Tp-Link TL-ER6020 [9/168] Chapter 2 introduction
-4-
Chapter 2 Introduction
Thanks for choosing the SafeStream
TM
Gigabit Dual-WAN VPN Router TL-ER6020.
2.1 Overview of the Router
The SafeStream
TM
Gigabit Dual-WAN VPN Router TL-ER6020 from TP-LINK possesses excellent
data processing capability and multiple powerful functions including IPsec/PPTP/L2TP VPN, Load
Balance, Access Control, Bandwidth Control, Session Limit, IM/P2P Blocking, PPPoE Server and so
on, which consumedly meet the needs of small and medium enterprise, hotels and communities with
volumes of users demanding a efficient and easy-to-manage network with high security.
Powerful Data Processing Capability
+ Built-in ARM 32 network processor and 128MB DDRII high-speed RAM allows the stability and
reliability for operation.
Virtual Private Network (VPN)
+ Providing comprehensive IPsec VPN with DES/3DES/AES encryptions, MD5/SHA1
identifications and automatically/manually IKE Pre-Share Key exchanges.
+ Supporting PPTP/L2TP VPN Server mode to allow the staff on business or remote branch office
to access the headquarter network.
Online Behavior Management
+ Complete Functions of Access Rules can allow managers to select the network service levels to
block or allow applications of FTP downloading, Email, Web browsing and so on.
+ Deploying One-Click restricting of IM/P2P applications to save time & energy while reserving
exceptional groups for certain users.
+ Supporting URL Filtering to prevent potential hazards from visiting the malicious Web sites.
Powerful Firewall
+ Supporting One-Click IP-MAC Binding to avoid ARP spoofing and guarantee a network without
stagnation.
+ Featured Attack Defense to protect the network from a variety of flood attack and packet
anomaly attack.
+ Possessing MAC Filtering function to block the access of illegal hosts.
Flexible Traffic Control
+ Featured Bandwidth Control with flexible bandwidth management to automatically control the
bandwidth of the host in bi-direction to avoid bandwidth over occupation, as well as optimize
bandwidth usage.
+ Supporting Session Limit to avoid the complaint of a few people to force whole sessions.
Содержание
- Ce mark warning 2
- Copyright trademarks 2
- Fcc statement 2
- Contents 3
- Package contents 6
- Chapter 1 about this guide 7
- Conventions 7
- Intended readers 7
- Overview of this guide 7
- Chapter 2 introduction 9
- Overview of the router 9
- Features 10
- Appearance 11
- Front panel 11
- Rear panel 13
- Chapter 3 configuration 14
- Network 14
- Status 14
- System mode 14
- Dhcp client 36
- Dhcp reservation 36
- Mac address 39
- Statistics 41
- Switch 41
- Port mirror 42
- Rate control 44
- Port config 45
- Port status 46
- Port vlan 47
- User group 47
- Advanced 50
- Nat setup 50
- One to one nat 51
- Multi nets nat 52
- Virtual server 55
- Port triggering 57
- Traffic control 59
- Bandwidth control 61
- Session limit 63
- Configuration 64
- Load balance 64
- Session list 64
- Policy routing 65
- Link backup 66
- Protocol 68
- Routing 69
- Static route 69
- Route table 73
- Anti arp spoofing 74
- Firewall 74
- Ip mac binding 74
- Arp scanning 76
- Arp list 77
- Attack defense 77
- Mac filtering 79
- Access control 80
- Url filtering 80
- Access rules 82
- Web filtering 82
- Service 84
- App control 86
- Control rules 86
- Database 87
- Ike policy 89
- Ike proposal 91
- Ipsec policy 93
- Ipsec proposal 96
- Ipsec sa 98
- L2tp pptp 99
- L2tp pptp tunnel 99
- Ip address pool 102
- General 103
- List of l2tp pptp tunnel 103
- Pppoe server 103
- Services 103
- Ip address pool 105
- Account 106
- Exceptional ip 108
- E bulletin 109
- List of account 109
- Dynamic dns 111
- Dyndns 112
- Peanuthull 114
- Comexe 116
- Admin setup 118
- Administrator 118
- Maintenance 118
- Login parameter 119
- Remote management 120
- Export and import 121
- Factory defaults 121
- Management 121
- Reboot 122
- Firmware upgrade 123
- License 123
- Interface traffic statistics 124
- Statistics 124
- Ip traffic statistics 125
- Diagnostics 126
- Online detection 128
- Chapter 4 application 132
- Network requirements 132
- Configurations 133
- Configurations 4 configurations 133
- Internet setting 133
- Network topology 133
- Internet connection 134
- Link backup 134
- System mode 134
- Ipsec vpn 135
- Vpn setting 135
- Pptp vpn setting 139
- Network management 141
- User group 141
- App control 142
- Bandwidth control 143
- Network security 145
- Session limit 145
- Lan arp defense 146
- Wan arp defense 147
- Attack defense 148
- Traffic monitoring 148
- Chapter 5 cli 151
- Configuration 151
- Interface mode 154
- Online help 155
- Command introduction 157
- Ip mac 157
- History 160
- Appendix a hardware specifications 162
- Appendix b faq 163
- Appendix c glossary 165
Похожие устройства
- Panasonic KX-FP80 Инструкция по эксплуатации
- Sony HDR-XR106E Инструкция по эксплуатации
- Sony SF-16N4/T1 ET4 Инструкция по эксплуатации
- Tp-Link TL-R600VPN Инструкция по эксплуатации
- Toshiba GR-E311DTR Инструкция по эксплуатации
- Sony HDR-XR100E Инструкция по эксплуатации
- Tp-Link TL-R470T+ Инструкция по эксплуатации
- Panasonic NV-VP33 Инструкция по эксплуатации
- Sony HDR-SR8E Инструкция по эксплуатации
- Sony SF-32NX/T1 ET4 Инструкция по эксплуатации
- Tp-Link TL-R480T+ Инструкция по эксплуатации
- Sony HDR-SR7E Инструкция по эксплуатации
- Sony MRW68ED1 Инструкция по эксплуатации
- Tp-Link TL-ER5120 Инструкция по эксплуатации
- Hotpoint-Ariston AQGD 149 S Инструкция по эксплуатации
- Sony HDR-SR5E Инструкция по эксплуатации
- Sony MRW62ES2171 Инструкция по эксплуатации
- Tp-Link TL-R402M Инструкция по эксплуатации
- Panasonic TC-14F1 Инструкция по эксплуатации
- Sony HDR-SR1E Инструкция по эксплуатации
Скачать
Случайные обсуждения