Home
ELTEX
Network Router
ESR-3100
ELTEX ESR-3100 User Manual
5
of 1
of 1 rating
650 pages
Give review
Manual
Specs
To Next Page
To Next Page
Loading...
ESR series service routers
ESR-10, ESR-12V, ESR-12VF, ESR-14VF, ESR-15V, ESR-20, ESR-21,
ESR-30, ESR-100, ESR-200, ESR-1000, ESR-1200, ESR-1500, ESR-1700,
ESR-1511, ESR-3100, ESR-3200
User manual
Firmware version1.18.1
2
Table of Contents
Table of Contents
2
Introduction
12
Abstract
12
Target Audience
12
Symbols
12
Notes and Warnings
13
Product Description
14
Purpose
14
Functions
15
Interface Functions
15
MAC Table Functions
15
Second-Layer Functions of OSI Model
16
Third-Layer Functions of OSI Model
16
Traffic Tunneling Functions
18
Management and Configuration Functions
18
Network Security Functions
19
Main Specifications
20
Design
36
ESR-3200 Design
36
ESR-3100 Design
38
ESR-1700 Design
40
ESR-1511, ESR-1510 Design
43
ESR-1200, ESR-1000 Design
47
Design
50
Design
53
Design
55
Design
58
ESR-14VF, ESR-12VF Design
60
ESR-12V Design
62
Design
64
Light Indication
67
Delivery Package
79
Installation and Connection
82
Support Brackets Mounting
82
Device Rack Installation
83
ESR-1000, ESR-1200, ESR-1500, ESR-1511, ESR-1700, ESR-3100, ESR-3200 Power Module Installation
84
Connection to Power Supply
84
SFP Transceiver Installation and Removal
85
Transceiver Installation
85
Transceiver Removal
85
Management Interfaces
86
Command Line Interface (CLI)
86
Types and Naming Procedure of Router Interfaces
87
Types and Naming Procedure of Router Tunnels
90
Initial Router Configuration
91
ESR Router Factory Configuration
91
Description of Factory Settings
91
Router Connection and Configuration
92
Connection to the Router
93
Applying the Configuration Change
93
Basic Router Configuration
94
Firmware Update
98
Updating Firmware Via System Resources
98
Updating Firmware Via Bootloader
100
Secondary Bootloader Update (U-Boot)
101
Safe Configuration Recommendations
104
General Recommendations
104
Event Logging System Configuration
104
Recommendations
105
Warnings
105
Configuration Example
105
Password Usage Policy Configuration
105
Recommendations
106
Configuration Example
106
AAA Policy Configuration
106
Warnings
107
Configuration Example
107
Remote Management Configuration
108
Recommendations
108
Configuration Example
108
Configuration of Protection against Network Attacks Mechanisms
109
Recommendations
109
Configuration Example
110
Interface Management
111
VLAN Configuration
112
Configuration Algorithm
112
Configuration Example 1. VLAN Removal from the Interface
114
Configuration Example 2. Enabling VLAN Processing in Tagged Mode
114
Configuration Example 3. Enabling VLAN Processing in Tagged and Untagged Modes
115
LLDP Configuration
116
Configuration Algorithm
116
Configuration Example
117
LLDP MED Configuration
118
Configuration Algorithm
118
Voice VLAN Configuration Example
119
Sub-Interface Termination Configuration
120
Configuration Algorithm
121
Sub-Interface Configuration Example
123
Q-In-Q Termination Configuration
123
Configuration Algorithm
123
Q-In-Q Configuration Example
126
USB Modems Configuration
126
USB Modems Configuration Algorithm
126
Configuration Example
129
STP/RSTP Configuration
130
Spanning Tree Configuration Algorithm
130
Configuration Example
132
PPP through E1 Configuration
133
Configuration Algorithm
133
Configuration Example
136
MLPPP Configuration
138
Configuration Algorithm
138
Configuration Example
140
Bridge Configuration
142
Configuration Algorithm
142
Example of Bridge Configuration for VLAN and L2Tpv3 Tunnel
145
Example of Bridge Configuration for VLAN
147
Configuration Example of the Second VLAN Tag Adding/Removing
148
Dual-Homing Configuration
149
Configuration Algorithm
149
Configuration Example
150
Mirroring Configuration (SPAN/RSPAN)
151
Configuration Algorithm
151
Configuration Example
152
LACP Configuration
153
Configuration Algorithm
153
Configuration Example
155
AUX Configuration
156
Configuration Algorithm
156
Configuration Examples
158
Adapter Soldering Schemes
163
Tunneling Management
164
GRE Tunnel Configuration
164
Configuration Algorithm
164
IP-GRE Tunnel Configuration Example
168
DMVPN Configuration
170
Configuration Algorithm
171
Configuration Example 1
172
Configuration Example 2
178
L2Tpv3 Tunnel Configuration
184
Configuration Algorithm
184
L2Tpv3 Tunnel Configuration Example
186
Ipsec VPN Configuration
188
Route-Based Ipsec VPN Configuration Algorithm
188
Route-Based Ipsec VPN Configuration Example
194
Policy-Based Ipsec VPN Configuration Algorithm
198
Policy-Based Ipsec VPN Configuration Example
203
Remote Access Ipsec VPN Configuration Algorithm
207
Remote Access Ipsec VPN Configuration Example
215
DPD Configuration Example (Dead Peer Detection)
220
Tunnels Configuration
221
Configuration Algorithm
221
Configuration Example
223
Qos Management
225
Basic Qos
225
Configuration Algorithm
225
Configuration Example
228
Advanced Qos
229
Configuration Algorithm
229
Configuration Example
235
Routing Management
237
Routing Information Advertising Policy
238
Rip
238
OSPF Protocol
238
IS-IS Protocol
239
Ibpg Protocol
240
Ebpg Protocol
240
Static Routes Configuration
241
Configuration Algorithm
241
Static Routes Configuration Example
242
RIP Configuration
244
Configuration Algorithm
244
RIP Configuration Example
249
OSFP Configuration
250
Configuration Algorithm
250
OSPF Configuration Example
260
OSPF Stub Area Configuration Example
261
Virtual Link Configuration Example
261
BGP Configuration
263
Configuration Algorithm
263
Configuration Example
274
BGP Best Route Selection Policy
276
BFD Configuration
278
Timers Configuration
280
Configuration Algorithm
281
BFD with BGP Configuration Example
285
PBR Routing Policy Configuration
286
Configuration Algorithm of Route-Map for BGP
286
Configuration Example 1. Route-Map for BGP
290
Configuration Example 2. Route-Map for BGP
291
Route-Map Based on Access Control Lists (Policy-Based Routing) Configuration Algorithm
291
Route-Map Based on Access Control Lists (Policy-Based Routing) Configuration Example
292
VRF Configuration
295
Configuration Algorithm
295
Configuration Example
297
Multiwan Configuration
298
Configuration Algorithm
298
Configuration Example
301
IS-IS Configuration
303
Configuration Algorithm
303
Configuration Example
310
MPLS Technology Management
312
LDP Configuration
313
Configuration Algorithm
313
Configuration Example
314
Configuring Session Parameters in LDP
317
Algorithm for Setting Hello Holdtime and Hello Interval in the Global LDP Configuration
319
Algorithm for Setting Hello Holdtime and Hello Interval for Address Family
319
Algorithm for Setting Keepalive Holdtime Parameter in the Global LDP Configuration
320
Algorithm for Setting Keepalive Holdtime Parameter for the Specific Neighbor
320
Configuration Example
320
Configuring Session Parameters in Targeted-LDP
322
Algorithm for Setting Hello Holdtime, Hello Interval and Keepalive Holdtime for the LDP Process
324
Algorithm for Setting Hello Holdtime, Hello Interval and Keepalive Holdtime for the Specific Neighbor
324
Configuration Example
325
LDP Tag Filtering Configuration
326
Configuration Algorithm
326
Configuration Example
327
L2VPN Martini Mode Configuration
328
L2VPN VPWS Configuration Algorithm
328
L2VPN VPWS Configuration Example
330
L2VPN VPLS Configuration Algorithm
333
L2VPN VPLS Configuration Example
334
L2VPN Kompella Mode Configuration
339
L2VPN VPLS Configuration Algorithm
339
L2VPN VPLS Configuration Example
341
L3VPN Configuration
356
Configuration Algorithm
357
Configuration Example
359
MPLS Traffic Balancing
374
Configuration Example
375
Operation with the Bridge Domain Within MPLS
376
Assignment of MTU When Operating with MPLS
378
Inter-AS Option a
384
L2Vpn
384
L3Vpn
395
Inter-AS Option B
409
L3Vpn
410
MPLS over GRE
423
L2Vpn
423
L3Vpn
430
Security Management
439
AAA Configuration
439
Local Authentication Configuration Algorithm
440
AAA Configuration Algorithm Via RADIUS
443
AAA Configuration Algorithm Via TACACS
446
AAA Configuration Algorithm Via LDAP
449
Example of Authentication Configuration Using Telnet Via RADIUS Server
453
Command Privilege Configuration
453
Configuration Algorithm
454
Example of Command Privilege Configuration
454
Logging and Network Attacks Protection Configuration
454
Description of Attack Protection Mechanisms
457
Configuration Example of Logging and Protection against Network Attacks
460
Firewall Configuration
461
Configuration Algorithm
461
Firewall Configuration Example
469
Configuration Example of Application Filtering (DPI)
471
Access List (ACL) Configuration
474
Configuration Algorithm
474
Access List Configuration Example
476
IPS/IDS Configuration
477
Base Configuration Algorithm
477
Configuration Algorithm for IPS/IDS Rules Autoupdate from External Sources
478
Recommended Open Rule Update Source
479
IPS/IDS Configuration Example with Rules Autoupdate
484
Basic User Rules Configuration Algorithm
485
Basic User Rules Configuration Example
494
Extended User Rules Configuration Algorithm
495
Extended User Rules Configuration Example
496
Eltex Distribution Manager Interaction Configuration
496
Basic Configuration Algorithm
497
Configuration Example
501
Content Filtering Service Configuration
503
Basic Configuration Algorithm
503
Content Filtering Rules Configuration Example
508
Antispam Service Configuration
511
Basic Configuration Algorithm
511
Configuration Example
514
Redundancy Management
516
VRRP Configuration
516
Configuration Algorithm
516
Configuration Example 1
520
Configuration Example 2
521
Tracking Configuration
522
Configuration Algorithm
522
Configuration Example
526
Firewall/Nat Failover Configuration
528
Configuration Algorithm
528
Configuration Example
530
DHCP Failover Configuration
533
Configuration Algorithm
533
Configuration Example
534
Remote Access Configuration
539
Configuring Server for Remote Access to Corporate Network Via PPTP Protocol
539
Configuration Algorithm
539
Configuration Example
542
Configuring Server for Remote Access to Corporate Network Via L2TP Protocol
544
Configuration Algorithm
544
Configuration Example
547
Configuring Server for Remote Access to Corporate Network Via Openvpn Protocol
549
Configuration Algorithm
549
Configuration Example
552
Configuring Remote Access Client Via Pppoe
554
Configuration Algorithm
554
Configuration Example
556
Configuring Remote Access Client Via PPTP
557
Configuration Algorithm
557
Configuration Example
559
Configuring Remote Access Client Via L2TP
560
Configuration Algorithm
561
Configuration Example
563
Service Management
565
DHCP Server Configuration
565
Configuration Algorithm
565
Configuration Example
569
Destination NAT Configuration
571
Configuration Algorithm
571
Destination NAT Configuration Example
573
Source NAT Configuration
575
Configuration Algorithm
575
Configuration Example 1
579
Configuration Example 2
581
Static NAT Configuration
582
Configuration Algorithm
582
Static NAT Configuration Example
582
HTTP/HTTPS Traffic Proxying
584
Configuration Algorithm
584
HTTP Proxy Configuration Example
587
NTP Configuration
588
Configuration Algorithm
588
Configuration Example
590
Monitoring
592
Netflow Configuration
592
Configuration Algorithm
592
Configuration Example
594
Sflow Configuration
595
Configuration Algorithm
595
Configuration Example
596
SNMP Configuration
597
Configuration Algorithm
597
Configuration Example
601
Zabbix-Agent/Proxy Configuration
602
Configuration Algorithm
602
Zabbix-Agent Configuration Example
604
Zabbix-Server Configuration Example
605
Syslog Configuration
608
Configuration Algorithm
608
Configuration Example
612
Integrity Check
613
Configuration Process
613
Configuration Example
613
Router Configuration File Archiving
613
Configuration Process
614
Configuration Example
614
BRAS (Broadband Remote Access Server) Management
616
Configuration Algorithm
616
Example of Configuration with Softwlc
620
Example of Configuration Without Softwlc
626
Voip Management
633
SIP Profile Configuration Algorithm
633
FXS/FXO Ports Configuration Algorithm
634
Dial Plan Configuration Algorithm
636
PBX Server Configuration Algorithm
636
Registration Trunk Creation Algorithm
637
Voip Configuration Example
638
Dial Plan Configuration Example
641
FXO Port Configuration
643
Example of Voip Configuration for FXS Ports Registration on External SIP Server
644
Example of Voip Configuration on Internal PBX Server
645
Frequently Asked Questions
648
5
Based on 1 rating
Ask a question
Give review
Questions and Answers:
Need help?
Do you have a question about the ELTEX ESR-3100 and is the answer not in the manual?
Ask a question
ELTEX ESR-3100 Specifications
General
Brand
ELTEX
Model
ESR-3100
Category
Network Router
Language
English
Related product manuals
ELTEX ESR-3200
650 pages
ELTEX ESR-21
650 pages
ELTEX ESR-10
650 pages
ELTEX ESR-15V
650 pages
ELTEX ESR-200
650 pages
ELTEX ESR-1200
650 pages
ELTEX ESR-1000
650 pages
ELTEX ESR-12VF
650 pages
ELTEX ESR-1511
650 pages