MoRoS ADSL 2.1 PRO
Function Overview
IPsec protocol
Two subnets can be connected with each other via an unsafe Internet
connection tap- and interference-proof using an IPsec tunnel. The
authentication when connecting to an IPsec terminal device via
certificates or a passphrase (PSK) is supported with this. Up to
10 tunnels can be established at the same time.
GRE tunnel
GRE tunnel enable a transparent data transmission through an
existing connection without changing the original packets.
IPT protocol
Support of communication via IPT (Internet-Protokoll Telemetrie). The
router can connect to an IPT master as IPT slave and tunnel payload
of the serial Ethernet gateway to another IPT slave.
Dynamic DNS update
The assigned IP address can be deposited at a dynamic DNS service
(e.g. DynDNS) after the set-up of a PPP connection to an Internet
service provider . The router can be accessed from the Internet. This
function is not available for a PPPoA connection.
DNS relay server
DNS requests can be forwarded to previously configured DNS servers
in the Internet or the DNS servers passed on during PPP connection
establishment.
Firewall (stateful firewall)
The firewall enables the limitation of incoming and outgoing IP
connections. A flexible rule may be created for each connection and
stored user. If one of these firewall rules applies to a connection
through the router, this connection will be allowed, otherwise the
connection is inhibited. The "Stateful Firewall" will allow connections
also for protocols with special requirements, e.g. FTP.
Configurable Ethernet switch
For each port at the switch, the transmission rate, the transmission
mode and the LED display for certain network events may be set
individually. The settings are detected automatically in default setting.
The switch can be divided in up to four VLANs.
Port mirroring at the Ethernet switch for analysis purposes
A port at the switch can reproduce a copy of the data at another
network port of the switch. At these mirror ports, the transmitted data
can be read for analysis purposes (e.g. for intrusion detection
systems, problem analysis of end terminals), without affecting the
network traffic.
31