ELTEX ESR Series User manual

ESR series service routers
ESR-10, ESR-12V, ESR-12VF, ESR-14VF, ESR-20,
ESR-21, ESR-100, ESR-200, ESR-1000, ESR-1200,
ESR-1500, ESR-1511, ESR-3100, ESR-1700
User manual (29.06.2021)
Firmware version1.13.0

ESR-Series. User manual
2
Contents
1 Introduction ......................................................................................................................... 12
1.1 Abstract ............................................................................................................................... 12
1.2 Target Audience.................................................................................................................. 12
1.3 Symbols............................................................................................................................... 12
1.4 Notes and warnings............................................................................................................ 13
2 Product Description ............................................................................................................ 14
2.1 Purpose ............................................................................................................................... 14
2.2 Functions............................................................................................................................. 15
2.2.1 Interface functions....................................................................................................... 15
2.2.2 MAC table functions .................................................................................................... 15
2.2.3 Second-layer functions of OSI model ......................................................................... 16
2.2.4 Third-layer functions of OSI model ............................................................................. 16
2.2.5 Traffic tunnelling functions ......................................................................................... 18
2.2.6 Management and configuration functions................................................................. 18
2.2.7 Network security functions ......................................................................................... 19
2.3 Main specifications ............................................................................................................ 20
2.4 Design.................................................................................................................................. 33
2.4.1 ESR-1700 design.......................................................................................................... 33
2.4.2 ESR-3100 design.......................................................................................................... 35
2.4.3 ESR-1511, ESR-1510 design........................................................................................ 38
2.4.4 ESR-1200, ESR-1000 design........................................................................................ 42
2.4.5 ESR-200, ESR-100 design ............................................................................................ 45
2.4.6 ESR-21 design .............................................................................................................. 48
2.4.7 ESR-20 design .............................................................................................................. 49
2.4.8 ESR-12VF, ESR-14VF design ....................................................................................... 51
2.4.9 ESR-12V design............................................................................................................ 54
2.4.10 ESR-10 design .............................................................................................................. 56
2.4.11 Light Indication ............................................................................................................ 59
2.5 Delivery Package................................................................................................................. 66
3 Installation and connection................................................................................................ 69
3.1 Support brackets mounting................................................................................................ 69
3.2 Device rack installation ...................................................................................................... 69
3.3 ESR-1000, ESR-1200, ESR-1500, ESR-1511, ESR-3100, ESR-1700 power module
installation........................................................................................................................... 70
3.4 Connection to Power Supply.............................................................................................. 71

ESR-Series. User manual
3
3.5 SFP transceiver installation and removal.......................................................................... 71
3.5.1 Transceiver installation ............................................................................................... 71
3.5.2 Transceiver removal .................................................................................................... 72
4 Management interfaces ..................................................................................................... 73
4.1 Command line interface (CLI) ............................................................................................ 73
4.2 Types and naming procedure of router interfaces ........................................................... 73
4.3 Types and naming procedure of router tunnels................................................................ 77
5 Initial router configuration.................................................................................................. 78
5.1 ESR router factory settings ................................................................................................ 78
5.1.1 Description of factory settings.................................................................................... 78
5.2 Router connection and configuration................................................................................ 79
5.2.1 Connection to the router.............................................................................................. 79
5.2.2 Applying the configuration change............................................................................. 80
5.2.3 Basic router configuration........................................................................................... 81
6 Firmware update ................................................................................................................. 85
6.1 Updating firmware via system resources.......................................................................... 85
6.2 Updating firmware via bootloader ..................................................................................... 87
6.3 Secondary bootloader update (U-Boot)............................................................................. 88
7 Safe configuration recommendations............................................................................... 91
7.1 General recommendations................................................................................................. 91
7.2 Event logging system configuration .................................................................................. 91
7.2.1 Recommendations....................................................................................................... 92
7.2.2 Warnings....................................................................................................................... 92
7.2.3 Configuration example ................................................................................................ 92
7.3 Password usage policy configuration ............................................................................... 92
7.3.1 Recommendations....................................................................................................... 93
7.3.2 Configuration example ................................................................................................ 93
7.4 AAA policy configuration.................................................................................................... 93
7.4.1 Recommendations....................................................................................................... 94
7.4.2 Warnings....................................................................................................................... 94
7.4.3 Configuration example ................................................................................................ 94
7.5 Remote management configuration................................................................................. 95
7.5.1 Recommendations....................................................................................................... 95
7.5.2 Configuration example ................................................................................................ 95
7.6 Configuration of protection against network attacks mechanisms................................ 96
7.6.1 Recommendations....................................................................................................... 96
7.6.2 Configuration example ................................................................................................ 97

ESR-Series. User manual
4
8 Interface management ....................................................................................................... 98
8.1 VLAN Configuration............................................................................................................ 98
8.1.1 Configuration algorithm .............................................................................................. 99
8.1.2 Configuration example 1. VLAN removal from the interface.................................. 100
8.1.3 Configuration example 2. Enabling VLAN processing in tagged mode ................. 101
8.1.4 Configuration example 3. Enabling VLAN processing in tagged and untagged
modes......................................................................................................................... 102
8.2 LLDP configuration ........................................................................................................... 102
8.2.1 Configuration algorithm ............................................................................................ 103
8.2.2 Configuration example .............................................................................................. 104
8.3 LLDP MED configuration .................................................................................................. 105
8.3.1 Configuration algorithm ............................................................................................ 105
8.3.2 Voice VLAN configuration example.......................................................................... 106
8.4 Sub-interface termination configuration ......................................................................... 107
8.4.1 Configuration algorithm ............................................................................................ 108
8.4.2 Sub-interface configuration example ....................................................................... 110
8.5 Q-in-Q termination configuration ..................................................................................... 110
8.5.1 Configuration algorithm ............................................................................................ 110
8.5.2 Q-in-Q configuration example ................................................................................... 113
8.6 USB modems configuration ............................................................................................. 114
8.6.1 USB modems configuration algorithm ..................................................................... 114
8.6.2 Configuration example .............................................................................................. 117
8.7 PPP through E1 configuration.......................................................................................... 117
8.7.1 Configuration algorithm ............................................................................................ 118
8.7.2 Configuration example .............................................................................................. 120
8.8 MLPPP Configuration ....................................................................................................... 121
8.8.1 Configuration algorithm ............................................................................................ 121
8.8.2 Configuration example .............................................................................................. 123
8.9 Bridge configuration ......................................................................................................... 124
8.9.1 Configuration algorithm ............................................................................................ 124
8.9.2 Example of bridge configuration for VLAN and L2TPv3 tunnel.............................. 127
8.9.3 Example of bridge configuration for VLAN .............................................................. 129
8.9.4 Configuration example of the second VLAN tag adding/removing ....................... 131
8.10 Dual-Homing configuration .............................................................................................. 131
8.10.1 Configuration algorithm ............................................................................................ 132
8.10.2 Configuration example .............................................................................................. 132
8.11 Mirroring configuration (SPAN/RSPAN).......................................................................... 133
8.11.1 Configuration algorithm ............................................................................................ 134

ESR-Series. User manual
5
8.11.2 Configuration example .............................................................................................. 134
8.12 LACP configuration........................................................................................................... 135
8.12.1 Configuration algorithm ............................................................................................ 135
8.12.2 Configuration example .............................................................................................. 138
8.13 AUX configuration............................................................................................................. 139
8.13.1 Configuration algorithm ............................................................................................ 139
8.13.2 Configuration examples ............................................................................................ 141
8.13.3 Adapter soldering schemes ...................................................................................... 146
9 Tunneling management.................................................................................................... 147
9.1 GRE tunnel configuration.................................................................................................. 147
9.1.1 Configuration algorithm ............................................................................................ 147
9.1.2 IP-GRE tunnel configuration example....................................................................... 151
9.2 DMVPN configuration....................................................................................................... 153
9.2.1 Configuration algorithm ............................................................................................ 154
9.2.2 Configuration example 1 ........................................................................................... 155
9.2.3 Configuration example 2 ........................................................................................... 161
9.3 L2TPv3 tunnel configuration............................................................................................ 166
9.3.1 Configuration algorithm ............................................................................................ 166
9.3.2 L2TPv3 tunnel configuration example...................................................................... 168
9.4 IPsec VPN configuration .................................................................................................. 171
9.4.1 Route-based IPsec VPN configuration algorithm.................................................... 171
9.4.2 Route-based IPsec VPN configuration example...................................................... 177
9.4.3 Policy-based IPsec VPN configuration algorithm.................................................... 182
9.4.4 Policy-based IPsec VPN configuration example ..................................................... 188
9.4.5 Remote Access IPsec VPN configuration algorithm............................................... 192
9.4.6 Remote Access IPsec VPN configuration example................................................. 201
9.5 LT tunnels configuration .................................................................................................. 206
9.5.1 Configuration algorithm ............................................................................................ 206
9.5.2 Configuration example .............................................................................................. 207
10 QoS management ............................................................................................................. 209
10.1 Basic QoS .......................................................................................................................... 209
10.1.1 Configuration algorithm ............................................................................................ 209
10.1.2 Configuration example .............................................................................................. 212
10.2 Advanced QoS................................................................................................................... 213
10.2.1 Configuration algorithm ............................................................................................ 213
10.2.2 Configuration example .............................................................................................. 217
11 Routing management ....................................................................................................... 221

ESR-Series. User manual
6
11.1 Routing information advertising policy............................................................................ 222
11.1.1 RIP............................................................................................................................... 222
11.1.2 OSPF protocol ............................................................................................................ 222
11.1.3 IS-IS protocol.............................................................................................................. 223
11.1.4 iBPG protocol ............................................................................................................. 224
11.1.5 eBPG protocol ............................................................................................................ 224
11.2 Static routes configuration............................................................................................... 225
11.2.1 Configuration algorithm ............................................................................................ 225
11.2.2 Static routes configuration example ........................................................................ 226
11.3 RIP Configuration.............................................................................................................. 228
11.3.1 Configuration algorithm ............................................................................................ 228
11.3.2 RIP configuration example ........................................................................................ 233
11.4 OSFP configuration........................................................................................................... 235
11.4.1 Configuration algorithm ............................................................................................ 235
11.4.2 OSPF configuration example .................................................................................... 244
11.4.3 OSPF stub area configuration example.................................................................... 245
11.4.4 Virtual link configuration example ............................................................................ 246
11.5 BGP configuration............................................................................................................. 247
11.5.1 Configuration algorithm ............................................................................................ 248
11.5.2 Configuration example .............................................................................................. 259
11.6 BFD configuration .......................................... 262
11.6.1 Configuration algorithm ............................................................................................ 262
11.6.2 Configuration example of BFD with BGP.................................................................. 266
11.7 PBR routing policy configuration ..................................................................................... 267
11.7.1 Configuration algorithm of Route-map for BGP....................................................... 267
11.7.2 Configuration example 1. Route-map for BGP......................................................... 272
11.7.3 Configuration example 2. Route-map for BGP......................................................... 273
11.7.4 Route-map based on access control lists (Policy-based routing) configuration
algorithm .................................................................................................................... 274
11.7.5 Route-map based on access control lists (Policy-based routing) configuration
example ...................................................................................................................... 275
11.8 VRF Lite configuration ...................................................................................................... 276
11.8.1 Configuration algorithm ............................................................................................ 277
11.8.2 Configuration example .............................................................................................. 278
11.9 MultiWAN configuration ................................................................................................... 280
11.9.1 Configuration algorithm ............................................................................................ 280
11.9.2 Configuration example .............................................................................................. 283
11.10 IS-IS configuration ............................................................................................................ 285

ESR-Series. User manual
7
11.10.1 Configuration algorithm ............................................................................................ 285
11.10.2 Configuration example .............................................................................................. 292
12 MPLS technology management....................................................................................... 295
12.1 LDP configuration ............................................................................................................. 295
12.1.1 Configuration algorithm ............................................................................................ 296
12.1.2 Configuration example .............................................................................................. 297
12.2 Configuring session parameters in LDP.......................................................................... 300
12.2.1 Algorithm for setting Hello holdtime and Hello interval in the global LDP
configuration .............................................................................................................. 302
12.2.2 Algorithm for setting Hello holdtime and Hello interval for address family........... 302
12.2.3 Algorithm for setting Keepalive holdtime parameter in the global LDP
configuration .............................................................................................................. 303
12.2.4 Algorithm for setting Keepalive holdtime parameter for the specific neighbor .... 303
12.2.5 Configuration example .............................................................................................. 303
12.3 Configuring session parameters in targeted-LDP........................................................... 305
12.3.1 Algorithm for setting Hello holdtime, Hello interval and Keepalive holdtime for the
LDP process ............................................................................................................... 308
12.3.2 Algorithm for setting Hello holdtime, Hello interval and Keepalive holdtime for the
specific neighbor ....................................................................................................... 309
12.3.3 Configuration example .............................................................................................. 309
12.4 LDP tag filtering configuration......................................................................................... 310
12.4.1 Configuration algorithm ............................................................................................ 310
12.4.2 Configuration example .............................................................................................. 311
12.5 L2VPN Martini mode configuration................................................................................. 312
12.5.1 L2VPN VPWS configuration algorithm..................................................................... 312
12.5.2 L2VPN VPWS configuration example....................................................................... 314
12.5.3 L2VPN VPLS configuration algorithm ...................................................................... 317
12.5.4 L2VPN VPLS configuration example ........................................................................ 318
12.6 L2VPN Kompella mode configuration............................................................................. 323
12.6.1 L2VPN VPLS configuration algorithm ...................................................................... 323
12.6.2 L2VPN VPLS configuration example ........................................................................ 325
12.7 L3VPN configuration ........................................................................................................ 340
12.7.1 Configuration algorithm ............................................................................................ 341
12.7.2 Configuration example .............................................................................................. 343
12.8 MPLS traffic balancing ..................................................................................................... 357
12.8.1 Configuration example .............................................................................................. 357
12.9 Operation with the bridge domain within MPLS ............................................................. 358
12.10 Assignment of MTU when operating with MPLS............................................................ 360
13 Security management....................................................................................................... 367

ESR-Series. User manual
8
13.1 AAA configuration............................................................................................................. 367
13.1.1 Local authentication configuration algorithm.......................................................... 368
13.1.2 AAA configuration algorithm via RADIUS................................................................. 371
13.1.3 AAA configuration algorithm via TACACS ............................................................... 375
13.1.4 AAA configuration algorithm via LDAP .................................................................... 378
13.1.5 Example of authentication configuration using telnet via RADIUS server ............. 382
13.2 Command privilege configuration ................................................................................... 383
13.2.1 Configuration algorithm ............................................................................................ 383
13.2.2 Example of command privilege configuration......................................................... 383
13.3 Configuration of logging and protection against network attacks................................ 383
13.3.1 Configuration algorithm ............................................................................................ 383
13.3.2 Description of attack protection mechanisms......................................................... 386
13.3.3 Configuration example of logging and protection against network attacks.......... 389
13.4 Firewall configuration....................................................................................................... 390
13.4.1 Configuration algorithm ............................................................................................ 391
13.4.2 Firewall configuration example................................................................................. 397
13.4.3 Configuration example of application filtering (DPI)............................................... 400
13.5 Access list (ACL) configuration ....................................................................................... 402
13.5.1 Configuration algorithm ............................................................................................ 403
13.5.2 Access list configuration example ........................................................................... 405
13.6 IPS/IDS configuration ....................................................................................................... 405
13.6.1 Base configuration algorithm.................................................................................... 406
13.6.2 Configuration algorithm for IPS/IDS rules autoupdate from external sources ..... 407
13.6.3 Recommended open rule update source ................................................................. 407
13.6.4 IPS/IDS configuration example with auto-update rules .......................................... 412
13.6.5 Basic user rules configuration algorithm ................................................................. 414
13.6.6 Basic user rules configuration example................................................................... 422
13.6.7 Extended user rules configuration algorithm........................................................... 424
13.6.8 Extended user rules configuration example............................................................. 425
13.7 Eltex Distribution Manager interaction configuration..................................................... 426
13.7.1 Basic configuration algorithm................................................................................... 426
13.7.2 Configuration example: ............................................................................................. 429
13.8 Content filtering service configuration ............................................................................ 432
13.8.1 Basic configuration algorithm................................................................................... 432
13.8.2 Content filtering rules configuration example ......................................................... 437
13.9 "Antispam" service configuration .................................................................................... 440
13.9.1 Basic configuration algorithm................................................................................... 440

ESR-Series. User manual
9
13.9.2 Configuration example: ............................................................................................. 443
14 Redundancy management ............................................................................................... 445
14.1 VRRP configuration........................................................................................................... 445
14.1.1 Configuration algorithm ............................................................................................ 445
14.1.2 Configuration example 1 ........................................................................................... 448
14.1.3 Configuration example 2 ........................................................................................... 449
14.2 VRRP tracking configuration............................................................................................ 451
14.2.1 Configuration algorithm ............................................................................................ 451
14.2.2 Configuration example .............................................................................................. 455
15 Remote access configuration .......................................................................................... 457
15.1 Configuring server for remote access to corporate network via PPTP protocol.......... 457
15.1.1 Configuration algorithm ............................................................................................ 457
15.1.2 Configuration example .............................................................................................. 460
15.2 Configuring server for remote access to corporate network via L2TP protocol .......... 462
15.2.1 Configuration algorithm ............................................................................................ 462
15.2.2 Configuration example .............................................................................................. 466
15.3 Configuring server for remote access to corporate network via OpenVPN protocol... 468
15.3.1 Configuration algorithm ............................................................................................ 468
15.3.2 Configuration example .............................................................................................. 472
15.4 Configuring remote access client via PPPoE.................................................................. 474
15.4.1 Configuration algorithm ............................................................................................ 474
15.4.2 Configuration example .............................................................................................. 476
15.5 Configuring remote access client via PPTP.................................................................... 478
15.5.1 Configuration algorithm ............................................................................................ 478
15.5.2 Configuration example .............................................................................................. 480
15.6 Configuring remote access client via L2TP .................................................................... 481
15.6.1 Configuration algorithm ............................................................................................ 482
15.6.2 Configuration example .............................................................................................. 484
16 Service management........................................................................................................ 486
16.1 DHCP server configuration............................................................................................... 486
16.1.1 Configuration algorithm ............................................................................................ 486
16.1.2 Configuration example .............................................................................................. 490
16.2 Destination NAT configuration ........................................................................................ 492
16.2.1 Configuration algorithm ............................................................................................ 493
16.2.2 Destination NAT configuration example .................................................................. 495
16.3 Source NAT configuration................................................................................................ 497
16.3.1 Configuration algorithm ............................................................................................ 497

ESR-Series. User manual
10
16.3.2 Configuration example 1 ........................................................................................... 500
16.3.3 Configuration example 2 ........................................................................................... 503
16.4 Static NAT configuration.................................................................................................. 504
16.4.1 Configuration algorithm ............................................................................................ 504
16.4.2 Static NAT configuration example............................................................................ 504
16.5 HTTP/HTTPS traffic proxying.......................................................................................... 506
16.5.1 Configuration algorithm ............................................................................................ 506
16.5.2 HTTP proxy configuration example.......................................................................... 509
16.5.3 Configuration algorithm ............................................................................................ 510
16.5.4 Configuration example .............................................................................................. 512
17 Monitoring ......................................................................................................................... 515
17.1 Netflow configuration....................................................................................................... 515
17.1.1 Configuration algorithm ............................................................................................ 515
17.1.2 Configuration example .............................................................................................. 516
17.2 sFlow configuration .......................................................................................................... 517
17.2.1 Configuration algorithm ............................................................................................ 517
17.2.2 Configuration example .............................................................................................. 518
17.3 SNMP configuration ......................................................................................................... 520
17.3.1 Configuration algorithm ............................................................................................ 520
17.3.2 Configuration example .............................................................................................. 524
17.4 Zabbix-agent/proxy configuration ................................................................................... 526
17.4.1 Configuration algorithm ............................................................................................ 526
17.4.2 Zabbix-agent configuration example........................................................................ 528
17.4.3 Zabbix-server configuration example....................................................................... 529
17.5 Syslog configuration......................................................................................................... 532
17.5.1 Configuration algorithm ............................................................................................ 533
17.5.2 Configuration example .............................................................................................. 535
17.6 Integrity check................................................................................................................... 536
17.6.1 Configuration process ............................................................................................... 536
17.6.2 Configuration example .............................................................................................. 537
17.7 Router configuration file archiving................................................................................... 537
17.7.1 Configuration process ............................................................................................... 537
17.7.2 Configuration example .............................................................................................. 538
18 BRAS (Broadband Remote Access Server) management.............................................. 540
18.1 Configuration algorithm ................................................................................................... 540
18.2 Example of configuration with SoftWLC ......................................................................... 544
18.3 Example of configuration without SoftWLC.................................................................... 552

ESR-Series. User manual
11
19 VoIP management ............................................................................................................ 559
19.1 SIP profile configuration algorithm.................................................................................. 559
19.2 FXS/FXO ports configuration algorithm.......................................................................... 560
19.3 Dial plan configuration algorithm .................................................................................... 562
19.4 PBX server configuration algorithm................................................................................. 562
19.5 Registration trunk creation algorithm.............................................................................. 564
19.6 VoIP configuration example............................................................................................. 565
19.7 Dial plan configuration example ...................................................................................... 568
19.8 FXO port configuration ..................................................................................................... 570
20 FREQUENTLY ASKED QUESTIONS .................................................................................. 572
20.1 Receiving of routes, which are configured in VRF via BGP or/and OSPF, failed. The
neighbouring is successfully installed, but record of routes in RIB is denied %ROUTING-
W-KERNEL: Can not install route. Reached the maximum number of BGP routes in the
RIB...................................................................................................................................... 572
20.2 SSH/Telnet sessions, which go through ESR router, are closing. ................................. 572
20.3 Firewall was disabled on interface (ip firewall disable). However access for active
sessions from the port was not closed, according to security zone-pair rules, after
including this interface to security zone, removing from 'ip firewall disable'
configuration and applying changes. .............................................................................. 572
20.4 LACP does not launch on XG ports of ESR-1000/1200/1500/1700 ............................. 572
20.5 How to clear ESR configuration completely and reset it to factory default? ................ 573
20.6 How to attach sub-interface to created VLAN? .............................................................. 573
20.7 Do the ESR-series routers have features for traffic analysis?........................................ 573
20.8 How to configure ip-prefix-list 0.0.0.0./0?....................................................................... 573
20.9 Problem of asynchronous traffic transmission is occurred ......................................... 573
20.10 How to save the local copy of the router configuration? ............................................... 574
21 ESR technical support....................................................................................................... 575

ESR-Series. User manual
12
•
•
•
•
1 Introduction
Abstract
Target Audience
Symbols
Notes and warnings
1.1 Abstract
Today, large-scale communication network development projects are becoming increasingly common. One of
the main tasks in implementation of large multiservice networks is the creation of reliable high-performance
transport network that will serve as a backbone in multilayer architecture of next-generation networks.
ESR series service routers could be used in large enterprise networks, SMB networks and operator's networks.
Devices provide high performance and bandwidth, and feature protection of transmitted data.
This operation manual describes intended use, specifications, design, installation, first time setup, and
firmware update guidelines for the ESR series service router (next, the router or the device).
1.2 Target Audience
This user manual is intended for technical personnel that performs device installation, configuration and
monitoring via command line interface (CLI) as well as the system maintenance and firmware update
procedures. Qualified technical personnel should be familiar with the operation basics of TCP/IP protocol
stacks and Ethernet networks design concepts.
1.3 Symbols
Designation Description
[ ] In the command line, optional parameters are shown in square brackets;
when entered, they provide additional options.
{ } In the command line, mandatory parameters are shown in curly braces.
Choose one of the following:
","
"-"
In the command description, these characters are used to define ranges.
"|" In the description of the command, this sign means 'or'.
Semibold font Notes, warnings, or information are shown in bold.
<Semibold italic> Keyboard keys are shown in bold italic within angle brackets.
Text box
Examples and results of the commands are given within the text boxes.

ESR-Series. User manual
13
1.4 Notes and warnings
Notes contain important information, tips or recommendations on device operation and setup.
Warnings inform users about hazardous conditions which may cause injuries or device damage and
may lead to the device malfunctioning or data loss.
The information contains information on the use of the device.

ESR-Series. User manual
14
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
2 Product Description
Purpose
Functions
Interface functions
MAC table functions
Second-layer functions of OSI model
Third-layer functions of OSI model
Traffic tunnelling functions
Management and configuration functions
Network security functions
Main specifications
Design
ESR-1700 design
ESR-3100 design
ESR-1511, ESR-1510 design
ESR-1200, ESR-1000 design
ESR-200, ESR-100 design
ESR-21 design
ESR-20 design
ESR-12VF, ESR-14VF design
ESR-12V design
ESR-10 design
Light Indication
Delivery Package
2.1 Purpose
ESR series devices are the high performance multi-purpose network routers. Device combines traditional
network features with a complex multi-tier approach to routing security, and ensures robust corporate
environment protection.
Device has a built-in firewall that enables protection of your and organization network environment and
supports latest data security, encryption, authentication and intrusion prevention features.
Device contains software and hardware means of data processing. Top performance is achieved through
optimal distribution of data processing tasks between different subsets of the device.

ESR-Series. User manual
15
•
•
2.2 Functions
2.2.1 Interface functions
Table 1 lists interface functions of the device.
Table 1 – Device interface functions
Cable connection polarity detection
(Auto MDI/MDIX)
Automatic cable type detection–crossed or straight.
MDI (Medium Dependent Interface – straight) – cable
standard for connection of terminal devices;
MDIX (Medium Dependent Interface with Crossover –
crossed) – cable standard for connection of hubs and
switches.
Back Pressure
The backpressure routing method is utilized in half-duplex
connections for management of data streams, coming from the
opposite devices, by means of collisions. This method allows to avoid
buffer overruns and the loss of data.
Flow control
(IEEE 802.3X)
Flow control allows to interconnect the low-speed and the high-speed
devices. To avoid buffer overrun, the low-speed device gains the ability
to send PAUSE packets, that will force the high-speed device to pause
the packet transmission.
(LAG, Link aggregation)
Link aggregation allows to increase the communication link
bandwidth and robustness.
Router supports static and dynamic link aggregation. For dynamic
aggregation, link group management is performed via LACP protocol.
2.2.2 MAC table functions
Table 2 lists MAC address processing functions of the device.
Table 2 – MAC address processing functions
MAC table MAC address table sets the correspondence between MAC addresses and device
interfaces and is used for data packet routing. Routers support table capacity up
to 128K of MAC addresses and reserve specific MAC addresses for the system
use.
Learning mode MAC address table may contain either static addresses or addresses learnt
during data packet transition through the device.
Learning involves registration of packet source MAC addresses with their binding
to ports and VLANs. Afterwards, this data is used for incoming packet routing.
Registered MAC address lifetime is limited. Administrator may adjust this setting.
If destination MAC address specified in the packet that was received by the
device is not listed in the table, this packet will be sent further as a broadcast
packet within L2 segment of the network.

ESR-Series. User manual
16
•
•
•
2.2.3 Second-layer functions of OSI model
Table 3 lists second-layer functions and special aspects (OSI Layer 2).
Table 3 – Second-layer functions description (OSI Layer 2)
VLAN support VLAN (Virtual Local Area Network) is a solution used for splitting a network into separate
segments on L2 level. VLAN utilization allows to increase the operation stability for large
networks by splitting them into smaller networks, isolate diversified data traffic by type and solve
many other tasks.
Routers support various VLAN management methods:
VLAN based on data packet tagging according to IEEE802.1Q
VLAN based on device ports (port-based)
VLAN based on utilization of data classification policies (policy-based)
Spanning Tree
Protocol1
The main task of Spanning Tree Protocol is to exclude redundant network links and convert
network topology into the tree-like structure. Common areas of protocol application involve the
prevention of network traffic loops and establishing of redundant communication links.
1In the current firmware version, this functionality is supported only by ESR-1000 router
2.2.4 Third-layer functions of OSI model
Table 4 lists third-layer functions (OSI Layer 3).
Table 4 – Third-layer functions description (OSI Layer 3)
Static IP routes Administrator of the router can add or remove static entries into/from
the routing table.
Dynamic routing
With dynamic routing protocols, the device will be able to exchange the
routing information with neighbouring routers and automatically create a
routing table.
Router supports the following protocols: RIPv2, RIPng, OSPFv2, OSPFv3,
IS-IS, BGP.
ARP table ARP (Address Resolution Protocol) is a protocol used for resolution of
the network and data-link layer addresses. ARP table contains
information on the established correspondence.
Correspondence is established on the basis of the network device
response analysis; device addresses are requested with broadcast
packets.
DHCP client
DHCP (Dynamic Host Configuration Protocol) protocol enables
automation of the network device management process.
DHCP client allows the router to obtain the network address and
additional settings from the external DHCP server. As a rule, this method
is used for obtaining network settings of a public network operator
(WAN).

ESR-Series. User manual
17
•
•
DHCP server DHCP server enables automation and centralization of the network
device configuration process.
DHCP server allocated on a router allows for a complete solution for the
local area network support.
DHCP server integrated into the router assigns IP addresses to network
devices and transfers additional network settings, e.g. server addresses,
network gateway addresses and other necessary settings.
DHCP Relay The DHCP Relay functionality is designed to redirect broadcast DHCP
Discover packets from one broadcast domain to unicast DHCP Discover
packets in another broadcast domain.
NAT, Network Address Translation Network address translation is a mechanism that translates IP
addresses and port numbers for transit packets.
NAT function allows to minimize the quantity of IP address used through
translation of multiple internal network IP addresses into a single
external public IP address. NAT conceals local area network internal
structure and allows to enhance its security.
Routers support the following NAT options:
Source NAT (SNAT) – the network address and the source
port number will be replaced, when packet is transferred forth,
and the destination address will be replaced in the response
packet;
Destination NAT (DNAT) – external access is translated by the
router to the user computer in LAN that has an internal
address and thus directly inaccessible from outside the
network (without NAT).

ESR-Series. User manual
18
•
•
•
•
•
2.2.5 Traffic tunnelling functions
Table 5 – Traffic tunnelling functions
Tunnelling protocols Tunneling is a method of packet conversion during their network transfer that
involves the replacement, modification and addition of a new packet network
header. This method may be used for negotiation of transport protocols when
the data is transferred through the transit network as well as for creation of
secured connections where tunnelled data is being encrypted.
Routers support the following types of tunnels:
GRE – IP packet/Ethernet frame is encapsulated into another IP
packet with GRE (General Routing Encapsulation) header;
IPv4-IPv4 – tunnel that encapsulates source IP packets into IP
packets with alternative network parameters;
L2TPv3 – tunnel for L2 traffic transmission using IP packets;
IPsec – tunnel with the encryption of transmitted data;
L2TP, PPTP, PPPoE, OpenVPN – tunnels used for establishing a
remote 'client-sever' access.
2.2.6 Management and configuration functions
Table 6 – Basic management and configuration functions
Configuration file download and upload Device parameters are saved into the configuration file that contains
configuration data for the specific device ports as well as for the
whole system. The following protocols may be used for file transfers:
TFTP, FTP, and SCP.
Command line interface (CLI) CLI management is performed locally via serial port RS-232, or
remotely via Telnet, SSH. Console command line interface (CLI) is the
industrial standard. CLI interpreter contains the list of commands and
keywords that will help the user and reduce the amount of input data.
Syslog Syslog protocol is designed for transmission of system event
messages and event logging.
Ping, traceroute
network utilities
Ping and traceroute utilities allow you to check the availability of
network devices and identify data transfer routes in IP networks.
Controlled access management – privilege
levels
Routers support system access level management for users. Access
levels enable responsibility areas management for device
administrators. Access levels are numbered from 1 to 15; Level 15
stands for full access to device management features.

ESR-Series. User manual
19
•
•
Authentication Authentication is a user identity check procedure. Routers support the
following authentication methods:
local – local user database stored on the device is used for
authentication;
group – user database is located on the authentication
server. RADIUS and TACACS protocols are user for server
interactions.
SSH Server/
Telnet Server
SSH and Telnet server features allow you to establish connection to
the device and perform device management.
Automatic configuration restore Device features automatic configuration restore system designed to
prevent remote access loss after re-configuration. If the configuration
change is not confirmed in the specified time, configuration will be
rolled back to the last known state.
2.2.7 Network security functions
Table 7 lists network security functions of the device.
Table 7 – Network security functions
Security zones All router interfaces are distributed by security areas.
For each zone pair, you can set the rules that determine the possibility of data
transmission between zones, data traffic filtering rules.
Data filtering For each zone pair, you can specify the rule set that manages the filtering
process for data transmitted through the router.
Device command interface provides appropriate means for detailed
configuration of the traffic classification rules and to apply the resulting
solution for traffic transmission.

ESR-Series. User manual
20
2.3 Main specifications
Tble 8 lists main specifications of the router.
Table 8 – Main Specifications
General parameters
Interfaces ESR-1700 4 x Combo Ethernet 10/100/1000BASE-T/1000BASE-X
8 x 10GBASE-R/1000BASE-X (SFP+/SFP)
2 x Hard disk installation slot
1 x Console RJ-45
1 x OOB port
2 x USB 2.0
ESR-3100 8 x Combo Ethernet 10/100/1000BASE-T/1000BASE-X
8 x 10GBASE-R/1000BASE-X (SFP+/SFP)
1 x Console RJ-45
2 x USB 3.0
1 x SD card slot
ESR-1511 4 x Combo Ethernet 10/100/1000BASE-T/1000BASE-X
4 x Ethernet 10/100/1000BASE-T (RJ-45)
4 x 10GBASE-R/1000BASE-X (SFP+/SFP)
2 x40GBASE-X (QSFP+)
1 x Console RJ-45
1 x OOB port
2 x USB 2.0
1 x SD card slot
Other manuals for ESR Series
1
This manual suits for next models
14
Table of contents
Other ELTEX Network Router manuals
Popular Network Router manuals by other brands

CTEK
CTEK Z4400 user guide

ZyXEL Communications
ZyXEL Communications ZyXEL Dimension ES-2108-F quick start guide

Juniper
Juniper E-Series Hardware guide

Edimax
Edimax AR-7267WnA Quick installation guide

Matrix Switch Corporation
Matrix Switch Corporation MSC-UXD44L product manual

KTI Networks
KTI Networks KGS-2404 user manual