Home
ELTEX
Network Router
ESR Series
ELTEX ESR Series User Manual
5
of 1
of 1 rating
575 pages
Give review
Manual
Specs
To Next Page
To Next Page
Loading...
ESR series service routers
ESR-10, ESR-12V, ESR-12VF, ESR-14VF, ESR-20,
ESR-21, ESR-100, ESR-200, ESR-1000, ESR-1200,
ESR-1500, ESR-1511, ESR-3100, ESR-1700
User manual (29.06.2021)
Firmware version1.13.0
2
Table of Contents
Table of Contents
2
Introduction
12
Abstract
12
Target Audience
12
Symbols
12
Notes and Warnings
13
Product Description
14
Purpose
14
Functions
15
Interface Functions
15
MAC Table Functions
15
Second-Layer Functions of OSI Model
16
Third-Layer Functions of OSI Model
16
Traffic Tunnelling Functions
18
Management and Configuration Functions
18
Network Security Functions
19
Main Specifications
20
Design
33
ESR-1700 Design
33
ESR-3100 Design
35
ESR-1511, ESR-1510 Design
38
ESR-1200, ESR-1000 Design
42
Design
45
Design
48
Design
49
ESR-12VF, ESR-14VF Design
51
ESR-12V Design
54
Design
56
Light Indication
59
Delivery Package
66
Installation and Connection
69
Support Brackets Mounting
69
Device Rack Installation
69
ESR-1000, ESR-1200, ESR-1500, ESR-1511, ESR-3100, ESR-1700 Power Module Installation
70
Connection to Power Supply
71
SFP Transceiver Installation and Removal
71
Transceiver Installation
71
Transceiver Removal
72
Management Interfaces
73
Command Line Interface (CLI)
73
Types and Naming Procedure of Router Interfaces
73
Types and Naming Procedure of Router Tunnels
77
Initial Router Configuration
78
ESR Router Factory Settings
78
Description of Factory Settings
78
Router Connection and Configuration
79
Connection to the Router
79
Applying the Configuration Change
80
Basic Router Configuration
81
Firmware Update
85
Updating Firmware Via System Resources
85
Updating Firmware Via Bootloader
87
Secondary Bootloader Update (U-Boot)
88
Safe Configuration Recommendations
91
General Recommendations
91
Event Logging System Configuration
91
Recommendations
92
Warnings
92
Configuration Example
92
Password Usage Policy Configuration
92
Recommendations
93
Configuration Example
93
AAA Policy Configuration
93
Recommendations
94
Warnings
94
Configuration Example
94
Remote Management Configuration
95
Recommendations
95
Configuration Example
95
Configuration of Protection against Network Attacks Mechanisms
96
Recommendations
96
Configuration Example
97
Interface Management
98
VLAN Configuration
98
Configuration Algorithm
99
Configuration Example 1. VLAN Removal from the Interface
100
Configuration Example 2. Enabling VLAN Processing in Tagged Mode
101
Configuration Example 3. Enabling VLAN Processing in Tagged and Untagged Modes
102
LLDP Configuration
102
Configuration Algorithm
103
Configuration Example
104
LLDP MED Configuration
105
Configuration Algorithm
105
Voice VLAN Configuration Example
106
Sub-Interface Termination Configuration
107
Configuration Algorithm
108
Sub-Interface Configuration Example
110
Q-In-Q Termination Configuration
110
Configuration Algorithm
110
Q-In-Q Configuration Example
113
USB Modems Configuration
114
USB Modems Configuration Algorithm
114
Configuration Example
117
PPP through E1 Configuration
117
Configuration Algorithm
118
Configuration Example
120
MLPPP Configuration
121
Configuration Algorithm
121
Configuration Example
123
Bridge Configuration
124
Configuration Algorithm
124
Example of Bridge Configuration for VLAN and L2Tpv3 Tunnel
127
Example of Bridge Configuration for VLAN
129
Configuration Example of the Second VLAN Tag Adding/Removing
131
Dual-Homing Configuration
131
Configuration Algorithm
132
Configuration Example
132
Mirroring Configuration (SPAN/RSPAN)
133
Configuration Algorithm
134
Configuration Example
134
LACP Configuration
135
Configuration Algorithm
135
Configuration Example
138
AUX Configuration
139
Configuration Algorithm
139
Configuration Examples
141
Adapter Soldering Schemes
146
Tunneling Management
147
GRE Tunnel Configuration
147
Configuration Algorithm
147
IP-GRE Tunnel Configuration Example
151
DMVPN Configuration
153
Configuration Algorithm
154
Configuration Example 1
155
Configuration Example 2
161
L2Tpv3 Tunnel Configuration
166
Configuration Algorithm
166
L2Tpv3 Tunnel Configuration Example
168
Ipsec VPN Configuration
171
Route-Based Ipsec VPN Configuration Algorithm
171
Route-Based Ipsec VPN Configuration Example
177
Policy-Based Ipsec VPN Configuration Algorithm
182
Policy-Based Ipsec VPN Configuration Example
188
Remote Access Ipsec VPN Configuration Algorithm
192
Remote Access Ipsec VPN Configuration Example
201
Tunnels Configuration
206
Configuration Algorithm
206
Configuration Example
207
Qos Management
209
Basic Qos
209
Configuration Algorithm
209
Configuration Example
212
Advanced Qos
213
Configuration Algorithm
213
Configuration Example
217
Routing Management
221
Routing Information Advertising Policy
222
Rip
222
OSPF Protocol
222
IS-IS Protocol
223
Ibpg Protocol
224
Ebpg Protocol
224
Static Routes Configuration
225
Configuration Algorithm
225
Static Routes Configuration Example
226
RIP Configuration
228
Configuration Algorithm
228
RIP Configuration Example
233
OSFP Configuration
235
Configuration Algorithm
235
OSPF Configuration Example
244
OSPF Stub Area Configuration Example
245
Virtual Link Configuration Example
246
BGP Configuration
247
Configuration Algorithm
248
Configuration Example
259
BFD Configuration
262
Configuration Algorithm
262
Configuration Example of BFD with BGP
266
PBR Routing Policy Configuration
267
Configuration Algorithm of Route-Map for BGP
267
Configuration Example 1. Route-Map for BGP
272
Configuration Example 2. Route-Map for BGP
273
Route-Map Based on Access Control Lists (Policy-Based Routing) Configuration Algorithm
274
Route-Map Based on Access Control Lists (Policy-Based Routing) Configuration Example
275
VRF Lite Configuration
276
Configuration Algorithm
277
Configuration Example
278
Multiwan Configuration
280
Configuration Algorithm
280
Configuration Example
283
IS-IS Configuration
285
Configuration Algorithm
285
Configuration Example
292
MPLS Technology Management
295
LDP Configuration
295
Configuration Algorithm
296
Configuration Example
297
Configuring Session Parameters in LDP
300
Algorithm for Setting Hello Holdtime and Hello Interval in the Global LDP Configuration
302
Algorithm for Setting Hello Holdtime and Hello Interval for Address Family
302
Algorithm for Setting Keepalive Holdtime Parameter in the Global LDP Configuration
303
Algorithm for Setting Keepalive Holdtime Parameter for the Specific Neighbor
303
Configuration Example
303
Configuring Session Parameters in Targeted-LDP
305
Algorithm for Setting Hello Holdtime, Hello Interval and Keepalive Holdtime for the LDP Process
308
Algorithm for Setting Hello Holdtime, Hello Interval and Keepalive Holdtime for the Specific Neighbor
309
Configuration Example
309
LDP Tag Filtering Configuration
310
Configuration Algorithm
310
Configuration Example
311
L2VPN Martini Mode Configuration
312
L2VPN VPWS Configuration Algorithm
312
L2VPN VPWS Configuration Example
314
L2VPN VPLS Configuration Algorithm
317
L2VPN VPLS Configuration Example
318
L2VPN Kompella Mode Configuration
323
L2VPN VPLS Configuration Algorithm
323
L2VPN VPLS Configuration Example
325
L3VPN Configuration
340
Configuration Algorithm
341
Configuration Example
343
MPLS Traffic Balancing
357
Configuration Example
357
Operation with the Bridge Domain Within MPLS
358
Assignment of MTU When Operating with MPLS
360
Security Management
367
AAA Configuration
367
Local Authentication Configuration Algorithm
368
AAA Configuration Algorithm Via RADIUS
371
AAA Configuration Algorithm Via TACACS
375
AAA Configuration Algorithm Via LDAP
378
Example of Authentication Configuration Using Telnet Via RADIUS Server
382
Command Privilege Configuration
383
Configuration Algorithm
383
Example of Command Privilege Configuration
383
Configuration of Logging and Protection against Network Attacks
383
Description of Attack Protection Mechanisms
386
Configuration Example of Logging and Protection against Network Attacks
389
Firewall Configuration
390
Configuration Algorithm
391
Firewall Configuration Example
397
Configuration Example of Application Filtering (DPI)
400
Access List (ACL) Configuration
402
Configuration Algorithm
403
Access List Configuration Example
405
IPS/IDS Configuration
405
Base Configuration Algorithm
406
Configuration Algorithm for IPS/IDS Rules Autoupdate from External Sources
407
Recommended Open Rule Update Source
407
IPS/IDS Configuration Example with Auto-Update Rules
412
Basic User Rules Configuration Algorithm
414
Basic User Rules Configuration Example
422
Extended User Rules Configuration Algorithm
424
Extended User Rules Configuration Example
425
Eltex Distribution Manager Interaction Configuration
426
Basic Configuration Algorithm
426
Configuration Example
429
Content Filtering Service Configuration
432
Basic Configuration Algorithm
432
Content Filtering Rules Configuration Example
437
Antispam" Service Configuration
440
Basic Configuration Algorithm
440
Configuration Example
443
Redundancy Management
445
VRRP Configuration
445
Configuration Algorithm
445
Configuration Example 1
448
Configuration Example 2
449
VRRP Tracking Configuration
451
Configuration Algorithm
451
Configuration Example
455
Remote Access Configuration
457
Configuring Server for Remote Access to Corporate Network Via PPTP Protocol
457
Configuration Algorithm
457
Configuration Example
460
Configuring Server for Remote Access to Corporate Network Via L2TP Protocol
462
Configuration Algorithm
462
Configuration Example
466
Configuring Server for Remote Access to Corporate Network Via Openvpn Protocol
468
Configuration Algorithm
468
Configuration Example
472
Configuring Remote Access Client Via Pppoe
474
Configuration Algorithm
474
Configuration Example
476
Configuring Remote Access Client Via PPTP
478
Configuration Algorithm
478
Configuration Example
480
Configuring Remote Access Client Via L2TP
481
Configuration Algorithm
482
Configuration Example
484
Service Management
486
DHCP Server Configuration
486
Configuration Algorithm
486
Configuration Example
490
Destination NAT Configuration
492
Configuration Algorithm
493
Destination NAT Configuration Example
495
Source NAT Configuration
497
Configuration Algorithm
497
Configuration Example 1
500
Configuration Example 2
503
Static NAT Configuration
504
Configuration Algorithm
504
Static NAT Configuration Example
504
HTTP/HTTPS Traffic Proxying
506
Configuration Algorithm
506
HTTP Proxy Configuration Example
509
Configuration Algorithm
510
Configuration Example
512
Monitoring
515
Netflow Configuration
515
Configuration Algorithm
515
Configuration Example
516
Sflow Configuration
517
Configuration Algorithm
517
Configuration Example
518
SNMP Configuration
520
Configuration Algorithm
520
Configuration Example
524
Zabbix-Agent/Proxy Configuration
526
Configuration Algorithm
526
Zabbix-Agent Configuration Example
528
Zabbix-Server Configuration Example
529
Syslog Configuration
532
Configuration Algorithm
533
Configuration Example
535
Integrity Check
536
Configuration Process
536
Configuration Example
537
Router Configuration File Archiving
537
Configuration Process
537
Configuration Example
538
BRAS (Broadband Remote Access Server) Management
540
Configuration Algorithm
540
Example of Configuration with Softwlc
544
Example of Configuration Without Softwlc
552
Voip Management
559
SIP Profile Configuration Algorithm
559
FXS/FXO Ports Configuration Algorithm
560
Dial Plan Configuration Algorithm
562
PBX Server Configuration Algorithm
562
Registration Trunk Creation Algorithm
564
Voip Configuration Example
565
Dial Plan Configuration Example
568
FXO Port Configuration
570
Frequently Asked Questions
572
Receiving of Routes, Which Are Configured in VRF Via BGP Or/And OSPF, Failed. the
572
Rib
572
Ssh/Telnet Sessions, Which Go through ESR Router, Are Closing
572
Firewall was Disabled on Interface (Ip Firewall Disable). However Access for Active
572
Sessions from the Port was Not Closed, According to Security Zone-Pair Rules, after Including this Interface to Security Zone, Removing from 'Ip Firewall Disable' Configuration and Applying Changes
572
LACP Does Not Launch on XG Ports of ESR-1000/1200/1500/1700
572
How to Clear ESR Configuration Completely and Reset It to Factory Default
573
How to Attach Sub-Interface to Created VLAN
573
Do the ESR-Series Routers Have Features for Traffic Analysis
573
How to Configure Ip-Prefix-List 0.0.0.0./0
573
Problem of Asynchronous Traffic Transmission Is Occurred
573
How to Save the Local Copy of the Router Configuration
574
ESR Technical Support
575
5
Based on 1 rating
Ask a question
Give review
Questions and Answers:
Need help?
Do you have a question about the ELTEX ESR Series and is the answer not in the manual?
Ask a question
ELTEX ESR Series Specifications
General
Brand
ELTEX
Model
ESR Series
Category
Network Router
Language
English
Related product manuals
ELTEX ESR-21
650 pages
ELTEX ESR-10
650 pages
ELTEX ESR-15V
650 pages
ELTEX ESR-200
650 pages
ELTEX ESR-1200
650 pages
ELTEX ESR-1000
650 pages
ELTEX ESR-12VF
650 pages
ELTEX ESR-1511
650 pages
ELTEX ESR-3200
650 pages