Upload
truongque
View
246
Download
1
Embed Size (px)
Citation preview
TL-ER6020
Gigabit Dual-WAN VPN Router
REV1.0.1
1910010852
-I-
COPYRIGHT & TRADEMARKS
Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other brands and product names are trademarks of their respective holders.
No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation, transformation, or adaptation without permission from TP-LINK TECHNOLOGIES CO., LTD. Copyright 2013 TP-LINK TECHNOLOGIES CO., LTD. All rights reserved.
http://www.tp-link.com
FCC STATEMENT
This equipment has been tested and found to comply with the limits for a Class A digital device,
pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection
against harmful interference when the equipment is operated in a commercial environment. This
equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in
accordance with the instruction manual, may cause harmful interference to radio communications.
Operation of this equipment in a residential area is likely to cause harmful interference in which case
the user will be required to correct the interference at his own expense.
This device complies with part 15 of the FCC Rules. Operation is subject to the following two
conditions:
1) This device may not cause harmful interference.
2) This device must accept any interference received, including interference that may cause
undesired operation.
Any changes or modifications not expressly approved by the party responsible for compliance could
void the users authority to operate the equipment.
CE Mark Warning
This is a class A product. In a domestic environment, this product may cause radio interference, in
which case the user may be required to take adequate measures.
http://www.tp-link.com/
-II-
CONTENTS Package Contents..................................................................................................................1
Chapter 1 About this Guide ...................................................................................................2
1.1 Intended Readers ..................................................................................................................2
1.2 Conventions ...........................................................................................................................2
1.3 Overview of this Guide...........................................................................................................2
Chapter 2 Introduction ..........................................................................................................4
2.1 Overview of the Router ..........................................................................................................4
2.2 Features.................................................................................................................................5
2.3 Appearance............................................................................................................................6
2.3.1 Front Panel ................................................................................................................6
2.3.2 Rear Panel.................................................................................................................8
Chapter 3 Configuration ........................................................................................................9
3.1 Network..................................................................................................................................9
3.1.1 Status.........................................................................................................................9
3.1.2 System Mode.............................................................................................................9
3.1.3 WAN ........................................................................................................................12
3.1.4 LAN..........................................................................................................................29
3.1.5 DMZ.........................................................................................................................32
3.1.6 MAC Address...........................................................................................................34
3.1.7 Switch ......................................................................................................................36
3.2 User Group ..........................................................................................................................42
3.2.1 Group.......................................................................................................................43
3.2.2 User .........................................................................................................................43
3.2.3 View.........................................................................................................................44
3.3 Advanced .............................................................................................................................45
3.3.1 NAT..........................................................................................................................45
3.3.2 Traffic Control ..........................................................................................................54
-III-
3.3.3 Session Limit ...........................................................................................................58
3.3.4 Load Balance...........................................................................................................59
3.3.5 Routing ....................................................................................................................64
3.4 Firewall.................................................................................................................................69
3.4.1 Anti ARP Spoofing ...................................................................................................69
3.4.2 Attack Defense ........................................................................................................72
3.4.3 MAC Filtering ...........................................................................................................74
3.4.4 Access Control.........................................................................................................75
3.4.5 App Control..............................................................................................................81
3.5 VPN......................................................................................................................................83
3.5.1 IKE...........................................................................................................................83
3.5.2 IPsec........................................................................................................................87
3.5.3 L2TP/PPTP..............................................................................................................94
3.6 Services ...............................................................................................................................98
3.6.1 PPPoE Server..........................................................................................................98
3.6.2 E-Bulletin ...............................................................................................................104
3.6.3 Dynamic DNS ........................................................................................................106
3.6.4 UPnP .....................................................................................................................112
3.7 Maintenance ......................................................................................................................113
3.7.1 Admin Setup ..........................................................................................................113
3.7.2 Management..........................................................................................................116
3.7.3 License ..................................................................................................................118
3.7.4 Statistics.................................................................................................................119
3.7.5 Diagnostics ............................................................................................................121
3.7.6 Time.......................................................................................................................124
3.7.7 Logs.......................................................................................................................125
Chapter 4 Application........................................................................................................127
4.1 Network Requirements.......................................................................................................127
-IV-
4.2 Network Topology.......................................................................................................