TP-Link TL-ER6020 manual PeanutHull,  List of No-IP Account

Page 114

Account Name: Enter the Account Name of your DDNS account. If you have not registered, click <Go to register> to go to the website of No-IP for register.

Password:Enter the password of your DDNS account.

Domain Name: Enter the Domain Name that you registered with your DDNS service provider.

DDNS Service: Activate or inactivate DDNS service here.

WAN Port:Displays the WAN port for which No-IP DDNS is selected.

DDNS Status: Displays the current status of DDNS service

Offline: DDNS service is disabled.

Connecting: client is connecting to the server.

Online: DDNS works normally.

Authorization fails: The Account Name or Password is incorrect. Please check and enter it again.

List of No-IP Account

In this table, you can view the existing DDNS entries or edit them by the Action button.

3.6.3.3PeanutHull

On this page you can configure PeanutHull DDNS client.

Choose the menu Services→Dynamic DNS→PeanutHull to load the following page.

-109-

Image 114
Contents TL-ER6020 Gigabit Dual-WAN VPN Router REV1.0.1 1910010852COPYRIGHT & TRADEMARKS FCC STATEMENTCE Mark Warning CONTENTS Chapter 1 About this GuideChapter 4 Application Network RequirementsHardware Specifications GlossaryChapter 5 CLI  Two mounting brackets and other fittings  Installation Guide Package Contents One TL-ER6020 Router  One Power Cord  One Console Cable The following items should be found in your package1.1 Intended Readers SymbolChapter 1 About this Guide 1.2 ConventionsAppendix B FAQ Lists the hardware specifications of this RouterSpecifications Provides the possible solutions to the problems that may occur duringChapter 2 Introduction  Powerful Data Processing Capability Powerful Firewall 2.1 Overview of the Router Easy-to-use 2.2 Features Dual-WAN Ports HardwareTraffic Control 2.3 Appearance2.3.1 Front Panel SecurityStatus  Reset button LEDs Indication Grounding Terminal  Power Socket2.3.2 Rear Panel  Kensington Security Slot3.1.1 Status Chapter 3 Configuration3.1 Network 3.1.2 System ModeFigure 3-2 Network Topology - NAT Mode Figure 3-3 Network Topology - Non-NAT Mode NAT Mode  Classic Mode 3.1.3 WAN Non-NAT Mode 1 Static IP Static IP Downstream 2 Dynamic IPUpstream Bandwidth Specify the bandwidth for receiving packets on the port Dynamic IP  Dynamic IP Status 3 PPPoEFigure 3-8 WAN - PPPoE 576-1492. The default MTU is 1480. It is recommended to keep the  PPPoE Settingson. The connection can be re-established automatically when it Enter the Account Name provided by your ISP. If you are not clearHere allows you to configure the secondary connection. Dynamic IP Dynamic IP is selected, the obtained subnet address of WAN port is PPPoE Status 4 L2TPcorrect and your network is connected well. Consult your ISP if  L2TP Settings Figure 3-9 WAN - L2TPInternet connection by the Connect or Disconnect button. It  L2TP Status  PPTP Settings 5 PPTPFigure 3-10 WAN - PPTP Account Name  PPTP Status Status 6 BigPondPrimary DNS Secondary DNS Upstream Bandwidth Downstream Bandwidth  BigPond Settings  BigPond Status 3.1.4.2 DHCP 3.1.4 LAN3.1.4.1 LAN  LAN DHCP Settings 3.1.4.3 DHCP Client 3.1.4.4 DHCP Reservation3.1.5 DMZ  DHCP Reservation List of Reserved Address 3.1.5.1 DMZ 3.1.6 MAC Address  DMZSet the MAC Address for DMZ port Set the MAC Address for LAN portSet the MAC Address for WAN port  MAC Address3.1.7 Switch 3.1.7.1 Statistics3.1.7.2 Port Mirror  StatisticsGeneral Port MirrorMirroring Port 3.1.7.3 Rate Control Application Example3.1.7.4 Port Config  Rate Control Port Config 3.1.7.5 Port Status3.2 User Group 3.1.7.6 Port VLAN Port VLAN 3.2.2 User  Group Config3.2.1 Group  List of Group3.2.3 View  User Config View Config  List of User3.3.1.1 NAT Setup 3.3 Advanced3.3.1 NAT  NAT-DMZ 3.3.1.2 One-to-One NAT NAPT  One-to-One NAT3.3.1.3 Multi-Nets NAT  List of Rules Multi-Nets NAT  list of Rules Application Example Network RequirementsConfiguration procedure 3.3.1.4 Virtual Server  Virtual Server Protocol3.3.1.5 Port Triggering  Port TriggeringStatus 3.3.2 Traffic Control 3.3.1.6 ALG ALG 3.3.2.1 Setup  Default Limit General 3.3.2.2 Bandwidth Control  Interface Bandwidth Bandwidth Control Rule data flow might pass. Individual WAN port cannot be selected if3.3.3 Session Limit 3.3.3.1 Session Limit3.3.3.2 Session List 3.3.4.1 Configuration3.3.4 Load Balance  Session Limit3.3.4.2 Policy Routing 3.3.4.3 Link Backup You can select Timing or Failover Mode Failover 3.3.4.4 ProtocolTiming Status : Protocol 3.3.5 Routing3.3.5.1 Static Route  List of Protocol Static Route 3.3.5.2 RIP Choose the menu Advanced→Routing→RIP to load the following page 3.3.5.3 Route Table  List of RIP3.4 Firewall 3.4.1 Anti ARP Spoofing3.4.1.1 IP-MAC Binding  IP-MAC Binding 3.4.1.2 ARP Scanning 3.4.2 Attack Defense 3.4.1.3 ARP ListFigure 3-49 Attack Defense Enable Attack 3.4.3 MAC Filtering MAC Filtering Packet Anomaly3.4.4 Access Control 3.4.4.1 URL Filtering URL Filtering Rule Configuration Procedure Select the mode for URL Filtering. “Keyword’’ indicates that all the3.4.4.3 Access Rules  Access Rules3.4.4.2 Web Filtering other service types can still pass through the Router. You can add group on3.2.1 GroupSelect the service for the entry. Only the service belonging to the Select the Source IP Range for the entries, including the following3.4.4.4 Service Priority Service  List of Service3.4.5 App Control 3.4.5.1 Control Rules Control Rules 3.4.5.2 Database 3.5 VPN 3.5.1 IKE3.5.1.1 IKE Policy  IKE PolicySA Lifetime Specify ISAKMP SA Lifetime in IKE negotiation 3.5.1.2 IKE Proposal  List of IKE Policy IKE Proposal 3.5.2 IPsec  List of IKE ProposalPolicy Name 3.5.2.1 IPsec Policy IPsec Policy can be enteredwhich PCs on the remote network are covered by this policy. Its  IKE Modepolicy on VPN→IKE→IKE Policy page Gateway of the remote peer should be set to the IP address ofde-encrypted. Without PFS, the key in Phase2 is created based  Manual ModePhase2. As it is independent of the key created in Phase1, this de-encrypted, the key in Phase2 is easy to be de-encrypted, in3.5.2.2 IPsec Proposal  List of IPsec Policy IPsec IPsec Proposal 3.5.2.3 IPsec SA  List of IPsec Proposal3.5.3.1 L2TP/PPTP Tunnel Authentication3.5.3 L2TP/PPTP Protocol L2TP/PPTP Tunnel Enter the account name of L2TP/PPTP tunnel. It should be configured Select the IP Pool Name to specify the address range for the servers IP Address Pool  List of Configurations3.5.3.2 IP Address Pool  List of IP Pool3.5.3.3 List of L2TP/PPTP Tunnel 3.6 Services3.6.1 PPPoE Server 3.6.1.1 GeneralFigure 3-66 General The following items are displayed on this screen 3.6.1.2 IP Address Pool 3.6.1.3 Account  Account is 48. If Enable Advanced Account Features is not selected, the 3.6.1.4 Exceptional IP List of Account 3.6.2 E-Bulletin 3.6.1.5 List of Account Exceptional IP Title  E-BulletinInterval Specify the interval to release the bulletin3.6.3 Dynamic DNS  List of E-Bulletin3.6.3.1 DynDNS  Dyndns DDNS3.6.3.2 No-IP  List of DynDNS Account No-IP DDNS 3.6.3.3 PeanutHull  List of No-IP Account PeanutHull DDNS 3.6.3.4 Comexe  List of PeanutHull Account Comexe DDNS 3.6.4 UPnP  List of Comexe Account3.7.1.1 Administrator 3.7 Maintenance3.7.1 Admin Setup  Administrator3.7.1.2 Login Parameter Re-enter the new password for confirmation3.7.1.3 Remote Management  Remote Management List of Subnet 3.7.2.1 Factory Defaults 3.7.2 Management3.7.2.2 Export and Import  Export 3.7.2.3 Reboot Configuration Version  Import3.7.2.4 Firmware Upgrade 3.7.3 License3.7.4 Statistics 3.7.4.1 Interface Traffic Statistics Interface Traffic Statistics 3.7.4.2 IP Traffic Statistics  Advanced WAN Information Traffic Statistics 3.7.5 Diagnostics3.7.5.1 Diagnostics  IP Traffic Statistics Ping  Tracert3.7.5.2 Online Detection  List of WAN statusDisplays whether the Online Detection is enabled  Config 3.7.6 Time Current Time 3.7.7 Logs  List of LogsSeverity LevelError conditions The system is unusableChapter 4 Application 4.1 Network Requirements4.2 Network Topology 4.3 Configurations 4.3.1 Internet Setting4.3.1.3 Link Backup 4.3.1.1 System Mode4.3.1.2 Internet Connection Settings 4.3.2 VPN Setting1 IKE Setting 4.3.2.1 IPsec VPN IKE Policy AuthenticationMD5 Encryption3DES2 IPsec Setting  IPsec ProposalproposalIPsec1  IPsec Policy proposalIPsec1 you just created4.3.2.2 PPTP VPN Setting  IP Address Pool L2TP/PPTP Tunnel L2TP/PPTPEnable ProtocolPPTP ModeServer UsernamePPTP Passwordabcdefg Group 4.3.3 Network Management4.3.3.1 User Group  User4.3.3.2 App Control  View1 Enable Bandwidth Control 4.3.3.3 Bandwidth Control2 Interface Bandwidth 3 Bandwidth Control RuleKeep the default value 4.3.4 Network Security 4.3.3.4 Session Limit4.3.4.1 LAN ARP Defense 1 Scan and import the entries to ARP List2 Set IP-MAC Binding Entry Manually 4.3.4.2 WAN ARP Defense 3 Set Attack Defense00-11-22-33-44-aa 4.3.4.3 Attack Defense 4.3.4.4 Traffic Monitoring1 Port Mirror 2 Statistics Figure 4-23 IP Traffic Statistics 5.1 Configuration Chapter 5 CLIFigure 5-2 Connection Description Figure 5-3 Select the port to connectFigure 5-4 Port Settings Figure 5-5 Connection Properties Settings 1485.2 Interface Mode enable Accessing PathLogout or Access the next mode adminIP configuration enableShow command history IP mac bind configuration5.4.1 ip 5.4 Command Introduction5.4.2 ip-mac TP-LINK ip get lan Lan Ip Lan MaskThis command will restore system, Continue?Y/N TP-LINK # sys reboot This command will reboot system, Continue?Y/NTP-LINK # sys restore TP-LINK # sys export configGet configuration file config bin succeed, file size is 7104 bytes Password admin File name config.binTry to get the configuration file config.bin TP-LINK sys show CPU Used Rate 1% TP-LINK # sys updateEnter new password Confirm new password TP-LINK user get Username admin Password adminTP-LINK user set password Enter old password TP-LINK # user get Username admin Password adminTP-LINK history View the history command5.4.6 exit 1. history 2. sys show 3. historyStandards Appendix A Hardware SpecificationsPower PortsAppendix B FAQ 4. Make sure that the NAT DMZ service is disabled AH(Authentication Header) Appendix C GlossaryGlossary data authentication, and anti-replay services. ESP encapsulatesfor services such as IPSec that require keys. Before any IPSec Glossary Telnet is used for remote terminal connection, enabling users to enterprise
Related manuals
Manual 28 pages 30.84 Kb

TL-ER6020 specifications

The TP-Link TL-ER6020 is a robust and efficient router designed for small to medium-sized businesses seeking reliable network performance and advanced features. Combining dual WAN capability with comprehensive security features, it ensures that businesses can maintain consistent and secure internet connectivity, even during peak usage times or in the event of a failure from one ISP.

One of the primary features of the TL-ER6020 is its dual WAN support, which allows users to connect two different internet sources. This not only enhances reliability through load balancing but also ensures redundancy. In cases where the primary WAN connection fails, the router can seamlessly switch to the secondary connection, minimizing downtime and maintaining business operations.

Security is a critical aspect of any network appliance, and the TL-ER6020 does not disappoint. It comes equipped with multiple security features, including advanced firewall capabilities, IP/MAC/URL filtering, and DoS attacks prevention. These tools work together to provide a secure network environment, safeguarding sensitive business data from unauthorized access and potential threats.

The router also supports VLAN (Virtual Local Area Network) technology, which allows businesses to segment their networks for better performance and security. By creating separate networks for different departments or functions, companies can enhance their network management and control traffic flow more efficiently.

Additionally, the TL-ER6020 features quality of service (QoS) capabilities that prioritize network traffic based on user needs. This ensures that critical applications, such as VoIP or video conferencing, receive the bandwidth they require for optimal performance, while less critical traffic is deprioritized during peak times.

For user management, the TL-ER6020 includes an intuitive web-based interface that simplifies configuration and monitoring. Administrators can easily manage network settings, view statistics, and troubleshoot issues without the need for extensive technical expertise.

In terms of physical specifications, the TL-ER6020 is built with reliability in mind, featuring cooling vents to prevent overheating and an efficient power supply. Its compact design allows for easy placement in various environments, whether in a server room or on a desk.

Overall, the TP-Link TL-ER6020 is a solid choice for businesses looking to build a secure, versatile, and high-performance network. Its combination of dual WAN capabilities, strong security features, VLAN support, and QoS make it a comprehensive solution for modern networking needs.