User Guide - TP-Link

User Guide

Omada Gigabit VPN Router

? 2021 TP-Link REV1.0.1 1910012985

CONTENTS

About This Guide

Intended Readers................................................................................................................................................................. 1 Conventions............................................................................................................................................................................ 1 More Information.................................................................................................................................................................. 1

Accessing the Router

Determine the Management Method............................................................................................................................ 3 Web Interface Access......................................................................................................................................................... 4

Viewing Status Information

System Status........................................................................................................................................................................ 7 Traffic Statistics ................................................................................................................................................................... 8

Viewing the Interface Statistics..........................................................................................................................................................8 Viewing the IP Statistics..........................................................................................................................................................................9

Configuring Network

Overview............................................................................................................................................................................... 12 Supported Features...............................................................................................................................................................................12

WAN Configuration........................................................................................................................................................... 13 Configuring the Number of WAN Ports.......................................................................................................................................13 Configuring the WAN Connection.................................................................................................................................................13

LAN Configuration............................................................................................................................................................. 23 Configuring the IP Address of the LAN Port.............................................................................................................................23 Configuring the DHCP Server...........................................................................................................................................................24 Viewing the DHCP Client List............................................................................................................................................................26

MAC Configuration............................................................................................................................................................ 28 Configuring MAC Address.................................................................................................................................................................28

Switch Configuration........................................................................................................................................................ 30 Viewing the Statistics (only for certain devices).....................................................................................................................30 Configuring Port Mirror.........................................................................................................................................................................31 Configuring Rate Control (only for certain devices).............................................................................................................32 Configuring Port Config.......................................................................................................................................................................33 Viewing Port Status................................................................................................................................................................................34

VLAN Configuration.......................................................................................................................................................... 35

Creating a VLAN.......................................................................................................................................................................................35 Configuring the PVID of a Port.........................................................................................................................................................36

Configuring Preferences

Overview............................................................................................................................................................................... 39 IP Group Configuration ................................................................................................................................................... 40

Adding IP Address Entries..................................................................................................................................................................40 Grouping IP Address Entries.............................................................................................................................................................41 Time Range Configuration.............................................................................................................................................. 42 VPN IP Pool Configuration.............................................................................................................................................. 44 Service Type Configuration........................................................................................................................................... 45

Configuring Transmission

Transmission....................................................................................................................................................................... 49 Overview.......................................................................................................................................................................................................49 Supported Features...............................................................................................................................................................................49

NAT Configurations.......................................................................................................................................................... 51 Configuring the One-to-One NAT..................................................................................................................................................51 Configuring the Virtual Servers........................................................................................................................................................52 Configuring the Port Triggering.......................................................................................................................................................53 Configuring the NAT-DMZ..................................................................................................................................................................54 Configuring the ALG..............................................................................................................................................................................54

Bandwidth Control Configuration................................................................................................................................ 56 Session Limit Configurations........................................................................................................................................ 58

Configuring Session Limit...................................................................................................................................................................58 Viewing the Session Limit Information........................................................................................................................................59 Load Balancing Configurations.................................................................................................................................... 60 Configuring the Load Balancing......................................................................................................................................................60 Configuring the Link Backup.............................................................................................................................................................61 Configuring the Online Detection...................................................................................................................................................62 Routing Configurations.................................................................................................................................................... 63 Configuring the Static Routing.........................................................................................................................................................63 Configuring the Policy Routing........................................................................................................................................................64 Viewing the Routing Table..................................................................................................................................................................65 Configuration Examples.................................................................................................................................................. 66 Example for Configuring NAT...........................................................................................................................................................66

Network Requirements...........................................................................................................................................................66

Network Topology.....................................................................................................................................................................66 Configuration Scheme............................................................................................................................................................66 Configuration Procedure.......................................................................................................................................................67 Example for Configuring Load Balancing...................................................................................................................................68 Network Requirements...........................................................................................................................................................68 Network Topology.....................................................................................................................................................................69 Configuration Scheme............................................................................................................................................................69 Configuration Procedure.......................................................................................................................................................69 Example for Configuring Virtual Server.......................................................................................................................................70 Network Requirements...........................................................................................................................................................70 Network Topology.....................................................................................................................................................................70 Configuration Scheme............................................................................................................................................................70 Configuration Procedure.......................................................................................................................................................70 Example for Configuring Policy Routing.....................................................................................................................................71 Network Requirements...........................................................................................................................................................71 Network Topology.....................................................................................................................................................................72 Configuration Scheme............................................................................................................................................................72 Configuration Procedure.......................................................................................................................................................72

Configuring Firewall

Firewall................................................................................................................................................................................... 76 Overview.......................................................................................................................................................................................................76 Supported Features...............................................................................................................................................................................76

Firewall Configuration...................................................................................................................................................... 78 Anti ARP Spoofing...................................................................................................................................................................................78 Adding IP-MAC Binding Entries.........................................................................................................................................78 Enable Anti ARP Spoofing.....................................................................................................................................................81 Configuring Attack Defense..............................................................................................................................................................83 Configuring Access Control..............................................................................................................................................................85

Configuration Examples.................................................................................................................................................. 87 Example for Anti ARP Spoofing.......................................................................................................................................................87 Network Requirements...........................................................................................................................................................87 Configuration Scheme............................................................................................................................................................87 Configuration Procedure.......................................................................................................................................................88 Example for Access Control.............................................................................................................................................................90 Network Requirements...........................................................................................................................................................90 Configuration Scheme............................................................................................................................................................91

Configuration Procedure.......................................................................................................................................................91

Configuring Behavior Control

Behavior Control................................................................................................................................................................ 97 Overview.......................................................................................................................................................................................................97 Supported Features...............................................................................................................................................................................97

Behavior Control Configuration................................................................................................................................... 98 Configuring Web Filtering...................................................................................................................................................................98 Configure Web Group Filtering...........................................................................................................................................98 Configuring URL Filtering....................................................................................................................................................101 Configuring Web Security................................................................................................................................................................103

Configuration Examples................................................................................................................................................105 Example for Access Control..........................................................................................................................................................105 Network Requirements........................................................................................................................................................105 Configuration Scheme.........................................................................................................................................................105 Configuration Procedure....................................................................................................................................................106 Example for Web Security...............................................................................................................................................................109 Network Requirements........................................................................................................................................................109 Configuration Scheme.........................................................................................................................................................109 Configuration Procedure....................................................................................................................................................109

Configuring VPN

VPN........................................................................................................................................................................................112 Overview....................................................................................................................................................................................................112 Supported Features............................................................................................................................................................................113

IPSec VPN Configuration..............................................................................................................................................116 Configuring the IPSec Policy.........................................................................................................................................................116 Configuring the Basic Parameters................................................................................................................................116 Configuring the Advanced Parameters......................................................................................................................118 Verifying the Connectivity of the IPSec VPN tunnel.........................................................................................................120

L2TP Configuration.........................................................................................................................................................122 Configuring the VPN IP Pool...........................................................................................................................................................122 Configuring L2TP Globally...............................................................................................................................................................123 Configuring the L2TP Server.........................................................................................................................................................123 Configuring the L2TP Client...........................................................................................................................................................124 (Optional) Configuring the L2TP Users.....................................................................................................................................126 Verifying the Connectivity of L2TP VPN Tunnel..................................................................................................................127

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download