TP-Link TL-ER6120 manual Send System Logs, Level Description

Page 132

 

Send System Logs:

Select Send System Logs and specify the server IP, then the new

 

 

added logs will be sent to the specified server.

The Logs of switch are classified into the following eight levels.

 

 

 

 

 

 

Severity

Level

Description

 

 

emergencies

0

The system is unusable.

 

 

 

 

 

 

 

alerts

1

Action must be taken immediately.

 

 

 

 

 

 

 

critical

2

Critical conditions

 

 

 

 

 

 

 

errors

3

Error conditions

 

 

 

 

 

 

 

warnings

4

Warnings conditions

 

 

 

 

 

 

 

notifications

5

Normal but significant conditions

 

 

 

 

 

 

 

informational

6

Informational messages

 

 

 

 

 

 

 

debugging

7

Debug-level messages

 

 

 

 

 

 

-127-

Image 132
Contents TL-ER6120 Multi-WAN VPN Router Copyright & Trademarks FCC Statement Contents Application 128 IIIHardware Specifications 158 159Glossary 161 Package Contents Intended Readers ConventionsOverview of this Guide Page Overview of the Router Features Multi-WAN PortsEasy-to-use HardwareAppearance Front PanelTraffic Control SecurityReset button LEDsStatus Indication Interface DescriptionPower Socket Rear PanelGrounding Terminal Network StatusSystem Mode StatusPage NAT Mode Non-NAT ModeWAN Mode Classic Mode¾ WAN Mode 3 WAN3.2 WAN1 Static IPDefault Gateway Connection TypeIP Address Subnet MaskWAN Dynamic IP Following items are displayed on this screen ¾ Dynamic IPGet IP Address by UnicastUse the following DNS ServerPPPoE ¾ PPPoE Settings WAN PPPoE Following items are displayed on this screenPassword Active ModeSettings Service NameSubnet Address Downstream Bandwidth¾ PPPoE Status L2TP ¾ L2TP Settings 10 WAN L2TP Following items are displayed on this screenServer IP SecondaryConnections Primary DNS/Secondary DNS Upstream Bandwidth Downstream ¾ L2TP StatusStatus IP Address Primary DNS Secondary DNS ¾ Pptp Settings 11 WAN Pptp Following items are displayed on this screenAccount Name Primary DNS/Secondary DNS¾ Pptp Status BigPond¾ BigPond Settings ¾ BigPond Status 4 LAN 4.1 LAN¾ Dhcp Settings DhcpDhcp Client Dhcp Reservation¾ Dhcp Reservation ¾ List of Reserved Address5 DMZ 5.1 DMZMAC Address ¾ DMZMode Set the MAC Address for LAN port Set the MAC Address for WAN portSet the MAC Address for DMZ port ¾ MAC AddressSwitch Statistics¾ Statistics Port Mirror ¾ General ¾ Port MirrorRate Control Application ExamplePort Config ¾ Rate Control¾ Port Config Port StatusUser Group Port Vlan¾ Port Vlan ¾ Group Config GroupUser ¾ List of Group¾ User Config View¾ List of User Group Name Select the name of the desired GroupNAT Setup Advanced1 NAT One-to-One NAT Mapping IP AddressInterface DMZ ForwardingMulti-Nets NAT ¾ Multi-Nets NATApplication Example Network Requirements Configuration procedure Virtual Server ¾ Virtual ServerProtocol Port Triggering 1.6 ALG ¾ Port TriggeringSetup Traffic Control¾ ALG 323 ALGUse ¾ Interface BandwidthBandwidth Control Guaranteed DirectionGroup Bandwidth Up Limited BandwidthSession Limit Session LimitConfiguration Load BalanceSession List ¾ Session LimitPolicy Routing 39 Policy RoutingLink Backup WAN40 Link Backup Following items are displayed on this screen Backup ProtocolTiming FailoverRouting Static Route¾ Protocol ¾ List of Protocol¾ Static Route Metric Description StatusApplication Example 5.2 RIP 43 RIP Following items are displayed on this screenRoute Table ¾ List of RIPFirewall Anti ARP SpoofingIP-MAC Binding ¾ IP-MAC Binding ARP Scanning 46 ARP ScanningAttack Defense ARP List¾ General MAC Filtering Not sure¾ MAC Filtering Access Control URL Filtering¾ URL Filtering Rule ObjectAccess Rules Web Filtering¾ Access Rules ServicePolicy Source Group on3.2.1 GroupDestination PriorityService 53 ServiceApp Control Control RulesName Dest. Port¾ Control Rules ApplicationVPN Database1 IKE IKE Policy57 IKE Policy Following items are displayed on this screen ¾ IKE PolicyIKE Proposal ¾ List of IKE Policy58 IKE Proposal Following items are displayed on this screen ¾ IKE ProposalIPsec IPsec Policy¾ List of IKE Proposal ¾ IPsec Policy Policy NameIKE Mode Manual Mode IPsec ProposalIncoming SPI Key-InIPsec Proposal Outgoing SPIKey-Out ¾ List of IPsec Policy IPsec¾ IPsec Proposal IPsec SA ¾ List of IPsec ProposalProtocol Media Tunnel Length of Header Authentication 3 L2TP/PPTP3.1 L2TP/PPTP Tunnel VPN-to-Internet Hello Interval¾ L2TP/PPTP Tunnel Page ¾ List of Configurations IP Address PoolIP Pool Remote SubnetServices PPPoE ServerList of L2TP/PPTP Tunnel ¾ List of IP PoolGeneral PPPoE User IsolationPrimary/Secondary Max SessionsIP Address Pool Account Pool NameIP Address Range ¾ Account Expiration DateStatus MAC Binding MAC Address Session Timeout Exceptional IP¾ List of Account ¾ Exceptional IPBulletin List of AccountIP Address Range Description Status Enable E-Bulletin Enable LogsInterval ¾ E-BulletinContent Object Effective Time Publisher Description Status Dynamic DNS¾ List of E-Bulletin Ddns Service DynDNS¾ Dyndns Ddns Domain NameNo-IP ¾ List of DynDNS Account¾ No-IP Ddns PeanutHull ¾ List of No-IP Account¾ PeanutHull Ddns Comexe ¾ List of PeanutHull Account¾ Comexe Ddns UPnP ¾ List of Comexe AccountMaintenance Admin SetupAdministrator ¾ List of UPnP MappingLogin Parameter ¾ AdministratorApplication Example Network Requirements Factory Defaults ManagementRemote Management ¾ Remote ManagementReboot ¾ Configuration VersionExport and Import ¾ ExportFirmware Upgrade LicenseStatistics Interface Traffic Statistics¾ Interface Traffic Statistics IP Traffic Statistics Displays the rate for receiving data frames¾ Advanced WAN Information Interface Displays the interface IP Fragment RxDiagnostics Diagnostics¾ IP Traffic Statistics Sorted by86 Diagnostics Following items are displayed on this screen ¾ PingOnline Detection ¾ TracertDetecting Time Port Displays the detected WAN port DetectionWAN Status Display the detecting results System TimeLogs Get GMTManual Synchronize WithSend System Logs Level DescriptionApplication Network RequirementsNetwork Topology Configurations Internet SettingSystem Mode Internet ConnectionLink Backup 131 VPN Setting IPsec VPNDPD IPsec Setting IPsec ProposalIPsec Policy WAN WAN1 Pptp VPN Setting IP Address PoolL2TP/PPTP Tunnel Network Management User GroupGroup User ViewEnable Bandwidth Control App ControlInterface Bandwidth Bandwidth Control RuleNetwork Security 16 Bandwidth Control RuleLAN ARP Defense Scan and import the entries to ARP ListSet IP-MAC Binding Entry Manually WAN ARP Defense Set Attack DefenseAttack Defense Traffic MonitoringPort Mirror 23 Port Mirror StatisticsPage Configuration CLIPage Connection Properties Settings 149 Interface Mode Mode Accessing Path Prompt Logout or Access the nextAdmin Online HelpCommand Introduction Get Get the ip configurationIp-mac 1 ip3 sys TP-LINK # sys restore TP-LINK # sys import config TP-LINK user set password Enter old password HistoryExit Power StandardsPorts Transmission MediumAppendix B FAQ Page Appendix C Glossary Glossary DescriptionAllows dissimilar communication devices to communicate By the Ieee Glossary Description
Related manuals
Manual 28 pages 33.55 Kb

TL-ER6120 specifications

The TP-Link TL-ER6120 is a robust and versatile gigabit router designed for small to medium-sized businesses, offering high-performance routing capabilities while ensuring secure network management. This device stands out for its user-friendly configuration, affordability, and rich feature set tailored for business needs.

One of the key features of the TL-ER6120 is its advanced routing capabilities. It supports load balancing and failover, ensuring reliable internet connectivity by distributing traffic across multiple WAN ports. This helps to maintain optimal performance even during high-traffic periods. The router can accommodate up to three WAN ports, providing flexibility in terms of connection options and redundancy.

Security is paramount in any business network, and the TL-ER6120 does not disappoint. It includes a robust firewall with stateful packet inspection, preventing unauthorized access and safeguarding sensitive data. The router also supports various VPN protocols, including PPTP, L2TP, and IPSec, enabling secure remote access for employees working from remote locations. This feature is particularly beneficial as remote work becomes more prevalent.

In addition to its security features, the TL-ER6120 offers support for VLAN configuration, allowing businesses to segment their networks for better performance and security. Dynamic Routing Protocols such as RIP v1/v2, and static routing are also supported, ensuring seamless data exchange across different network segments.

Another significant aspect of the TL-ER6120 is its Quality of Service (QoS) functionality. This feature enables users to prioritize bandwidth for critical applications, ensuring that services like VoIP and video conferencing maintain optimal performance. By managing the flow of data, businesses can enhance their operational efficiency.

The TL-ER6120 is equipped with several advanced management features, including a web-based user interface that simplifies network configuration and monitoring. Users can easily manage their network settings, view traffic statistics, and troubleshoot issues without advanced technical knowledge.

In conclusion, the TP-Link TL-ER6120 is an excellent choice for businesses seeking a reliable, feature-rich router. Its combination of security, performance, and ease of use makes it an ideal solution for managing business networks efficiently. Whether for load balancing, secure remote access, or network segmentation, the TL-ER6120 meets diverse business needs with sophistication and reliability.