TP-Link TL-ER6120 manual Session Limit

Page 64

Note:

The premise for single rule taking effect is that the bandwidth of the interface for this rule is sufficient and not used up.

It is impossible to satisfy all the guaranteed bandwidth if the total guaranteed bandwidth specified by all Bandwidth Control rules for certain interface exceeds the physical bandwidth of this interface.

When DMZ port is disabled, it is only allowed deleting operation to the related rules.

3.3.3 Session Limit

The amount of TCP and UDP sessions supported by the Router is finite. If there are some local hosts transmitting too many TCP and UDP sessions to the public network, the communication quality of the other local hosts will be affected, thus it is necessary to limit the sessions of those hosts.

3.3.3.1Session Limit

On this page, you can configure the session limit to specified PCs.

Choose the menu Advanced→Session Limit→Session Limit to load the following page.

Figure 3-36 Session Limit

The following items are displayed on this screen:

¾General

-59-

Image 64
Contents TL-ER6120 Multi-WAN VPN Router Copyright & Trademarks FCC Statement Contents Application 128 III159 Hardware Specifications 158Glossary 161 Package Contents Conventions Intended ReadersOverview of this Guide Page Overview of the Router Features Multi-WAN PortsEasy-to-use HardwareAppearance Front PanelTraffic Control SecurityReset button LEDsStatus Indication Interface DescriptionRear Panel Power SocketGrounding Terminal Network StatusSystem Mode StatusPage NAT Mode Non-NAT ModeWAN Mode Classic Mode¾ WAN Mode 3 WAN3.2 WAN1 Static IPDefault Gateway Connection TypeIP Address Subnet MaskWAN Dynamic IP Following items are displayed on this screen ¾ Dynamic IPGet IP Address by UnicastUse the following DNS ServerPPPoE ¾ PPPoE Settings WAN PPPoE Following items are displayed on this screenPassword Active ModeSettings Service NameDownstream Bandwidth Subnet Address¾ PPPoE Status L2TP ¾ L2TP Settings 10 WAN L2TP Following items are displayed on this screenSecondary Server IPConnections ¾ L2TP Status Primary DNS/Secondary DNS Upstream Bandwidth DownstreamStatus IP Address Primary DNS Secondary DNS ¾ Pptp Settings 11 WAN Pptp Following items are displayed on this screenAccount Name Primary DNS/Secondary DNS¾ Pptp Status BigPond¾ BigPond Settings ¾ BigPond Status 4 LAN 4.1 LAN¾ Dhcp Settings DhcpDhcp Client Dhcp Reservation¾ Dhcp Reservation ¾ List of Reserved Address5 DMZ 5.1 DMZ¾ DMZ MAC AddressMode Set the MAC Address for LAN port Set the MAC Address for WAN portSet the MAC Address for DMZ port ¾ MAC AddressStatistics Switch¾ Statistics Port Mirror ¾ General ¾ Port MirrorRate Control Application ExamplePort Config ¾ Rate Control¾ Port Config Port StatusPort Vlan User Group¾ Port Vlan ¾ Group Config GroupUser ¾ List of Group¾ User Config View¾ List of User Group Name Select the name of the desired GroupAdvanced NAT Setup1 NAT One-to-One NAT Mapping IP AddressInterface DMZ ForwardingMulti-Nets NAT ¾ Multi-Nets NATApplication Example Network Requirements Configuration procedure ¾ Virtual Server Virtual ServerProtocol Port Triggering 1.6 ALG ¾ Port TriggeringSetup Traffic Control¾ ALG 323 ALGUse ¾ Interface BandwidthBandwidth Control Guaranteed DirectionGroup Bandwidth Up Limited BandwidthSession Limit Session LimitConfiguration Load BalanceSession List ¾ Session LimitPolicy Routing 39 Policy RoutingLink Backup WAN40 Link Backup Following items are displayed on this screen Backup ProtocolTiming FailoverRouting Static Route¾ Protocol ¾ List of Protocol¾ Static Route Metric Description StatusApplication Example 5.2 RIP 43 RIP Following items are displayed on this screenRoute Table ¾ List of RIPAnti ARP Spoofing FirewallIP-MAC Binding ¾ IP-MAC Binding ARP Scanning 46 ARP ScanningAttack Defense ARP List¾ General Not sure MAC Filtering¾ MAC Filtering Access Control URL Filtering¾ URL Filtering Rule ObjectAccess Rules Web FilteringService ¾ Access RulesPolicy Source Group on3.2.1 GroupDestination PriorityService 53 ServiceApp Control Control RulesName Dest. Port¾ Control Rules ApplicationVPN Database1 IKE IKE Policy57 IKE Policy Following items are displayed on this screen ¾ IKE PolicyIKE Proposal ¾ List of IKE Policy58 IKE Proposal Following items are displayed on this screen ¾ IKE ProposalIPsec Policy IPsec¾ List of IKE Proposal ¾ IPsec Policy Policy NameIKE Mode Manual Mode IPsec ProposalIncoming SPI Key-InIPsec Proposal Outgoing SPIKey-Out ¾ List of IPsec Policy IPsec¾ IPsec Proposal IPsec SA ¾ List of IPsec Proposal3 L2TP/PPTP Protocol Media Tunnel Length of Header Authentication3.1 L2TP/PPTP Tunnel Hello Interval VPN-to-Internet¾ L2TP/PPTP Tunnel Page ¾ List of Configurations IP Address PoolIP Pool Remote SubnetServices PPPoE ServerList of L2TP/PPTP Tunnel ¾ List of IP PoolGeneral PPPoE User IsolationPrimary/Secondary Max SessionsIP Address Pool Pool Name AccountIP Address Range ¾ Account Expiration DateStatus MAC Binding MAC Address Session Timeout Exceptional IP¾ List of Account ¾ Exceptional IPList of Account BulletinIP Address Range Description Status Enable E-Bulletin Enable LogsInterval ¾ E-BulletinDynamic DNS Content Object Effective Time Publisher Description Status¾ List of E-Bulletin Ddns Service DynDNS¾ Dyndns Ddns Domain Name¾ List of DynDNS Account No-IP¾ No-IP Ddns ¾ List of No-IP Account PeanutHull¾ PeanutHull Ddns ¾ List of PeanutHull Account Comexe¾ Comexe Ddns UPnP ¾ List of Comexe AccountMaintenance Admin SetupAdministrator ¾ List of UPnP MappingLogin Parameter ¾ AdministratorApplication Example Network Requirements Factory Defaults ManagementRemote Management ¾ Remote ManagementReboot ¾ Configuration VersionExport and Import ¾ ExportFirmware Upgrade LicenseInterface Traffic Statistics Statistics¾ Interface Traffic Statistics IP Traffic Statistics Displays the rate for receiving data frames¾ Advanced WAN Information Interface Displays the interface IP Fragment RxDiagnostics Diagnostics¾ IP Traffic Statistics Sorted by86 Diagnostics Following items are displayed on this screen ¾ Ping¾ Tracert Online DetectionDetecting Time Port Displays the detected WAN port DetectionWAN Status Display the detecting results System TimeLogs Get GMTManual Synchronize WithSend System Logs Level DescriptionApplication Network RequirementsNetwork Topology Configurations Internet SettingSystem Mode Internet ConnectionLink Backup 131 VPN Setting IPsec VPNDPD IPsec Proposal IPsec SettingIPsec Policy WAN WAN1 IP Address Pool Pptp VPN SettingL2TP/PPTP Tunnel User Group Network ManagementGroup User ViewEnable Bandwidth Control App ControlInterface Bandwidth Bandwidth Control RuleNetwork Security 16 Bandwidth Control RuleScan and import the entries to ARP List LAN ARP DefenseSet IP-MAC Binding Entry Manually WAN ARP Defense Set Attack DefenseTraffic Monitoring Attack DefensePort Mirror 23 Port Mirror StatisticsPage Configuration CLIPage Connection Properties Settings 149 Interface Mode Mode Accessing Path Prompt Logout or Access the nextAdmin Online HelpCommand Introduction Get Get the ip configuration1 ip Ip-mac3 sys TP-LINK # sys restore TP-LINK # sys import config TP-LINK user set password Enter old password HistoryExit Power StandardsPorts Transmission MediumAppendix B FAQ Page Appendix C Glossary Glossary DescriptionAllows dissimilar communication devices to communicate By the Ieee Glossary Description
Related manuals
Manual 28 pages 33.55 Kb

TL-ER6120 specifications

The TP-Link TL-ER6120 is a robust and versatile gigabit router designed for small to medium-sized businesses, offering high-performance routing capabilities while ensuring secure network management. This device stands out for its user-friendly configuration, affordability, and rich feature set tailored for business needs.

One of the key features of the TL-ER6120 is its advanced routing capabilities. It supports load balancing and failover, ensuring reliable internet connectivity by distributing traffic across multiple WAN ports. This helps to maintain optimal performance even during high-traffic periods. The router can accommodate up to three WAN ports, providing flexibility in terms of connection options and redundancy.

Security is paramount in any business network, and the TL-ER6120 does not disappoint. It includes a robust firewall with stateful packet inspection, preventing unauthorized access and safeguarding sensitive data. The router also supports various VPN protocols, including PPTP, L2TP, and IPSec, enabling secure remote access for employees working from remote locations. This feature is particularly beneficial as remote work becomes more prevalent.

In addition to its security features, the TL-ER6120 offers support for VLAN configuration, allowing businesses to segment their networks for better performance and security. Dynamic Routing Protocols such as RIP v1/v2, and static routing are also supported, ensuring seamless data exchange across different network segments.

Another significant aspect of the TL-ER6120 is its Quality of Service (QoS) functionality. This feature enables users to prioritize bandwidth for critical applications, ensuring that services like VoIP and video conferencing maintain optimal performance. By managing the flow of data, businesses can enhance their operational efficiency.

The TL-ER6120 is equipped with several advanced management features, including a web-based user interface that simplifies network configuration and monitoring. Users can easily manage their network settings, view traffic statistics, and troubleshoot issues without advanced technical knowledge.

In conclusion, the TP-Link TL-ER6120 is an excellent choice for businesses seeking a reliable, feature-rich router. Its combination of security, performance, and ease of use makes it an ideal solution for managing business networks efficiently. Whether for load balancing, secure remote access, or network segmentation, the TL-ER6120 meets diverse business needs with sophistication and reliability.