of the Router . The corresponding LED should flash or be solid light. 2) Make sure the IP address of your PC is set in the same subnet address[...]
-
Page 163
-158- Q3: What can I do if the Router with the re mote management function enabled cannot be accessed by the remote computer? 1. Make sure that the IP address of the remote com puter is in the subnet allowed to remotely access the router . 2. If the router ’s management por t has been modified, please log in to the Router with the new address, su[...]
-
Page 164
-159- Appendix C Glossary Glossary Description DSL (Digital Subscriber Line) A technology that allows data to be sent or received over existing traditional phone lines. ALG ( Application Layer Gateway ) Application Level Gateway (A LG) is application specifi c translation agent that allows an application on a host in one address realm to connec[...]
-
Page 165
-160- Glossary Description H.323 H.323 allows dissimilar communica tion devices to communicate with each other by using a standardized communication protocol. H.323 defines a comm on set of CODECs, call setup and negotiating procedures, and basic data transport methods. H HTTP ( Hyp ertext T ransfer Protocol ) The protocol used by Web browsers [...]
-
Page 166
-161- Glossary Description structures. MAC addresses are 6 bytes long and are controlled by the IEEE. MTU ( Maximum T ransmission Unit ) The size in bytes of the larges t packet that can be transmitted. NA T ( Network Address T ranslator ) Mechanism for reducing the need for globally unique IP addresses. NA T allows an organization with add[...]
-
Page 167
-162- Glossary Description Protocol ) processing and retransmission be handled by other protocols. UPnP ( Universal Plug and Play ) UPnP is a set of networking prot ocols for primarily residential networks without enterprise cl ass devices that permits networked devices. URL ( Uniform Resource Locator ) URL describes the acce ss method an[...]