TP-Link TL-ER6020  L2TP Settings, 9 WAN - L2TP, The following items are displayed on this screen

Page 26
Figure 3-9 WAN - L2TP

Figure 3-9 WAN - L2TP

The following items are displayed on this screen:

L2TP Settings

Connection Type: Select L2TP if your ISP provides a L2TP connection. Click <Connect> to dial-up to the Internet and obtain the IP address. Click <Disconnect> to disconnect the Internet connection and release the current IP address.

-21-

Image 26
Contents TL-ER6020 Gigabit Dual-WAN VPN Router REV1.0.1 1910010852CE Mark Warning COPYRIGHT & TRADEMARKSFCC STATEMENT CONTENTS Chapter 1 About this GuideChapter 4 Application Network RequirementsChapter 5 CLI Hardware SpecificationsGlossary  Two mounting brackets and other fittings  Installation Guide Package Contents One TL-ER6020 Router  One Power Cord  One Console Cable The following items should be found in your package1.1 Intended Readers SymbolChapter 1 About this Guide 1.2 ConventionsAppendix B FAQ Lists the hardware specifications of this RouterSpecifications Provides the possible solutions to the problems that may occur duringChapter 2 Introduction  Powerful Data Processing Capability Powerful Firewall 2.1 Overview of the Router Easy-to-use 2.2 Features Dual-WAN Ports HardwareTraffic Control 2.3 Appearance2.3.1 Front Panel SecurityStatus  Reset button LEDs Indication Grounding Terminal  Power Socket2.3.2 Rear Panel  Kensington Security Slot3.1.1 Status Chapter 3 Configuration3.1 Network 3.1.2 System ModeFigure 3-2 Network Topology - NAT Mode Figure 3-3 Network Topology - Non-NAT Mode NAT Mode  Classic Mode 3.1.3 WAN Non-NAT Mode 1 Static IP Static IP Downstream 2 Dynamic IPUpstream Bandwidth Specify the bandwidth for receiving packets on the port Dynamic IP  Dynamic IP Status 3 PPPoEFigure 3-8 WAN - PPPoE 576-1492. The default MTU is 1480. It is recommended to keep the  PPPoE Settingson. The connection can be re-established automatically when it Enter the Account Name provided by your ISP. If you are not clearHere allows you to configure the secondary connection. Dynamic IP Dynamic IP is selected, the obtained subnet address of WAN port iscorrect and your network is connected well. Consult your ISP if  PPPoE Status4 L2TP  L2TP Settings Figure 3-9 WAN - L2TPInternet connection by the Connect or Disconnect button. It  L2TP Status Figure 3-10 WAN - PPTP  PPTP Settings5 PPTP Account Name Primary DNS Secondary DNS Upstream Bandwidth Downstream Bandwidth  PPTP Status Status6 BigPond  BigPond Settings  BigPond Status 3.1.4.2 DHCP 3.1.4 LAN3.1.4.1 LAN  LAN DHCP Settings 3.1.4.3 DHCP Client 3.1.4.4 DHCP Reservation List of Reserved Address 3.1.5 DMZ DHCP Reservation 3.1.5.1 DMZ 3.1.6 MAC Address  DMZSet the MAC Address for DMZ port Set the MAC Address for LAN portSet the MAC Address for WAN port  MAC Address3.1.7 Switch 3.1.7.1 Statistics3.1.7.2 Port Mirror  StatisticsMirroring Port GeneralPort Mirror 3.1.7.3 Rate Control Application Example3.1.7.4 Port Config  Rate Control Port Config 3.1.7.5 Port Status Port VLAN 3.2 User Group3.1.7.6 Port VLAN 3.2.2 User  Group Config3.2.1 Group  List of Group3.2.3 View  User Config View Config  List of User3.3.1 NAT 3.3.1.1 NAT Setup3.3 Advanced  NAT-DMZ 3.3.1.2 One-to-One NAT NAPT  One-to-One NAT Multi-Nets NAT 3.3.1.3 Multi-Nets NAT List of Rules  list of Rules Application Example Network RequirementsConfiguration procedure 3.3.1.4 Virtual Server  Virtual Server Protocol3.3.1.5 Port Triggering  Port TriggeringStatus  ALG 3.3.2 Traffic Control3.3.1.6 ALG  General 3.3.2.1 Setup Default Limit 3.3.2.2 Bandwidth Control  Interface Bandwidth Bandwidth Control Rule data flow might pass. Individual WAN port cannot be selected if3.3.3 Session Limit 3.3.3.1 Session Limit3.3.3.2 Session List 3.3.4.1 Configuration3.3.4 Load Balance  Session Limit3.3.4.2 Policy Routing 3.3.4.3 Link Backup You can select Timing or Failover Mode Failover 3.3.4.4 ProtocolTiming Status : Protocol 3.3.5 Routing3.3.5.1 Static Route  List of Protocol Static Route 3.3.5.2 RIP Choose the menu Advanced→Routing→RIP to load the following page 3.3.5.3 Route Table  List of RIP3.4.1.1 IP-MAC Binding 3.4 Firewall3.4.1 Anti ARP Spoofing  IP-MAC Binding 3.4.1.2 ARP Scanning 3.4.2 Attack Defense 3.4.1.3 ARP ListFigure 3-49 Attack Defense Enable Attack 3.4.3 MAC Filtering MAC Filtering Packet Anomaly URL Filtering Rule 3.4.4 Access Control3.4.4.1 URL Filtering Configuration Procedure Select the mode for URL Filtering. “Keyword’’ indicates that all the3.4.4.2 Web Filtering 3.4.4.3 Access Rules Access Rules other service types can still pass through the Router. You can add group on3.2.1 GroupSelect the service for the entry. Only the service belonging to the Select the Source IP Range for the entries, including the following3.4.4.4 Service Priority Service  List of Service Control Rules 3.4.5 App Control3.4.5.1 Control Rules 3.4.5.2 Database 3.5 VPN 3.5.1 IKE3.5.1.1 IKE Policy  IKE PolicySA Lifetime Specify ISAKMP SA Lifetime in IKE negotiation  IKE Proposal 3.5.1.2 IKE Proposal List of IKE Policy 3.5.2 IPsec  List of IKE ProposalPolicy Name 3.5.2.1 IPsec Policy IPsec Policy can be enteredwhich PCs on the remote network are covered by this policy. Its  IKE Modepolicy on VPN→IKE→IKE Policy page Gateway of the remote peer should be set to the IP address ofde-encrypted. Without PFS, the key in Phase2 is created based  Manual ModePhase2. As it is independent of the key created in Phase1, this de-encrypted, the key in Phase2 is easy to be de-encrypted, in3.5.2.2 IPsec Proposal  List of IPsec Policy IPsec IPsec Proposal 3.5.2.3 IPsec SA  List of IPsec Proposal3.5.3.1 L2TP/PPTP Tunnel Authentication3.5.3 L2TP/PPTP Protocol L2TP/PPTP Tunnel Enter the account name of L2TP/PPTP tunnel. It should be configured Select the IP Pool Name to specify the address range for the servers IP Address Pool  List of Configurations3.5.3.2 IP Address Pool  List of IP Pool3.5.3.3 List of L2TP/PPTP Tunnel 3.6 Services3.6.1 PPPoE Server 3.6.1.1 GeneralFigure 3-66 General The following items are displayed on this screen 3.6.1.2 IP Address Pool 3.6.1.3 Account  Account  List of Account is 48. If Enable Advanced Account Features is not selected, the3.6.1.4 Exceptional IP  Exceptional IP 3.6.2 E-Bulletin3.6.1.5 List of Account Title  E-BulletinInterval Specify the interval to release the bulletin3.6.3 Dynamic DNS  List of E-Bulletin3.6.3.1 DynDNS  Dyndns DDNS No-IP DDNS 3.6.3.2 No-IP List of DynDNS Account 3.6.3.3 PeanutHull  List of No-IP Account PeanutHull DDNS  Comexe DDNS 3.6.3.4 Comexe List of PeanutHull Account 3.6.4 UPnP  List of Comexe Account3.7.1.1 Administrator 3.7 Maintenance3.7.1 Admin Setup  Administrator3.7.1.2 Login Parameter Re-enter the new password for confirmation List of Subnet 3.7.1.3 Remote Management Remote Management 3.7.2.2 Export and Import 3.7.2.1 Factory Defaults3.7.2 Management  Export 3.7.2.3 Reboot Configuration Version  Import3.7.2.4 Firmware Upgrade 3.7.3 License Interface Traffic Statistics 3.7.4 Statistics3.7.4.1 Interface Traffic Statistics 3.7.4.2 IP Traffic Statistics  Advanced WAN Information Traffic Statistics 3.7.5 Diagnostics3.7.5.1 Diagnostics  IP Traffic Statistics Ping  TracertDisplays whether the Online Detection is enabled 3.7.5.2 Online Detection List of WAN status  Current Time  Config3.7.6 Time 3.7.7 Logs  List of LogsSeverity LevelError conditions The system is unusableChapter 4 Application 4.1 Network Requirements4.2 Network Topology 4.3 Configurations 4.3.1 Internet Setting4.3.1.2 Internet Connection 4.3.1.3 Link Backup4.3.1.1 System Mode Settings 4.3.2 VPN Setting1 IKE Setting 4.3.2.1 IPsec VPN IKE Policy AuthenticationMD5 Encryption3DESproposalIPsec1 2 IPsec Setting IPsec Proposal  IPsec Policy proposalIPsec1 you just created4.3.2.2 PPTP VPN Setting  IP Address Pool L2TP/PPTP Tunnel L2TP/PPTPEnable ProtocolPPTP ModeServer UsernamePPTP Passwordabcdefg Group 4.3.3 Network Management4.3.3.1 User Group  User4.3.3.2 App Control  View1 Enable Bandwidth Control 4.3.3.3 Bandwidth ControlKeep the default value 2 Interface Bandwidth3 Bandwidth Control Rule 4.3.4 Network Security 4.3.3.4 Session Limit2 Set IP-MAC Binding Entry Manually 4.3.4.1 LAN ARP Defense1 Scan and import the entries to ARP List 00-11-22-33-44-aa 4.3.4.2 WAN ARP Defense3 Set Attack Defense 1 Port Mirror 4.3.4.3 Attack Defense4.3.4.4 Traffic Monitoring 2 Statistics Figure 4-23 IP Traffic Statistics 5.1 Configuration Chapter 5 CLIFigure 5-2 Connection Description Figure 5-3 Select the port to connectFigure 5-4 Port Settings Figure 5-5 Connection Properties Settings 1485.2 Interface Mode enable Accessing PathLogout or Access the next mode adminIP configuration enableShow command history IP mac bind configuration5.4.1 ip 5.4 Command Introduction5.4.2 ip-mac TP-LINK ip get lan Lan Ip Lan MaskThis command will restore system, Continue?Y/N TP-LINK # sys reboot This command will reboot system, Continue?Y/NTP-LINK # sys restore TP-LINK # sys export configGet configuration file config bin succeed, file size is 7104 bytes Password admin File name config.binTry to get the configuration file config.bin TP-LINK sys show CPU Used Rate 1% TP-LINK # sys updateEnter new password Confirm new password TP-LINK user get Username admin Password adminTP-LINK user set password Enter old password TP-LINK # user get Username admin Password adminTP-LINK history View the history command5.4.6 exit 1. history 2. sys show 3. historyStandards Appendix A Hardware SpecificationsPower PortsAppendix B FAQ 4. Make sure that the NAT DMZ service is disabled AH(Authentication Header) Appendix C GlossaryGlossary data authentication, and anti-replay services. ESP encapsulatesfor services such as IPSec that require keys. Before any IPSec Glossary Telnet is used for remote terminal connection, enabling users to enterprise
Related manuals
Manual 28 pages 30.84 Kb

TL-ER6020 specifications

The TP-Link TL-ER6020 is a robust and efficient router designed for small to medium-sized businesses seeking reliable network performance and advanced features. Combining dual WAN capability with comprehensive security features, it ensures that businesses can maintain consistent and secure internet connectivity, even during peak usage times or in the event of a failure from one ISP.

One of the primary features of the TL-ER6020 is its dual WAN support, which allows users to connect two different internet sources. This not only enhances reliability through load balancing but also ensures redundancy. In cases where the primary WAN connection fails, the router can seamlessly switch to the secondary connection, minimizing downtime and maintaining business operations.

Security is a critical aspect of any network appliance, and the TL-ER6020 does not disappoint. It comes equipped with multiple security features, including advanced firewall capabilities, IP/MAC/URL filtering, and DoS attacks prevention. These tools work together to provide a secure network environment, safeguarding sensitive business data from unauthorized access and potential threats.

The router also supports VLAN (Virtual Local Area Network) technology, which allows businesses to segment their networks for better performance and security. By creating separate networks for different departments or functions, companies can enhance their network management and control traffic flow more efficiently.

Additionally, the TL-ER6020 features quality of service (QoS) capabilities that prioritize network traffic based on user needs. This ensures that critical applications, such as VoIP or video conferencing, receive the bandwidth they require for optimal performance, while less critical traffic is deprioritized during peak times.

For user management, the TL-ER6020 includes an intuitive web-based interface that simplifies configuration and monitoring. Administrators can easily manage network settings, view statistics, and troubleshoot issues without the need for extensive technical expertise.

In terms of physical specifications, the TL-ER6020 is built with reliability in mind, featuring cooling vents to prevent overheating and an efficient power supply. Its compact design allows for easy placement in various environments, whether in a server room or on a desk.

Overall, the TP-Link TL-ER6020 is a solid choice for businesses looking to build a secure, versatile, and high-performance network. Its combination of dual WAN capabilities, strong security features, VLAN support, and QoS make it a comprehensive solution for modern networking needs.