ESR-Series. User manual
18
•
•
•
•
•
2.2.5 Traffic tunnelling functions
Table 5 – Traffic tunnelling functions
Tunnelling protocols
Tunneling is a method of packet conversion during their network transfer that
involves the replacement, modification and addition of a new packet network
header. This method may be used for negotiation of transport protocols when
the data is transferred through the transit network as well as for creation of
secured connections where tunnelled data is being encrypted.
Routers support the following types of tunnels:
GRE
– IP packet/Ethernet frame is encapsulated into another IP
packet with GRE (General Routing Encapsulation) header;
IPv4-IPv4
– tunnel that encapsulates source IP packets into IP
packets with alternative network parameters;
L2TPv3
– tunnel for L2 traffic transmission using IP packets;
IPsec
– tunnel with the encryption of transmitted data;
L2TP, PPTP, PPPoE, OpenVPN
– tunnels used for establishing a
remote 'client-sever' access.
2.2.6 Management and configuration functions
Table 6 – Basic management and configuration functions
Configuration file download and upload
Device parameters are saved into the configuration file that contains
configuration data for the specific device ports as well as for the
whole system. The following protocols may be used for file transfers:
TFTP, FTP, and SCP.
Command line interface (CLI)
CLI management is performed locally via serial port RS-232, or
remotely via Telnet, SSH. Console command line interface (CLI) is the
industrial standard. CLI interpreter contains the list of commands and
keywords that will help the user and reduce the amount of input data.
Syslog
Syslog protocol is designed for transmission of system event
messages and event logging.
Ping, traceroute
network utilities
Ping and traceroute utilities allow you to check the availability of
network devices and identify data transfer routes in IP networks.
Controlled access management – privilege
levels
Routers support system access level management for users. Access
levels enable responsibility areas management for device
administrators. Access levels are numbered from 1 to 15; Level 15
stands for full access to device management features.
Содержание ESR Series
Страница 218: ...ESR Series User manual 218 ...
Страница 234: ...ESR Series User manual 234 In addition to RIP protocol configuration open UDP port 520 in the firewall ...
Страница 306: ...ESR Series User manual 306 Parameter targeted LDP Hold timer 45 seconds Keepalive holdtime 180 seconds ...
Страница 452: ...ESR Series User manual 452 Step Description Command Keys 4 Enable Tracking object esr config tracking enable ...
Страница 514: ...ESR Series User manual 514 esr show ntp peers ...