Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!
If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual TP-LINK TL-ER5120. We hope that this TP-LINK TL-ER5120 user guide will be useful to you.
Lastmanuals help download the user guide TP-LINK TL-ER5120.
Detailed instructions for use are in the User's Guide.
[. . . ] TL-ER5120 Gigabit Load Balance Broadband Router
REV2. 0. 0 1910010931
COPYRIGHT & TRADEMARKS
Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO. , LTD. Other brands and product names are trademarks of their respective holders. No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation, transformation, or adaptation without permission from TP-LINK TECHNOLOGIES CO. , LTD. [. . . ] TL-ER5120 supports both RIPv1 version and RIPv2 version, thus you can configure the RIP version based on the actual need to improve the network performance. Choose the menu Advanced→Routing→RIP to load the following page.
-67-
Figure 3-45 RIP The following items are displayed on this screen: General Interface: Displays the interfaces which has been physically connected or assigned static IP. Status: RIP Version: Password Enable or disable RIP protocol. If RIPv2 is enabled, set the Password Authentication according to the actual
Authentication: network situation, and the password should not be more than 15 characters. All Interfaces: Here you can operate all the interfaces in bulk. All the interfaces will not apply RIP if “Disable” option for All Interfaces is selected.
List of RIP After RIP is enabled, the information of RIP forwarding the packets received by the router will be displayed in the list. The first entry in Figure 3-45 indicates: when receiving packets with destination IP is 116. 10. 20. 28, the router will select WAN1 which is in the same network with the destination IP as next hop and forward -68-
data via this port. The IP address of next hop is 116. 10. 1. 254 and the hop count is 1. The effective time of this entry is 1 second. Note: ● RIP function cannot be set if the router is in NAT Mode. To set RIP function, please change the System Mode to Routing or Full Mode. ● The RIP function of WAN port takes effects only when the Connection Type of this WAN port is Static IP.
3. 3. 5. 3
Route Table
This page displays the information of the system route table. Choose the menu Advanced→Routing→Route Table to load the following page.
Figure 3-46 RIP The following items are displayed on this screen: Route Table Destination: Gateway: Flags: The Destination of route entry. The Flags describe certain characteristics of the route. Logical Interface: Physical Interface: The logical interface of route entry. The physical interface of route entry.
-69-
Metric
The Metric of route entry.
3. 4 Firewall
3. 4. 1 Anti ARP Spoofing
ARP (Address Resolution Protocol) is used to analyze and map IP addresses to the corresponding MAC addresses so that packets can be delivered to their destinations correctly. ARP functions to translate the IP address into the corresponding MAC address and maintain an ARP Table, where the latest used IP address-to-MAC address mapping entries are stored. ARP protocol can facilitate the Hosts in the same network segment to communicate with one another or access to external network via Gateway. However, since ARP protocol is implemented with the premise that all the Hosts and Gateways are trusted, there are high security risks during ARP Implementation Procedure in the actual complex network. The attacker may send the ARP spoofing packets with false IP address-to-MAC address mapping entries, and then the device will automatically update the ARP table after receiving wrong ARP packets, which results in a breakdown of the normal communication. Thus, ARP defense technology is generated to prevent the network from this kind of attack.
3. 4. 1. 1
IP-MAC Binding
IP-MAC Binding functions to bind the IP address, MAC address of the host together and only allows the Hosts matching the bound entries to access the network. Choose the menu Firewall→Anti ARP Spoofing→IP-MAC Binding to load the following page.
Figure 3-47 IP-MAC Binding -70-
The following items are displayed on this screen: General It is recommended to check all the options. [. . . ] Protocol) ICMP(Internet Control Messages Protocol) Network layer Internet protocol that reports errors and provides other information relevant to IP packet processing. Largest global Internetwork, connecting tens of thousands of Internet networks worldwide and having a “culture” that focuses on research and standardization based on real-life use. Network layer protocol in the TCP/IP stack offering a IP(Internet Protocol) connectionless Internetwork service. IP provides features for addressing, type-of-service specification, fragmentation and reassembly, and security. [. . . ]
DISCLAIMER TO DOWNLOAD THE USER GUIDE TP-LINK TL-ER5120
Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service.
Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual TP-LINK TL-ER5120 will begin.