TP-Link TL-ER6020 manual Interface Mode

Page 154
5.2 Interface Mode

7.The DOS prompting “TP-LINK>” will appear after pressing the Enter button in the Hyper Terminal window as Figure 5-6shows.

Figure 5-6 Log in the Router

5.2 Interface Mode

The CLI of TL-ER6020 offers two command modes: User EXEC Mode and Privileged EXEC Mode. User EXEC Mode only allows users to do some simple operations such as view the system information, while Privileged EXEC Mode allows you to manage and configure the Router. Thus different users have different privileges management.

User EXEC Mode: users should type the user name and password of the Router (the factory default value for both of them is admin) when logging in the Router by Telnet. No password is needed when connecting the console port with the Router. Then the users get the privilege to the User level and can do some simple operations but cannot modify the Router’s configurations.

Privileged EXEC Mode: Users can enter Privileged EXEC mode from User EXEC mode by password authentication. Then the users get the privilege to the User level and can do any configurations to the Router.

The CLI users are in User EXEC Mode by default and free to switch between User EXEC Mode and Privileged EXEC Mode. The following table gives detailed information about the Accessing Path, Prompt of each mode and how to exit the current mode and access the next mode.

-149-

Image 154
Contents TL-ER6020 Gigabit Dual-WAN VPN Router REV1.0.1 1910010852FCC STATEMENT COPYRIGHT & TRADEMARKSCE Mark Warning CONTENTS Chapter 1 About this GuideChapter 4 Application Network RequirementsGlossary Hardware SpecificationsChapter 5 CLI  Two mounting brackets and other fittings  Installation Guide Package Contents One TL-ER6020 Router  One Power Cord  One Console Cable The following items should be found in your package1.1 Intended Readers SymbolChapter 1 About this Guide 1.2 ConventionsAppendix B FAQ Lists the hardware specifications of this RouterSpecifications Provides the possible solutions to the problems that may occur duringChapter 2 Introduction  Powerful Data Processing Capability Powerful Firewall 2.1 Overview of the Router Easy-to-use 2.2 Features Dual-WAN Ports HardwareTraffic Control 2.3 Appearance2.3.1 Front Panel SecurityStatus  Reset button LEDs Indication Grounding Terminal  Power Socket2.3.2 Rear Panel  Kensington Security Slot3.1.1 Status Chapter 3 Configuration3.1 Network 3.1.2 System ModeFigure 3-2 Network Topology - NAT Mode Figure 3-3 Network Topology - Non-NAT Mode NAT Mode  Classic Mode 3.1.3 WAN Non-NAT Mode 1 Static IP Static IP Downstream 2 Dynamic IPUpstream Bandwidth Specify the bandwidth for receiving packets on the port Dynamic IP  Dynamic IP Status 3 PPPoEFigure 3-8 WAN - PPPoE 576-1492. The default MTU is 1480. It is recommended to keep the  PPPoE Settingson. The connection can be re-established automatically when it Enter the Account Name provided by your ISP. If you are not clearHere allows you to configure the secondary connection. Dynamic IP Dynamic IP is selected, the obtained subnet address of WAN port is4 L2TP  PPPoE Statuscorrect and your network is connected well. Consult your ISP if  L2TP Settings Figure 3-9 WAN - L2TPInternet connection by the Connect or Disconnect button. It  L2TP Status 5 PPTP  PPTP SettingsFigure 3-10 WAN - PPTP Account Name 6 BigPond  PPTP Status StatusPrimary DNS Secondary DNS Upstream Bandwidth Downstream Bandwidth  BigPond Settings  BigPond Status 3.1.4.2 DHCP 3.1.4 LAN3.1.4.1 LAN  LAN DHCP Settings 3.1.4.3 DHCP Client 3.1.4.4 DHCP Reservation DHCP Reservation 3.1.5 DMZ List of Reserved Address 3.1.5.1 DMZ 3.1.6 MAC Address  DMZSet the MAC Address for DMZ port Set the MAC Address for LAN portSet the MAC Address for WAN port  MAC Address3.1.7 Switch 3.1.7.1 Statistics3.1.7.2 Port Mirror  StatisticsPort Mirror GeneralMirroring Port 3.1.7.3 Rate Control Application Example3.1.7.4 Port Config  Rate Control Port Config 3.1.7.5 Port Status3.1.7.6 Port VLAN 3.2 User Group Port VLAN 3.2.2 User  Group Config3.2.1 Group  List of Group3.2.3 View  User Config View Config  List of User3.3 Advanced 3.3.1.1 NAT Setup3.3.1 NAT  NAT-DMZ 3.3.1.2 One-to-One NAT NAPT  One-to-One NAT List of Rules 3.3.1.3 Multi-Nets NAT Multi-Nets NAT  list of Rules Application Example Network RequirementsConfiguration procedure 3.3.1.4 Virtual Server  Virtual Server Protocol3.3.1.5 Port Triggering  Port TriggeringStatus 3.3.1.6 ALG 3.3.2 Traffic Control ALG  Default Limit 3.3.2.1 Setup General 3.3.2.2 Bandwidth Control  Interface Bandwidth Bandwidth Control Rule data flow might pass. Individual WAN port cannot be selected if3.3.3 Session Limit 3.3.3.1 Session Limit3.3.3.2 Session List 3.3.4.1 Configuration3.3.4 Load Balance  Session Limit3.3.4.2 Policy Routing 3.3.4.3 Link Backup You can select Timing or Failover Mode Failover 3.3.4.4 ProtocolTiming Status : Protocol 3.3.5 Routing3.3.5.1 Static Route  List of Protocol Static Route 3.3.5.2 RIP Choose the menu Advanced→Routing→RIP to load the following page 3.3.5.3 Route Table  List of RIP3.4.1 Anti ARP Spoofing 3.4 Firewall3.4.1.1 IP-MAC Binding  IP-MAC Binding 3.4.1.2 ARP Scanning 3.4.2 Attack Defense 3.4.1.3 ARP ListFigure 3-49 Attack Defense Enable Attack 3.4.3 MAC Filtering MAC Filtering Packet Anomaly3.4.4.1 URL Filtering 3.4.4 Access Control URL Filtering Rule Configuration Procedure Select the mode for URL Filtering. “Keyword’’ indicates that all the Access Rules 3.4.4.3 Access Rules3.4.4.2 Web Filtering other service types can still pass through the Router. You can add group on3.2.1 GroupSelect the service for the entry. Only the service belonging to the Select the Source IP Range for the entries, including the following3.4.4.4 Service Priority Service  List of Service3.4.5.1 Control Rules 3.4.5 App Control Control Rules 3.4.5.2 Database 3.5 VPN 3.5.1 IKE3.5.1.1 IKE Policy  IKE PolicySA Lifetime Specify ISAKMP SA Lifetime in IKE negotiation  List of IKE Policy 3.5.1.2 IKE Proposal IKE Proposal 3.5.2 IPsec  List of IKE ProposalPolicy Name 3.5.2.1 IPsec Policy IPsec Policy can be enteredwhich PCs on the remote network are covered by this policy. Its  IKE Modepolicy on VPN→IKE→IKE Policy page Gateway of the remote peer should be set to the IP address ofde-encrypted. Without PFS, the key in Phase2 is created based  Manual ModePhase2. As it is independent of the key created in Phase1, this de-encrypted, the key in Phase2 is easy to be de-encrypted, in3.5.2.2 IPsec Proposal  List of IPsec Policy IPsec IPsec Proposal 3.5.2.3 IPsec SA  List of IPsec Proposal3.5.3.1 L2TP/PPTP Tunnel Authentication3.5.3 L2TP/PPTP Protocol L2TP/PPTP Tunnel Enter the account name of L2TP/PPTP tunnel. It should be configured Select the IP Pool Name to specify the address range for the servers IP Address Pool  List of Configurations3.5.3.2 IP Address Pool  List of IP Pool3.5.3.3 List of L2TP/PPTP Tunnel 3.6 Services3.6.1 PPPoE Server 3.6.1.1 GeneralFigure 3-66 General The following items are displayed on this screen 3.6.1.2 IP Address Pool 3.6.1.3 Account  Account 3.6.1.4 Exceptional IP is 48. If Enable Advanced Account Features is not selected, the List of Account 3.6.1.5 List of Account 3.6.2 E-Bulletin Exceptional IP Title  E-BulletinInterval Specify the interval to release the bulletin3.6.3 Dynamic DNS  List of E-Bulletin3.6.3.1 DynDNS  Dyndns DDNS List of DynDNS Account 3.6.3.2 No-IP No-IP DDNS 3.6.3.3 PeanutHull  List of No-IP Account PeanutHull DDNS  List of PeanutHull Account 3.6.3.4 Comexe Comexe DDNS 3.6.4 UPnP  List of Comexe Account3.7.1.1 Administrator 3.7 Maintenance3.7.1 Admin Setup  Administrator3.7.1.2 Login Parameter Re-enter the new password for confirmation Remote Management 3.7.1.3 Remote Management List of Subnet 3.7.2 Management 3.7.2.1 Factory Defaults3.7.2.2 Export and Import  Export 3.7.2.3 Reboot Configuration Version  Import3.7.2.4 Firmware Upgrade 3.7.3 License3.7.4.1 Interface Traffic Statistics 3.7.4 Statistics Interface Traffic Statistics 3.7.4.2 IP Traffic Statistics  Advanced WAN Information Traffic Statistics 3.7.5 Diagnostics3.7.5.1 Diagnostics  IP Traffic Statistics Ping  Tracert List of WAN status 3.7.5.2 Online DetectionDisplays whether the Online Detection is enabled 3.7.6 Time  Config Current Time 3.7.7 Logs  List of LogsSeverity LevelError conditions The system is unusableChapter 4 Application 4.1 Network Requirements4.2 Network Topology 4.3 Configurations 4.3.1 Internet Setting4.3.1.1 System Mode 4.3.1.3 Link Backup4.3.1.2 Internet Connection Settings 4.3.2 VPN Setting1 IKE Setting 4.3.2.1 IPsec VPN IKE Policy AuthenticationMD5 Encryption3DES IPsec Proposal 2 IPsec SettingproposalIPsec1  IPsec Policy proposalIPsec1 you just created4.3.2.2 PPTP VPN Setting  IP Address Pool L2TP/PPTP Tunnel L2TP/PPTPEnable ProtocolPPTP ModeServer UsernamePPTP Passwordabcdefg Group 4.3.3 Network Management4.3.3.1 User Group  User4.3.3.2 App Control  View1 Enable Bandwidth Control 4.3.3.3 Bandwidth Control3 Bandwidth Control Rule 2 Interface BandwidthKeep the default value 4.3.4 Network Security 4.3.3.4 Session Limit1 Scan and import the entries to ARP List 4.3.4.1 LAN ARP Defense2 Set IP-MAC Binding Entry Manually 3 Set Attack Defense 4.3.4.2 WAN ARP Defense00-11-22-33-44-aa 4.3.4.4 Traffic Monitoring 4.3.4.3 Attack Defense1 Port Mirror 2 Statistics Figure 4-23 IP Traffic Statistics 5.1 Configuration Chapter 5 CLIFigure 5-2 Connection Description Figure 5-3 Select the port to connectFigure 5-4 Port Settings Figure 5-5 Connection Properties Settings 1485.2 Interface Mode enable Accessing PathLogout or Access the next mode adminIP configuration enableShow command history IP mac bind configuration5.4.1 ip 5.4 Command Introduction5.4.2 ip-mac TP-LINK ip get lan Lan Ip Lan MaskThis command will restore system, Continue?Y/N TP-LINK # sys reboot This command will reboot system, Continue?Y/NTP-LINK # sys restore TP-LINK # sys export configGet configuration file config bin succeed, file size is 7104 bytes Password admin File name config.binTry to get the configuration file config.bin TP-LINK sys show CPU Used Rate 1% TP-LINK # sys updateEnter new password Confirm new password TP-LINK user get Username admin Password adminTP-LINK user set password Enter old password TP-LINK # user get Username admin Password adminTP-LINK history View the history command5.4.6 exit 1. history 2. sys show 3. historyStandards Appendix A Hardware SpecificationsPower PortsAppendix B FAQ 4. Make sure that the NAT DMZ service is disabled AH(Authentication Header) Appendix C GlossaryGlossary data authentication, and anti-replay services. ESP encapsulatesfor services such as IPSec that require keys. Before any IPSec Glossary Telnet is used for remote terminal connection, enabling users to enterprise
Related manuals
Manual 28 pages 30.84 Kb

TL-ER6020 specifications

The TP-Link TL-ER6020 is a robust and efficient router designed for small to medium-sized businesses seeking reliable network performance and advanced features. Combining dual WAN capability with comprehensive security features, it ensures that businesses can maintain consistent and secure internet connectivity, even during peak usage times or in the event of a failure from one ISP.

One of the primary features of the TL-ER6020 is its dual WAN support, which allows users to connect two different internet sources. This not only enhances reliability through load balancing but also ensures redundancy. In cases where the primary WAN connection fails, the router can seamlessly switch to the secondary connection, minimizing downtime and maintaining business operations.

Security is a critical aspect of any network appliance, and the TL-ER6020 does not disappoint. It comes equipped with multiple security features, including advanced firewall capabilities, IP/MAC/URL filtering, and DoS attacks prevention. These tools work together to provide a secure network environment, safeguarding sensitive business data from unauthorized access and potential threats.

The router also supports VLAN (Virtual Local Area Network) technology, which allows businesses to segment their networks for better performance and security. By creating separate networks for different departments or functions, companies can enhance their network management and control traffic flow more efficiently.

Additionally, the TL-ER6020 features quality of service (QoS) capabilities that prioritize network traffic based on user needs. This ensures that critical applications, such as VoIP or video conferencing, receive the bandwidth they require for optimal performance, while less critical traffic is deprioritized during peak times.

For user management, the TL-ER6020 includes an intuitive web-based interface that simplifies configuration and monitoring. Administrators can easily manage network settings, view statistics, and troubleshoot issues without the need for extensive technical expertise.

In terms of physical specifications, the TL-ER6020 is built with reliability in mind, featuring cooling vents to prevent overheating and an efficient power supply. Its compact design allows for easy placement in various environments, whether in a server room or on a desk.

Overall, the TP-Link TL-ER6020 is a solid choice for businesses looking to build a secure, versatile, and high-performance network. Its combination of dual WAN capabilities, strong security features, VLAN support, and QoS make it a comprehensive solution for modern networking needs.