TP-LINK TL-ER6020 User's Guide

Browse online or download User's Guide for Routers TP-LINK TL-ER6020. TP-Link TL-ER6020 User Guide User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 168
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 1 - Gigabit Dual-WAN VPN Router

TL-ER6020 SafeStreamTM Gigabit Dual-WAN VPN Router Rev: 1.0.0 1910010695

Page 2 - CE Mark Warning

-5-  Dual-WAN Ports + Providing two 10/100/1000M WAN ports for users to connect two Internet lines for bandwidth expansion. + Supporting multiple Lo

Page 3 - CONTENTS

-95- Figure 3-63 L2TP/PPTP Tunnel The following items are displayed on this screen:  General Enable VPN-to-Internet: Specify whether to enable VPN

Page 4

-96- Account Name: Enter the account name of L2TP/PPTP tunnel. It should be configured identically on server and client. Password: Enter the passwo

Page 5

-97- Remote Subnet: Enter the IP address range of your remote network. (It's always the IP address range of LAN on the remote peer of VPN tunnel

Page 6 - Package Contents

-98- In this table, you can view the information of IP Pools and edit them by the action buttons. 3.5.3.3 List of L2TP/PPTP Tunnel This page display

Page 7 - Chapter 1 About this Guide

-99- Figure 3-66 General The following items are displayed on this screen:  General PPPoE Server: Specify whether to enable the PPPoE Server funct

Page 8

-100- Idle Timeout: Enter the maximum idle time. The session will be terminated after it has been inactive for this specified period. It can be 0-100

Page 9 - Chapter 2 Introduction

-101- Figure 3-67 IP Address Pool The following items are displayed on this screen:  IP Address Pool Pool Name: Specify a unique name to the IP Ad

Page 10 - 2.2 Features

-102- Figure 3-68 Account The following items are displayed on this screen:  Account Account Name: Enter the account name. This name should not be

Page 11 - 2.3 Appearance

-103- Description: Enter the description for management and search purposes. Up to 28 characters can be entered. Status: Activate or inactivate the e

Page 12

-104- The following items are displayed on this screen:  Exceptional IP IP Address Range: Specify the start and the end IP address to make an excep

Page 13 - 2.3.2 Rear Panel

-6-  Supports Diagnostic (Ping/Tracert) and Online Detection VPN  Supports IPsec VPN and provides up to 50 IPsec VPN tunnels  Supports IPSec VP

Page 14 - Chapter 3 Configuration

-105- Figure 3-71 E-Bulletin The following items are displayed on this screen:  General Enable E-Bulletin: Specify whether to enable electronic bu

Page 15

-106- Content: Enter the content of the bulletin. Object: Select the object of this bulletin. Options include:  ANY: The bulletin will be released

Page 16 -  NAT Mode

-107- latest IP address, the server will update the mappings between the domain name and IP address in DNS database. Therefore, the users can use the

Page 17 - 3.1.3 WAN

-108- Domain Name: Enter the Domain Name that you registered with your DDNS service provider. DDNS Service: Activate or inactivate DDNS service here.

Page 18

-109- Account Name: Enter the Account Name of your DDNS account. If you have not registered, click <Go to register> to go to the website of No-

Page 19

-110- Figure 3-74 PeanutHull DDNS The following items are displayed on this screen:  PeanutHull DDNS Account Name: Enter the Account Name of your

Page 20

-111- Domain Name: Displays the domain names obtained from the DDNS server. Up to 16 domain names can be displayed here.  List of PeanutHull Accoun

Page 21

-112- DDNS Status: Displays the current status of DDNS service  Offline: DDNS service is disabled.  Connecting: client is connecting to the serve

Page 22 - Figure 3-8 WAN - PPPoE

-113-  General UPnP Function: Enable or disable the UPnP function globally.  List of UPnP Mapping After UPnP is enabled, all UPnP connection rul

Page 23

-114- New User Name: Enter a new user name for the Router. New Password: Enter a new password for the Router. Confirm New Password: Re-enter the new

Page 24

-7-  LEDs LED Status Indication On The Router is powered on PWR Off The Router is powered off or power supply is abnormal Flashing The Router w

Page 25

-115- Telnet Idle Timeout: Enter a timeout period that the Router will log the remote PCs out of the Web-based Utility after a specified period (Te

Page 26

-116- Application Example Network Requirements Allow the IP address within 210.10.10.0/24 segment to manage the Router with IP address of 210.10.10.5

Page 27

-117- Figure 3-81 Export and Import The following items are displayed on this screen:  Configuration Version Displays the current Configuration ve

Page 28

-118- Figure 3-82 Reboot Click the <Reboot> button to reboot the Router. The configuration will not be lost after rebooting. The Internet co

Page 29

-119- Figure 3-84 License 3.7.4 Statistics 3.7.4.1 Interface Traffic Statistics Interface Traffic Statistics screen displays the detailed traffic

Page 30

-120- Interface: Displays the interface. Rate Rx: Displays the rate for receiving data frames. Rate Tx: Displays the rate for transmitting data fram

Page 31

-121- Figure 3-86 IP Traffic Statistics The following items are displayed on this screen:  General Enable IP Traffic Statistics: Allows you to ena

Page 32

-122- Figure 3-87 Diagnostics The following items are displayed on this screen:  Ping Destination IP/Domain: Enter destination IP address or Doma

Page 33

-123- of destination automatically. After clicking the <Start> button, the Router will send Tracert packets to test the connectivity of the gat

Page 34 - 3.1.4 LAN

-124- WAN Status: Display the detecting results. 3.7.6 Time System Time is the time displayed while the Router is running. On this page you can con

Page 35

-8- 2.3.2 Rear Panel The rear panel of TL-ER6020 is shown as the following figure.  Power Socket Connect the female connector of the power cord to

Page 36 - 3.1.4.4 DHCP Reservation

-125- Note: ● If Get GMT function cannot be used properly, please add an entry with UDP port of 123 to the firewall software of the PC. ● The tim

Page 37 - 3.1.5 DMZ

-126- The Logs of switch are classified into the following eight levels. Severity Level Description Emergency 0 The system is unusable. Alert 1 Act

Page 38 - 3.1.5.1 DMZ

-127- Chapter 4 Application 4.1 Network Requirements The company has established the server farms in the headquarters to provide the Web, Mail and

Page 39 - 3.1.6 MAC Address

-128- 4.2 Network Topology 4.3 Configurations You can configure the Router via the PC connected to the LAN port of this Router. To log in to the R

Page 40

-129- 4.3.1.1 System Mode Set the system mode of the Router to the NAT mode. Choose the menu Network→System Mode to load the following page. Select

Page 41 - 3.1.7 Switch

-130- Figure 4-3 Link Backup 4.3.2 VPN Setting To enable the hosts in the remote branch office (WAN: 116.31.85.133, LAN: 172.31.10.1) to access the

Page 42 - 3.1.7.2 Port Mirror

-131- Authentication: MD5 Encryption: 3DES DH Group: DH2 Click the <Add> button to apply. Figure 4-4 IKE Proposal  IKE Policy Choose the me

Page 43

-132- Figure 4-5 IKE Policy Tips: For the VPN Router in the remote branch office, the IKE settings should be the same as the Router in the headquart

Page 44 - 3.1.7.3 Rate Control

-133- ESP Encryption: 3DES Click the <Save> button to apply. Figure 4-6 IPsec Proposal  IPsec Policy Choose the menu VPN→IPsec→IPsec Policy

Page 45 - 3.1.7.4 Port Config

-134- Figure 4-7 IPsec Policy Tips: For the VPN Router in the remote branch office, the IPsec settings should be consistent with the Router in the h

Page 46 - 3.1.7.5 Port Status

-9- Chapter 3 Configuration 3.1 Network 3.1.1 Status The Status page shows the system information, the port connection status and other informatio

Page 47 - 3.2 User Group

-135-  L2TP/PPTP Tunnel Choose the menu VPN→L2TP/PPTP→L2TP/PPTP Tunnel to load the following page. Check the box of Enable VPN-to-Internet to allo

Page 48 - 3.2.2 User

-136- 4.3.3 Network Management To manage the enterprise network effectively and forbid the Hosts within the IP range of 192.168.0.30-192.168.0.50 t

Page 49 - 3.2.3 View

-137- Choose the menu User Group→User to load the configuration page. Click the <Batch> button to enter the batch processing screen. Then cont

Page 50 - 3.3 Advanced

-138- Application: Click the <Application List> button and select the applications desired to be blocked on the popup window.Status: Activat

Page 51 - 3.3.1.2 One-to-One NAT

-139- Figure 4-12 Bandwidth Setup 2) Interface Bandwidth Choose the menu Network→WAN→WAN1 to load the configuration page. Configure the Upstream Ban

Page 52 - 3.3.1.3 Multi-Nets NAT

-140- Figure 4-14 Bandwidth Control Rule 4.3.3.4 Session Limit Choose the menu Advanced→Session Limit→Session Limit to load the configuration page.

Page 53

-141- 4.3.4.1 LAN ARP Defense You can configure IP-MAC Binding manually or by ARP Scanning. For the first time configuration, please bind most of th

Page 54

-142- Choose the menu Firewall→Anti ARP Spoofing→IP-MAC Binding to load the configuration page. To add the host with IP address of 192.168.1.20 and M

Page 55 - 3.3.1.4 Virtual Server

-143- 4.3.4.3 Attack Defense Choose the menu Firewall→Attack Defense→Attack Defense to load the configuration page. Select the options desired to be

Page 56

-144- Figure 4-21 Port Mirror 2) Statistics Choose the menu Maintenance→Statistics to load the page. Load the Interface Traffic Statistics page to v

Page 57 - 3.3.1.5 Port Triggering

-10- Figure 3-2 Network Topology - NAT Mode If your Router is connecting the two networks of different areas in a large network environment with a n

Page 58

-145- Figure 4-23 IP Traffic Statistics After all the above steps, the enterprise network will be operated based on planning.

Page 59 - 3.3.2 Traffic Control

-146- Chapter 5 CLI TL-ER6020 provides a Console port for CLI (Command Line Interface) configuration, which enables you to configure the Router by a

Page 60 - 3.3.2.1 Setup

-147- Figure 5-2 Connection Description 4. Select the port (The default port is COM1) to connect in Figure 5-3, and click OK. Figure 5-3 Select th

Page 61 - 3.3.2.2 Bandwidth Control

-148- Figure 5-4 Port Settings 6. Choose File → Properties → Settings on the Hyper Terminal window as Figure 5-5 shows, then choose VT100 or Auto de

Page 62

-149- 7. The DOS prompting “TP-LINK>” will appear after pressing the Enter button in the Hyper Terminal window as Figure 5-6 shows. Figure 5-6 L

Page 63 - 3.3.3 Session Limit

-150- Mode Accessing Path Prompt Logout or Access the next mode User EXEC Mode Primary mode once it is connected with the Router. TP-LINK > Use

Page 64 - 3.3.4 Load Balance

-151- enable - Enter the privileged mode exit - Exit the CLI (only for telnet) history - Show command history ip - Display or Set the IP

Page 65 - 3.3.4.2 Policy Routing

-152- 5.4 Command Introduction TL-ER6020 provides a number of CLI commands for users to manage the Router and user information. For better understan

Page 66 - 3.3.4.3 Link Backup

-153- 5.4.3 sys The sys command is used for system management, including Backup and Restore, Factory Default, Reboot, Firmware Upgrade and so on. T

Page 67

-154- ● Pay special attention that the specified account must be with appropriate permissions since the functions such as export, import and firmwar

Page 68 - 3.3.4.4 Protocol

-11- Figure 3-4 Network Topology – Classic Mode Choose the menu Network→System Mode to load the following page. Figure 3-5 System Mode You can sele

Page 69 - Routing

-155- TP-LINK > user get Username: admin Password: admin Query the user name and password of the current Guest. TP-LINK > user set passwor

Page 70

-156- TP-LINK > history 1. history 2. sys show 3. history View the history command. TP-LINK > history clear 1. history 2. sys show 3

Page 71 - 3.3.5.2 RIP

-157- Appendix A Hardware Specifications Standards IEEE 802.3, IEEE 802.3u, IEEE 802.3ab, IEEE 802.3x, TCP/ IP, DHCP, ICMP, NAT、PPPoE, SNTP, HTTP, DN

Page 72

-158- Appendix B FAQ Q1. What can I do if I cannot access the web-based configuration page? 1. For the first login, please try the following steps:

Page 73 - 3.3.5.3 Route Table

-159- Q3: What can I do if the Router with the remote management function enabled cannot be accessed by the remote computer? 1. Make sure that t

Page 74 - 3.4 Firewall

-160- Appendix C Glossary Glossary Description DSL (Digital Subscriber Line) A technology that allows data to be sent or received over existing tr

Page 75

-161- Glossary Description H.323 H.323 allows dissimilar communication devices to communicate with each other by using a standardized communicatio

Page 76 - 3.4.1.2 ARP Scanning

-162- Glossary Description MAC address(Media Access Control address) Standardized data link layer address that is required for every port or devic

Page 77 - 3.4.2 Attack Defense

-163- Glossary Description Telnet(Telecommunication Network protocol) Telnet is used for remote terminal connection, enabling users to log in to r

Page 78 - Figure 3-49 Attack Defense

-12-  Non-NAT Mode In this mode, the Router functions as the traditional Gateway and forwards the packets via routing protocol. The Hosts in differ

Page 79 - MAC Filtering

-13- Figure 3-6 WAN – Static IP The following items are displayed on this screen:  Static IP Connection Type: Select Static IP if your ISP has a

Page 80 - 3.4.4 Access Control

-14- Upstream Bandwidth: Specify the bandwidth for transmitting packets on the port. Downstream Bandwidth: Specify the bandwidth for receiving packet

Page 81

-I- COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Oth

Page 82 - 3.4.4.3 Access Rules

-15-  Dynamic IP Connection Type: Select Dynamic IP if your ISP assigns the IP address automatically. Click <Obtain> to get the IP address

Page 83

-16-  Dynamic IP Status Status: Displays the status of obtaining an IP address from your ISP.  “Disabled” indicates that the Dynamic IP connectio

Page 84 - 3.4.4.4 Service

-17- Figure 3-8 WAN - PPPoE

Page 85

-18- The following items are displayed on this screen:  PPPoE Settings Connection Type: Select PPPoE if your ISP provides xDSL Virtual Dial-up co

Page 86 - App Control

-19- ISP Address: Optional. Enter the ISP address provided by your ISP. It's null by default. Service Name: Optional. Enter the Service Name pro

Page 87 - 3.4.5.2 Database

-20-  PPPoE Status Status: Displays the status of PPPoE connection.  “Disabled” indicates that the PPPoE connection type is not applied.  “Co

Page 88 - 3.5 VPN

-21- Figure 3-9 WAN - L2TP The following items are displayed on this screen:  L2TP Settings Connection Type: Select L2TP if your ISP provides a

Page 89 - 3.5.1.1 IKE Policy

-22- Account Name: Enter the Account Name provided by your ISP. If you are not clear, please consult your ISP. Password: Enter the Password provided

Page 90

-23- Primary DNS/ Secondary DNS: If Static IP is selected, configure the DNS. If Dynamic IP is selected, the obtained DNS is displayed. Upstream Ba

Page 91 - 3.5.1.2 IKE Proposal

-24- 5) PPTP If your ISP (Internet Service Provider) has provided the account information for the PPTP connection, please choose the PPTP connection

Page 92 - 3.5.2 IPsec

-II- CONTENTS Package Contents...1 Cha

Page 93 - 3.5.2.1 IPsec Policy

-25- <Disconnect> to disconnect the Internet connection and release the current IP address. Account Name: Enter the Account Name provided by

Page 94 -  IKE Mode

-26- Primary DNS/ Secondary DNS: If Static IP is selected, configure the DNS. If Dynamic IP is selected, the obtained DNS is displayed. Upstream Ba

Page 95 -  Manual Mode

-27- Figure 3-11 WAN – Bigpond The following items are displayed on this screen:  BigPond Settings Connection Type: Select BigPond if your ISP p

Page 96 - 3.5.2.2 IPsec Proposal

-28- Auth Domain: Enter the domain name of authentication server. It's only required when the address of Auth Server is a server name. Auth Mode

Page 97

-29- Default Gateway: Displays the IP address of the default gateway assigned by your ISP. Note: To ensure the BigPond connection re-established norm

Page 98 - 3.5.2.3 IPsec SA

-30- Choose the menu Network→LAN→DHCP to load the following page. Figure 3-13 DHCP Settings The following items are displayed on this screen:  D

Page 99 - 3.5.3 L2TP/PPTP

-31- Primary DNS: Optional. Enter the Primary DNS server address provided by your ISP. It is recommended to enter the IP address of the LAN port of t

Page 100

-32-  DHCP Reservation MAC Address: Enter the MAC address of the computer for which you want to reserve the IP address. IP Address: Enter the res

Page 101 - It should be configured

-33- Figure 3-16 DMZ – Public Mode In Private mode, the DMZ port allows the Hosts in DMZ to access Internet via NAT mode which translates private IP

Page 102

-34- Figure 3-18 DMZ The following items are displayed on this screen:  DMZ Status: Activate or inactivate this entry. The DMZ port functions a

Page 103 - 3.6 Services

-III- 3.3.3 Session Limit ...58 3.3.4 Load

Page 104 -  General

-35- Set the MAC Address for LAN port: In a complex network topology with all the ARP bound devices, if you want to use TL-ER6020 instead of the curr

Page 105 - 3.6.1.2 IP Address Pool

-36- MAC Clone: It’s only available for WAN port. Click the <Restore Factory MAC> button to restore the MAC address to the factory default valu

Page 106 - 3.6.1.3 Account

-37- The following items are displayed on this screen:  Statistics Unicast: Displays the number of normal unicast packets received or transmitted o

Page 107 -  Account

-38- Choose the menu Network→Switch→Port Mirror to load the following page. Figure 3-21 Port Mirror The following items are displayed on this screen

Page 108 - 3.6.1.4 Exceptional IP

-39- The entry in Figure 3-21 indicates: The outgoing packets sent by port 1, port 2, port 3 and port 5 (mirrored ports) will be copied to port 4 (mi

Page 109 - 3.6.2 E-Bulletin

-40- Figure 3-22 Rate Control The following items are displayed on this screen:  Rate Control Port: Displays the port number. Ingress Limit: Spe

Page 110 -  E-Bulletin

-41- Figure 3-23 Port Config The following items are displayed on this screen:  Port Config Status: Specify whether to enable the port. The packet

Page 111 - 3.6.3 Dynamic DNS

-42- 3.1.7.6 Port VLAN A VLAN (Virtual Local Area Network) is a network topology configured according to a logical scheme rather than the physical l

Page 112 - 3.6.3.1 DynDNS

-43- 3.2.1 Group On this page you can define the group for management. Choose the menu User Group→Group to load the following page. Figure 3-26 G

Page 113 - 3.6.3.2 No-IP

-44-  User Config User Name: Specify a unique name for the user. IP Address: Enter the IP Address of the user. It cannot be the network address or

Page 114 - 3.6.3.3 PeanutHull

-IV- 4.2 Network Topology...128 4.3 Con

Page 115 -  PeanutHull DDNS

-45- User Name: Select the name of the desired User. Available Group: Displays the Groups that the User can join. Selected Group: Displays the Groups

Page 116 - 3.6.3.4 Comexe

-46- The following items are displayed on this screen:  NAPT Source Port Range: Enter the source port range between 2049 and 65000, the span of whi

Page 117 - 3.6.4 UPnP

-47- Interface: Select an interface for forwarding data packets. DMZ Forwarding: Enable or disable DMZ Forwarding. The packets transmitted to the Tra

Page 118 - 3.7 Maintenance

-48- Subnet/Mask: Enter the subnet/mask to make the address range for the entry. Interface: Select the interface for the entry. You can select LAN or

Page 119 - 3.7.1.2 Login Parameter

-49- Configuration procedure 1. Establish the Multi-Nets NAT entries with Subnet/Mask of VLAN2 and VLAN3. The configured entries are as follows:

Page 120 - 3.7.1.3 Remote Management

-50- Choose the menu Advanced→Routing→Static Route to load the following page. The Static Route entry is as follows: 3.3.1.4 Virtual Server Virtua

Page 121 - 3.7.2 Management

-51- Figure 3-32 Virtual Server The fo layed Virtual Server entries. Up to 28 characters can be Interface: Select an interface for forwarding dat

Page 122 - 3.7.2.3 Reboot

-52- Note: ● The External port and Internal Port should be set in the range of 1-65535. ● The external ports of different entries should be diffe

Page 123 - 3.7.3 License

-53- p to 28 characters can be entered. Interface: Select an interface for forwarding data packets. Trigger Port: Enter the trigger port number or th

Page 124 - 3.7.4 Statistics

-54- 3.3.1.6 Some special protocols such as (Application Layer Gateway) service is enabled. Choose the menu Advanced→NAT→ALG to load the following p

Page 125

-1- Package Contents The following items should be found in your package:  One TL-ER6020 Router  One Power Cord  One Console Cable  Two mounti

Page 126 - 3.7.5 Diagnostics

-55- 3.3.2.1 Setup Choose the menu Advanced→Traffic Control→Setup to load the following page. Figure 3-35 Configuration The following items are dis

Page 127

-56-  Interface B ndwidth Interface: tal bandwidth is equal to Bandwidth: e Downstream Bandwidth of WAN port can be configured on WAN page. aDispla

Page 128 - 3.7.5.2 Online Detection

-57-  Band Rule Direction: WAN port cannot be selected if Mode: h user equals to the current addresses d Bandwidth Specify the Guaranteed Upstrea

Page 129 - 3.7.6 Time

-58- Note: ● The premise for single rule taking effect is that the bandwidth of the interface for this rule is sufficient and not used up. ● It i

Page 130 - 3.7.7 Logs

-59-  Session Limit ion: Status: Activate or inactivate the entry. ssions for the hosts within group1 ed. Limit. Choose the menu Advanced→Sessio

Page 131

-60- Figure 3-39 Configuration With the box before Enable Application Optimized Routing checked, the Router will consider the source IP address and

Page 132 - Chapter 4 Application

-61- The following items are displa is screen:  Generalyed on th Protocol: Select the protocol for the entry in the drop-down list. If the protoco

Page 133 - 4.3 Configurations

-62- On this page, you can configure the Link Backup function based on actual need to reduce the traffic burden of WAN port and improve the network e

Page 134 - 4.3.1.3 Link Backup

-63- Timing: Link Backup will be enabled if the specified effective time is reached. All the traffic on the primary WAN will switch to the backup WAN

Page 135 - 4.3.2 VPN Setting

-64- Figure 3-42 Protocol The following items are displayed on this screen:  Protocol Name: Enter a name to indicate a protocol. The name will di

Page 136 -  IKE Policy

-2- Chapter 1 About this Guide This User Guide contains information for setup and management of TL-ER6020 Router. Please read this guide carefully b

Page 137 -  IPsec Proposal

-65- Choose the menu Advanced→Routing→Static Route to load the following page. Figure 3-43 Static Route The following items are displayed on this sc

Page 138 -  IPsec Policy

-66- The first entry in Figure 3-43 indicates: If there are packets being sent to a device with IP address of 211.162.1.0 and subnet mask of 255.255.

Page 139 - 4.3.2.2 PPTP VPN Setting

-67- The distance of RIP refers to the hop counts that a data packet passes through before reaching its destination, the value range of which is 1–15

Page 140 -  L2TP/PPTP Tunnel

-68- Authentication: network situation, and the password should not be more than 15 characters. All Interfaces: Here you can operate all the interfac

Page 141 - 4.3.3 Network Management

-69- Flags: The Flags of route entry. The Flags describe certain characteristics of the route. Logical Interface: The logical interface of route entr

Page 142 - 4.3.3.2 App Control

-70- Figure 3-46 IP-MAC Binding The following items are displayed on this screen:  General It is recommended to check all the options. You should

Page 143 - 4.3.3.3 Bandwidth Control

-71- You can view the information of the entries and edit them by the Action buttons. The first entry in Figure 3-46 indicates: The IP address of 192

Page 144

-72- Indicates that the IP and MAC address of this entry are already bound. To bind the entries in the list, check these entries and click the <I

Page 145 - 4.3.4 Network Security

-73- Figure 3-49 Attack Defense The following items are displayed on this screen:  General Flood Defense: Flood attack is a commonly used DoS (De

Page 146 - 4.3.4.1 LAN ARP Defense

-74- Packet Anomaly Defense: Packet Anomaly refers to the abnormal packets. It is recommended to select all the Packet Anomaly Defense options. Enabl

Page 147 - 4.3.4.2 WAN ARP Defense

-3- Appendix A Hardware Specifications Lists the hardware specifications of this Router. Appendix B FAQ Provides the possible solutions to the prob

Page 148 - 4.3.4.4 Traffic Monitoring

-75-  List of Rules You can view the information of the entries and edit them by the Action buttons. 3.4.4 Access Control 3.4.4.1 URL Filtering

Page 149

-76-  Group: URL Filtering will take effect to all the users in group.Mode: Select the mode for URL Filtering. “Keyword’’ indicates that all the UR

Page 150

-77- 3.4.4.2 Web Filtering On this page, you can filter the desired web components. Choose the menu Firewall→Access Control→Web Filtering to load th

Page 151 - Chapter 5 CLI

-78- Policy: Select a policy for the entry:  Block: When this option is selected, the packets obeyed the rule will not be permitted to pass through

Page 152

-79- Priority: Select this option to specify the priority for the added entries. The latest enabled entry will be displayed at the end of the list by

Page 153

-80- Figure 3-54 Service The following items are displayed on this screen:  Service Name: Enter a name for the service. The name should not be mo

Page 154 - 5.2 Interface Mode

-81- 3.4.5 App Control 3.4.5.1 Control Rules On this page, you can enable the Application Rules function. Choose the menu Firewall→App Control→Cont

Page 155 - 5.3 Online Help

-82- Application: Click the <Application List> button to select applications from the popup checkbox. The applications include IM, Web IM, SNS,

Page 156

-83- 3.5 VPN VPN (Virtual Private Network) is a private network established via the public network, generally via the Internet. However, the private

Page 157 - 5.4 Command Introduction

-84- 3.5.1.1 IKE Policy On this page you can configure the related parameters for IKE negotiation. Choose the menu VPN→IKE→IKE Policy to load the

Page 158 - 5.4.3 sys

-4- Chapter 2 Introduction Thanks for choosing the SafeStreamTM Gigabit Dual-WAN VPN Router TL-ER6020. 2.1 Overview of the Router The SafeStreamTM

Page 159 - 5.4.4 user

-85- Exchange Mode: Select the IKE Exchange Mode in phase 1, and ensure the remote VPN peer uses the same mode.  Main: Main mode provides identity

Page 160 - 5.4.5 history

-86- DPD Interval: Enter the interval after which the DPD is triggered.  List of IKE Policy In this table, you can view the information of IKE Poli

Page 161 - 5.4.6 exit

-87- Encryption: Specify the encryption algorithm for IKE negotiation. Options include:  DES: DES (Data Encryption Standard) encrypts a 64-bit bloc

Page 162

-88- 3.5.2.1 IPsec Policy On this page, you can define and edit the IPsec policy. Choose the menu VPN→IPsec→IPsec Policy to load the following pag

Page 163 - Appendix B FAQ

-89- Mode: Select the network mode for IPsec policy. Options include:  LAN-to-LAN: Select this option when the client is a network.  Client-to-LA

Page 164

-90- Phase2. As it is independent of the key created in Phase1, this key can be secure even when the key in Phase1 is de-encrypted. Without PFS, the

Page 165 - Appendix C Glossary

-91- AH Authentication Key-Out: Specify the outbound AH Authentication Key manually if AH protocol is used in the corresponding IPsec Proposal. The o

Page 166

-92- Figure 3-61 IPsec Proposal The following items are displayed on this screen:  IPsec Proposal Proposal Name: Specify a unique name to the IP

Page 167

-93- ESP Authentication: Select the algorithm used to verify the integrity of the data for ESP authentication. Options include:  MD5: MD5 (Message

Page 168

-94- outgoing SPI value are different. However, the Incoming SPI value must match the Outgoing SPI value at the other end of the tunnel, and vice ver

Comments to this Manuals

No comments