You are on page 1of 2

4. EDR-G902/G903 Series Features and Functions................................................................................

4-1
Overview ........................................................................................................................................... 4-3
Configuring Basic Settings ................................................................................................................... 4-4
System Identification ................................................................................................................... 4-4
Hardware Acceleration ................................................................................................................. 4-5
Accessible IP............................................................................................................................... 4-6
Password.................................................................................................................................... 4-7
Time .......................................................................................................................................... 4-8
SettingCheck ............................................................................................................................ 4-10
Relay Event Setup ..................................................................................................................... 4-11
Warning .......................................................................................................................................... 4-12
System Event Setting ................................................................................................................ 4-12
System File Update—by Remote TFTP .......................................................................................... 4-13
System File Update—by Local Import/Export ................................................................................ 4-14
Backup Media ........................................................................................................................... 4-14
Restart..................................................................................................................................... 4-15
Reset to Factory Default ............................................................................................................. 4-16
Network Settings .............................................................................................................................. 4-16
Mode Configuration ................................................................................................................... 4-16
Link Fault Passthrough ............................................................................................................... 4-17
MTU Configuration (for EDR-810/G902/G903) ............................................................................... 4-18
Speed Configuration .................................................................................................................. 4-20
WAN1 Configuration .................................................................................................................. 4-20
WAN2 Configuration (includes DMZ Enable) .................................................................................. 4-23
Using DMZ Mode ....................................................................................................................... 4-26
LAN Interface............................................................................................................................ 4-27
802.1Q VLAN Setting ................................................................................................................. 4-27
Communication Redundancy .............................................................................................................. 4-28
WAN Backup (EDR-G903 only) .................................................................................................... 4-28
Security........................................................................................................................................... 4-30
User Interface Management ........................................................................................................ 4-30
Authentication Certificate ........................................................................................................... 4-31
RADIUS Settings ....................................................................................................................... 4-31
Traffic Prioritization Setup .......................................................................................................... 4-32
Monitor............................................................................................................................................ 4-36
System Log ...................................................................................................................................... 4-36
EventLog .................................................................................................................................. 4-36
Syslog ..................................................................................................................................... 4-37
5. Routing ............................................................................................................................................. 5-1
Unicast Route ..................................................................................................................................... 5-2
Static Routing ............................................................................................................................. 5-2
RIP (Routing Information Protocol) ................................................................................................ 5-3
Dynamic Routing with Open Shortest Path First (OSPF) .................................................................... 5-4
Routing Table ............................................................................................................................. 5-8
Multicast Route................................................................................................................................... 5-9
Static Multicast ........................................................................................................................... 5-9
Distance Vector Multicast Routing Protocol (DVMRP) ........................................................................ 5-9
Protocol Independent Multicast Sparse Mode (PIM-SM) .................................................................. 5-10
Broadcast Forwarding (EDR-810 only) ................................................................................................. 5-14
VRRP Setting .................................................................................................................................... 5-14
6. Network Redundancy ........................................................................................................................ 6-1
Layer 2 Redundant Protocols (EDR-810 series only) ................................................................................ 6-2
Configuring STP/RSTP .................................................................................................................. 6-2
Configuring Turbo Ring V2 ............................................................................................................ 6-4
Layer 3 Redundant Protocols ................................................................................................................ 6-6
VRRP Settings ............................................................................................................................. 6-6
7. Network Address Translation ............................................................................................................ 7-1
Network Address Translation (NAT) ....................................................................................................... 7-2
NAT Concept ............................................................................................................................... 7-2
1-to-1 NAT Overview ................................................................................................................... 7-2
1-to-1 NAT ................................................................................................................................. 7-3
Bidirectional 1-to-1 NAT ............................................................................................................... 7-4
N-to-1 NAT ................................................................................................................................. 7-5
Port Forward ............................................................................................................................... 7-6
8. Firewall ............................................................................................................................................. 8-1
Policy Concept .................................................................................................................................... 8-2
Policy Overview .................................................................................................................................. 8-2
Firewall ............................................................................................................................................. 8-3
Layer 2 policy ............................................................................................................................. 8-3
Layer 2 Policy Setup (Only in Bridge Mode for EDR-G902/G903) ....................................................... 8-4
Layer 3 policy ............................................................................................................................. 8-5
Quick Automation Profile .............................................................................................................. 8-8
Policy Check ............................................................................................................................. 8-10
Modbus TCP Policy ............................................................................................................................ 8-12
Denial of Service (DoS) Defense ......................................................................................................... 8-16
Firewall Event Log............................................................................................................................. 8-17
9. Virtual Private Network (VPN) .......................................................................................................... 9-1
Overview ........................................................................................................................................... 9-2
IPsec Configuration ............................................................................................................................. 9-2
Global Settings ........................................................................................................................... 9-3
IPsec Settings ............................................................................................................................. 9-3
IPsec Use Case Demonstration ...................................................................................................... 9-8
IPsec Status ............................................................................................................................. 9-11
L2TP Server (Layer 2 Tunnel Protocol)................................................................................................. 9-12
L2TP Configuration .................................................................................................................... 9-12
OpenVPN Configuration ..................................................................................................................... 9-13
Server Settings ......................................................................................................................... 9-14
Client Settings .......................................................................................................................... 9-22
Examples for Typical VPN Applications ................................................................................................. 9-24
Site to Site IPsec VPN tunnel with Pre-Shared Key......................................................................... 9-24
Site to Site IPsec VPN tunnel with Jupiter System.......................................................................... 9-25
L2TP for Remote User Maintenance.............................................................................................. 9-27
Client-to-Client communication via OpenVPN ................................................................................ 9-28
Redirect default gateway via OpenVPN ......................................................................................... 9-28
Create OpenVPN connection on a mobile device ............................................................................ 9-29
10. Certificate Management .................................................................................................................. 10-1
Local Certificate ................................................................................................................................ 10-2
Trusted CA Certificates ...................................................................................................................... 10-2
Certificate Signing Request ................................................................................................................ 10-3
CA Server ........................................................................................................................................ 10-4
11. Diagnosis ........................................................................................................................................ 11-1
Ping ................................................................................................................................................ 11-2
LLDP ............................................................................................................................................... 11-2
Monitor............................................................................................................................................ 11-3
Statistics .................................................................................................................................. 11-3
Bandwidth Utilization ................................................................................................................. 11-3
Display Setting.......................................................................................................................... 11-4
Display Setting.......................................................................................................................... 11-5
A. MIB Groups ....................................................................................................................................... A-1

A-
A-

You might also like