Home
Ruijie
Network Router
Reyee RG-EG Series
Ruijie Reyee RG-EG Series User Manual
5
of 1
of 1 rating
2115 pages
Give review
Manual
Specs
To Next Page
To Next Page
To Previous Page
To Previous Page
Loading...
Web-based Configuration Guide
1
Network-Wide Monitoring
30
2.7
Con
figuring the
Audit Lo
g
After
the
audit log
function
is
enab
led a
nd
configured,
the system
will
generate
the
DHCP
lea
se
time
log
s,
URL
log
s of online users, NA
T
l
ogs,
an
d authentication logs of use
r login and logout.
Choose
Local Device
>
A
dvanced
>
Audit Log
.
31
33
Table of Contents
Preface
3
1 Login
5
1.1 Configuration Environment Requirements
5
1.1.1 PC
5
1.2 Default Configuration
5
1.3 Login to Eweb
5
1.3.1 Connecting to the Router
5
1.3.2 Configuring the IP Address of the Management Client
5
1.3.3 Login
6
1.4 Work Mode
7
1.4.1 Router Mode
7
1.4.2 AC Mode
7
1.5 Configuration Wizard (Router Mode)
7
1.5.1 Getting Started
7
1.5.2 Configuration Steps
7
1. Adding a Device to Network
7
2. Creating a Network Project
8
1.5.3 Forgetting the PPPoE Account
9
1.6 Configuration Wizard (AC Mode)
10
1.6.1 Getting Started
10
1.6.2 Configuration Steps
10
1.7 Switching Between Management Pages
12
2 Network-Wide Monitoring
14
2.1 Viewing Networking Information
14
2.2 Adding Networking Devices
17
2.2.1 Wired Connection
17
2.2.2 AP Mesh
19
2.3 Configuring the Service Network
20
2.3.1 Configuring the Wired Network
21
2.3.2 Configuring the Wireless Network
22
2.4 Supporting Traffic Monitoring
24
2.4.1 Viewing Real-time Traffic
24
2.4.2 Viewing Historical Traffic
27
2.5 Supporting the URL Logging Function
30
2.6 Processing Alerts
31
2.7 Configuring the Audit Log
32
3 Network Settings
35
3.1 Switching the Work Mode
35
3.1.1 Work Mode
35
3.1.2 Self-Organizing Network Discovery
35
3.1.3 Configuration Steps
35
3.1.4 Viewing the Self-Organizing Role
36
3.2 Port Settings
37
3.2.1 Setting the Port Parameters
37
3.2.2 Viewing the Port Information
38
3.3 Configuring the WAN Ports
38
3.3.1 Configuring the Internet Access Mode
38
3.3.2 Modifying the MAC Address
39
3.3.3 Modifying the MTU
40
3.3.4 Configuring the Private Line
40
3.3.5 Configuring the VLAN Tag
41
3.3.6 Configuring the Multi-Line Load Balancing Mode
41
3.3.7 Configuring Line Detection
43
3.4 Configuring the LAN Ports
44
3.4.1 Modifying the LAN Port IP Address
44
3.4.2 Modifying the MAC Address
45
3.4.3 Configuring ARP Guard
46
3.5 Configuring VLAN
46
3.5.1 VLAN Overview
46
3.5.2 Creating a VLAN
47
3.5.3 Configuring a Port VLAN
48
3.6 Configuring DNS
49
3.6.1 Local DNS
49
3.6.2 DNS Proxy
49
3.7 Configuring IPv6
50
3.7.1 IPv6 Overview
50
3.7.2 IPv6 Basics
50
1. IPv6 Address Format
50
2. IPv6 Prefix
50
3. Special IPv6 Addresses
51
4. NAT66
51
3.7.3 IPv6 Address Allocation Modes
51
3.7.4 Enabling the IPv6 Function
51
3.7.5 Configuring an IPv6 Address for the WAN Port
51
3.7.6 Configuring an IPv6 Address for the LAN Port
53
3.7.7 Viewing the DHCPv6 Client
55
3.8 Configuring a DHCP Server
55
3.8.1 DHCP Server Overview
55
3.8.2 Address Allocation Mechanism
56
3.8.3 Configuring the DHCP Server
56
1. Configuring Basic Parameters
56
1. Configuring DHCP Option
57
3.8.4 Viewing the DHCP Client
58
3.8.5 Configuring Static IP Addresses
58
3.9 Static Routes
59
3.10 PBR
61
3.10.1 Overview
61
3.10.2 Configuration Steps
61
3.10.3 Typical Configuration Example
63
1. Networking Requirements
63
2. Configuration Roadmap
64
3. Configuration Steps
64
3.11 Configuring ARP Binding and ARP Guard
66
3.11.1 Overview
66
3.11.2 Configuring ARP Binding
66
3.11.3 Configuring ARP Guard
67
3.12 Configuring MAC Address Filtering
68
3.12.1 Overview
68
3.12.2 Configuration Steps
68
3.13 Configuring the PPPoE Server
69
3.13.1 Overview
69
3.13.2 Global Settings
69
3.13.3 Configuring a PPPoE User Account
71
3.13.4 Configuring a Flow Control Package
74
3.13.5 Configuring Exceptional IP Addresses
75
3.13.6 Viewing Online Users
76
3.14 Port Mapping
77
3.14.1 Overview
77
1. Port Mapping
77
2. NAT-DMZ
77
3.14.2 Getting Started
77
3.14.3 Configuration Steps
77
3.14.4 Verification and Test
79
3.14.5 Solution to Test Failure
79
3.14.6 Configuration Steps (DMZ)
79
3.15 UPnP
80
3.15.1 Overview
80
3.15.2 Configuring UPnP
81
3.15.3 Verifying Configuration
81
3.16 DDNS
82
3.16.1 Overview
82
3.16.2 Getting Started
82
3.16.3 Configuring DDNS
82
1. Configuration Steps
82
2. Verifying Configuration
83
3.17 Connecting to IPTV
83
3.17.1 Getting Started
83
3.17.2 Configuration Steps (VLAN Type)
83
3.17.3 Configuration Steps (IGMP Type)
84
3.18 Port Flow Control
85
3.19 Limiting the Number of Connections
85
3.20 Configuring Device Security
86
3.20.1 Configure Local Safety
86
1. Overview
86
2. Configuring an Admin IP Address
87
3. Enabling the Ping Prohibition Function
89
4. Disabling Intranet Access to Eweb
89
3.20.2 Configuring Session Attack Prevention
90
1. Overview
90
2. Configuring Session Attack Prevention
90
3. Configuring Flood Attack Prevention
90
4. Configuring Suspicious Packet Attack Prevention
91
5. Configuring Packet Receiving and Sending Control
91
3.20.3 Checking Attack Defense Statistics
93
3.21 Configuring TTL Rules
94
3.21.1 Overview
94
3.21.2 Configuring TTL Rules
94
1. Configuring a TTL Rule
94
2. Deleting a TTL Rule
95
3. Editing a TTL Rule
95
4. Adjusting the Sequence of TTL Rules
96
3.22 Other Settings
96
4 AP Management
98
4.1 Configuring AP Groups
98
4.1.1 Overview
98
4.1.2 Configuration Steps
98
4.2 Configuring Wi-Fi
99
4.3 Adding a Wi-Fi
105
4.4 Healthy Mode
106
4.5 RF Settings
106
4.6 Configuring Wi-Fi Blacklist or Whitelist
109
4.6.1 Overview
109
4.6.2 Configuring a Global Blacklist/Whitelist
109
4.6.3 Configuring an SSID-based Blacklist/Whitelist
110
4.7 Configuring AP Load Balancing
111
4.7.1 Overview
111
4.7.2 Configuring Client Load Balancing
111
4.7.3 Configuring Traffic Load Balancing
113
4.8 Wireless Network Optimization
115
4.8.1 Wireless Network Optimization with One Click
115
4.8.2 Wi-Fi Roaming Optimization (802.11k/v)
116
4.9 Wi-Fi Authentication
117
4.9.1 Overview
117
4.9.2 Getting Started
117
4.9.3 WeChat Authentication
117
1. Overview
117
2. Getting Started
117
3. Configuration Steps
118
4. Verifying Configuration
120
5. Troubleshooting
120
4.9.4 Enterprise WeChat Authentication
121
1. Overview
121
2. Getting Started
121
3. Configuration Steps
121
4. Employee Authentication
122
5. Guest Authentication
122
4.9.5 WiFiDog Authentication
123
1. Overview
123
2. Getting Started
123
3. Configuration Steps
123
4. Verifying Configuration
124
4.9.6 Local Account Authentication
125
1. Overview
125
2. Getting Started
125
3. Configuration Steps
125
4. Verifying Configuration
126
4.9.7 Authorized Guest Authentication
126
1. Overview
126
2. Getting Started
126
3. Configuration Steps
126
4. Verifying Configuration
128
4.9.8 Guest Authentication Through QR Code Scanning
128
1. Overview
128
2. Getting Started
128
3. Configuration Steps
128
4. Verifying Configuration
129
4.9.9 Authentication-Free
129
1. Overview
129
2. Configuring an Authentication-Free User
129
3. Configuring Extranet IP Addresses for Authentication-Free
130
4. Configuring a URL Whitelist
131
5. Configuring a User MAC Whitelist
131
6. Configuring a User MAC Blacklist
132
4.9.10 Online Authenticated User Management
133
1. Configuring the Idle Client Timeout Period
133
2. Kicking a User Offline
133
4.9.11 Portal Customization
133
4.10 Enabling Reyee Mesh
134
4.11 Configuring the LAN Port of Downlink Access Point
135
5 Switch Management
136
5.1 Configuring RLDP
136
5.1.1 Overview
136
5.1.2 Configuration Steps
136
5.2 Configuring DHCP Snooping
138
5.2.1 Overview
138
5.2.2 Configuration Steps
138
5.3 Batch Configuring Switches
140
5.3.1 Overview
140
5.3.2 Configuration Steps
140
5.3.3 Verifying Configuration
142
6 Firewall Management
143
6.1 Viewing Firewall Information
146
6.2 Configuring Firewall Port
157
7 Online Behavior Management
161
7.1 Overview
162
7.2 User Management
167
7.2.1 Overview
168
7.2.2 User Group
183
1. Creating a User Group
194
2. Creating a User
212
3. Deleting a User Group or a User
230
4. Verifying Configuration
234
7.2.3 Authentication Group
241
7.3 Time Management
257
7.4 App Control
272
7.4.1 Overview
273
7.4.2 Configuring App Control
279
1. Switching the Application Library
281
2. Configuring App Control
291
7.4.3 Custom App
314
1. Overview
315
2. Procedure
321
7.4.4 Custom Application Group
360
1. Overview
361
2. Procedure
366
7.5 Website Management
394
7.5.1 Overview
395
7.5.2 Configuration Steps
401
1. Configuring Website Groups
403
2. Configuring Website Filtering
425
7.6 Flow Control
458
7.6.1 Overview
459
7.6.2 Smart Flow Control
463
1. Overview
464
2. Configuration Steps
469
7.6.3 Setting the Port Parameters
475
7.6.4 Viewing the Port Information
481
7.6.5 Custom Policies
499
1. Overview
500
2. Getting Started
509
3. Configuration Steps
512
7.6.6 Application Priority
718
1. Overview
719
2. Getting Started
726
3. Configuration Steps
731
7.7 Access Control
766
7.7.1 Overview
767
7.7.2 Configuration Steps
772
1. Configuring a MAC Address-based ACL Rule
786
2. Configuring an IP Address-based ACL Rule
806
7.8 Online User Management
845
7.9 Client Management
864
7.9.1 Managing Online Clients
867
1. Viewing and Editing Client Information
872
2. Creating a Client Group
883
3. Moving a Client to Another Group
895
7.9.2 Managing Client Groups
901
1. Creating a Client Group
905
2. Editing Client Group Information
923
7.9.3 Upgrading a Client Application Library
930
7.10 Upgrading the Application Library
939
7.10.1 Overview
940
7.10.2 Local Upgrade
944
7.10.3 Online Upgrade
958
8 VPN
963
8.1 Configuring IPsec VPN
964
8.1.1 Overview
965
1. IPsec Overview
966
2. IKE Overview
981
3. IPsec Security Policy
989
8.1.2 Configuring the IPsec Server
996
1. Basic Settings
998
2. Advanced Settings (Phase 1)
1024
3. Advanced Settings (Phase 2)
1077
8.1.3 Configuring the IPsec Client
1110
8.1.4 Viewing the IPsec Connection Status
1137
8.1.5 Typical Configuration Example
1157
1. Networking Requirements
1158
2. Networking Diagram
1161
3. Configuration Roadmap
1163
4. Configuration Steps
1166
5. Verifying Configuration
1184
8.1.6 Solution to IPsec VPN Connection Failure
1190
8.2 Configuring L2TP VPN
1205
8.2.1 Overview
1206
8.2.2 Configuring the L2TP Server
1214
1. Basic Settings of L2TP Server
1215
2. Configuring the L2TP over IPsec Server
1254
3. Configuring L2TP User
1319
8.2.3 Configuring the L2TP Client
1346
1. Basic Settings of L2TP Client
1347
2. Configuring the L2TP over IPsec Client
1381
8.2.4 Viewing the L2TP Tunnel Information
1387
8.2.5 Typical Configuration Example
1404
1. Networking Requirements
1405
2. Networking Diagram
1412
3. Configuration Roadmap
1414
4. Configuration Steps
1418
5. Verifying Configuration
1529
8.2.6 Solution to L2TP VPN Connection Failure
1539
8.3 Configuring PPTP VPN
1548
8.3.1 Overview
1549
8.3.2 Configuring the PPTP Service
1559
1. Configuring the PPTP Server
1560
2. Configuring PPTP User
1591
8.3.3 Configuring the PPTP Client
1616
8.3.4 Viewing the PPTP Tunnel Information
1641
8.3.5 Typical Configuration Example
1658
1. Networking Requirements
1659
2. Networking Diagram
1666
3. Configuration Roadmap
1668
4. Configuration Steps
1672
5. Verifying Configuration
1764
8.3.6 Solution to PPTP VPN Connection Failure
1774
8.4 Configuring OpenVPN
1785
8.4.1 Overview
1791
1. OpenVPN Overview
1792
2. Certificate Overview
1802
8.4.2 Configuring the OpenVPN Server
1807
1. Basic Settings
1809
2. Advanced Settings
1864
3. Configuring OpenVPN User
1891
8.4.3 Configuring the OpenVPN Client
1899
1. Import Config
1908
2. Web Settings
1939
8.4.4 Viewing the OpenVPN Tunnel Information
1994
8.4.5 Typical Configuration Example
2008
1. Networking Requirements
2009
2. Networking Diagram
2012
3. Configuration Roadmap
2014
4. Configuration Steps
2019
5. Verifying Configuration
2095
9 Configuring PoE
2102
10 System Management
2103
10.1 Setting the Login Password
2103
10.2 Setting the Session Timeout Duration
2103
10.3 Restoring Factory Settings
2104
10.3.1 Restoring the Current Device to Factory Settings
2104
10.3.2 Restoring All Devices to Factory Settings
2104
10.4 Configuring Reboot
2105
10.4.1 Rebooting the Current Device
2105
10.4.2 Rebooting All Devices in the Network
2105
10.4.3 Rebooting the Specified Device
2105
10.5 Configuring Scheduled Reboot
2106
10.6 Setting and Displaying System Time
2107
10.7 Configuring Backup and Import
2107
10.8 Configuring LED Status Control
2108
10.9 Configuring Diagnostics
2108
10.9.1 Network Check
2108
10.9.2 Alerts
2109
10.9.3 Network Tools
2110
10.9.4 Packet Capture
2111
10.9.5 Fault Collection
2112
10.10 Performing Upgrade and Checking System Version
2113
10.10.1 Online Upgrade
2113
10.10.2 Local Upgrade
2114
10.11 Switching System Language
2114
11 FAQs
2115
11.1 Login Failure
2115
11.2 Password Loss/Factory Setting Restoration
2115
11.3 Internet Access Failure
2115
5
Based on 1 rating
Ask a question
Give review
Questions and Answers:
Need help?
Do you have a question about the Ruijie Reyee RG-EG Series and is the answer not in the manual?
Ask a question
Ruijie Reyee RG-EG Series Specifications
General
Brand
Ruijie
Model
Reyee RG-EG Series
Category
Network Router
Language
English
Related product manuals
Ruijie Reyee RG-EW1300G
107 pages
Ruijie Reyee RG-EW Series
61 pages
Ruijie Reyee RG-EW1800GX PRO
36 pages
Ruijie Reyee RG-EW3000GX PRO
47 pages
Ruijie Reyee RG-EG300GH-E Series
41 pages
Ruijie Reyee RG-NBR6215-E
77 pages
Ruijie Reyee RG-NBR6205-E
155 pages
Ruijie Reyee RG-NBR-E Series
155 pages
Ruijie RG-EG210G-E Series
24 pages