Table of Contents
1. Introduction ...................................................................................................................................... 1-1
Overview ...........................................................................................................................................1-2
Package Checklist ...............................................................................................................................1-2
Features ............................................................................................................................................1-2
Industrial Networking Capability....................................................................................................1-2
Designed for Industrial Applications ...............................................................................................1-2
Useful Utility and Remote Configuration .........................................................................................1-2
2. Getting Started ................................................................................................................................. 2-1
RS-232 Console Configuration (115200, None, 8, 1, VT100) ....................................................................2-2
Using Telnet to Access the EDR-G903’s Console .....................................................................................2-4
Using a Web Browser to Configure the EDR-G903 ...................................................................................2-5
3. Features and Functions ..................................................................................................................... 3-1
Configuring Basic Settings ...................................................................................................................3-3
System Identification ...................................................................................................................3-3
Accessible IP...............................................................................................................................3-4
Password ...................................................................................................................................3-5
Time..........................................................................................................................................3-6
SettingCheck ..............................................................................................................................3-8
System File Update—by Remote TFTP ............................................................................................3-9
System File Update—by Local Import/Export ................................................................................ 3-10
Restart..................................................................................................................................... 3-11
Reset to Factory Default............................................................................................................. 3-11
Network Settings .............................................................................................................................. 3-11
Mode Configuration ................................................................................................................... 3-11
WAN1 Configuration .................................................................................................................. 3-12
WAN2 Configuration (includes DMZ Enable) .................................................................................. 3-15
Using DMZ Mode ....................................................................................................................... 3-18
LAN Interface ........................................................................................................................... 3-18
DHCP Server............................................................................................................................. 3-19
Static DHCP List ........................................................................................................................ 3-20
Dynamic DNS ........................................................................................................................... 3-20
Communication Redundancy .............................................................................................................. 3-21
How Dual WAN Backup Works..................................................................................................... 3-21
WAN Backup Configuration ......................................................................................................... 3-22
Static Routing and Dynamic Routing ................................................................................................... 3-23
Static Routing ........................................................................................................................... 3-24
RIP (Routing Information Protocol) .............................................................................................. 3-24
Routing Table ........................................................................................................................... 3-25
Network Address Translation (NAT)..................................................................................................... 3-26
NAT Concept............................................................................................................................. 3-26
N-to-1 NAT............................................................................................................................... 3-26
Port Forwarding ........................................................................................................................ 3-27
1-to-1 NAT ............................................................................................................................... 3-28
Firewall Settings ............................................................................................................................... 3-30
Firewall Policy Concept............................................................................................................... 3-30
Firewall Policy Overview ............................................................................................................. 3-30
Firewall Policy Configuration ....................................................................................................... 3-31
Layer 2 Policy Setup .................................................................................................................. 3-32
Quick Automation Profile ............................................................................................................ 3-34
PolicyCheck .............................................................................................................................. 3-35
Denial of Service (DoS) function.................................................................................................. 3-37
VPN (Virtual Private Network) ............................................................................................................ 3-38
Overview.................................................................................................................................. 3-38
IPSec Configuration ................................................................................................................... 3-39
X.509 Certification..................................................................................................................... 3-44
L2TP (Layer 2 Tunnel Protocol) ................................................................................................... 3-46
Examples for Typical VPN Applications ......................................................................................... 3-47
Traffic Prioritization........................................................................................................................... 3-49
How Traffic Prioritization Works................................................................................................... 3-49
Traffic Prioritization Configuration................................................................................................ 3-50
Configuring SNMP ............................................................................................................................. 3-53
Using Auto Warning .......................................................................................................................... 3-55
Using Diagnosis ................................................................................................................................ 3-58
Using Monitor................................................................................................................................... 3-59
Using System Log ............................................................................................................................. 3-60
Using HTTPs/SSL .............................................................................................................................. 3-62
A. MIB Groups ....................................................................................................................................... A-1