Download Print this page

TP-Link TL-R470T Plus Configuration Manual

Hide thumbs

Advertisement

Configuration Guide

TL-R470T+/TL-R480T+
1910012201 REV9.0.0
June 2017

Advertisement

loading

  Related Manuals for TP-Link TL-R470T Plus

  Summary of Contents for TP-Link TL-R470T Plus

  • Page 1: Configuration Guide

    Configuration Guide TL-R470T+/TL-R480T+ 1910012201 REV9.0.0 June 2017...
  • Page 2: Table Of Contents

    CONTENTS About This Guide Intended Readers ................................1 Conventions ................................... 1 More Information ................................. 1 Viewing Status Information ....................2 System Status ..................................3 Traffic Statistics .................................. 4 Viewing the Interface Statistics .................................4 Viewing the IP Statistics ..................................5 Configuring Network ......................7 Overview ....................................
  • Page 3 Creating a VLAN ......................................36 Configuring the PVID of a Port ................................37 IPv6 Configuration ................................39 Configuring the LAN ....................................39 Configuring the WAN ....................................40 Configuring the Number of WAN Ports ........................40 Configuring the WAN Connection ...........................41 Configuring Preferences ....................49 Overview ....................................50 IP Group Configuration ..............................
  • Page 4 Configuring the Policy Routing ...............................74 Viewing the Routing Table .................................75 Configuration Examples ..............................76 Example for Configuring NAT ................................76 Network Requirements ................................76 Network Topology ..................................76 Configuration Scheme ................................76 Configuration Procedure ..............................77 Example for Configuring Load Balancing ..........................79 Network Requirements ................................79 Network Topology ..................................79 Configuration Scheme ................................79 Configuration Procedure ..............................80...
  • Page 5 Network Requirements ................................98 Configuration Scheme ................................98 Configuration Procedure ..............................99 Example for MAC Filtering ................................101 Network Requirements ...............................101 Configuration Scheme ................................102 Configuration Procedure ..............................102 Example for Access Control .................................103 Network Requirements ...............................103 Configuration Scheme ................................103 Configuration Procedure ..............................104 Configuring Behavior Control ..................108 Behavior Control ................................109 Overview ........................................109 Supported Features ...................................109...
  • Page 6 Supported Authentication Server..........................126 Guest Resources..................................126 Local Authentication Configuration .........................127 Configuring the Authentication Page ............................127 Configuring the Local User Account ............................130 Configuring the Local User Account ...........................130 (Optional) Configuring the Backup of Local Users ....................133 Radius Authentication Configuration ........................134 Configuring Radius Authentication ............................134 Onekey Online Configuration .............................137 Configuring the Authentication Page ............................137 Guest Resources Configuration ..........................139...
  • Page 7 Configuring the DDNS function .............................156 System Tools ........................158 System Tools ..................................159 Overview ........................................159 Support Features ....................................159 Admin Setup ..................................160 Admin Setup ......................................160 Remote Management ..................................161 System Setting .....................................161 Management ..................................163 Factory Default Restore ...................................163 Backup & Restore ....................................163 Reboot ........................................164 Firmware Upgrade ....................................164 SNMP ....................................165 Diagnostics ..................................166...
  • Page 8: About This Guide

     The Installation Guide (IG) can be found where you find this guide or inside the package of the router.  Specifications can be found on the product page at http://www.tp-link.com.  A Technical Support Forum is provided for you to discuss our products at http://forum.
  • Page 9: Viewing Status Information

    Part 1 Viewing Status Information CHAPTERS 1. System Status 2. Traffic Statistics...
  • Page 10: System Status

    Viewing Status Information System Status System Status The System Status page displays the basic system information (like the hardware version, firmware version and system time) and the running information (like the WAN interface status, memory utilization and CPU utilization). Choose the menu Status > System Status > System Status to load the following page. Figure 1-1 System Status Configuration Guide...
  • Page 11 Viewing Status Information Traffic Statistics Traffic Statistics Traffic Statistics displays detailed information relating to the data traffic of interfaces and IP addresses. You can monitor the traffic and locate faults according to this information. With the Traffic Statistics function, you can:  View the traffic statistics on each interface.
  • Page 12 Viewing Status Information Traffic Statistics Total RX Packets Displays the number of packets received on the interface. You can enable Auto Refresh or click Refresh to get the latest statistics information, or click Clear to clear the current statistics information. Viewing the IP Statistics Choose the menu Status >...
  • Page 13 Viewing Status Information Traffic Statistics Total TX Bytes Displays the bytes of packets transmitted by the user who owns the IP address. Total RX Bytes Displays the bytes of packets received by the user who owns the IP address. Total TX Packets Displays the number of packets transmitted by the user who owns the IP address.
  • Page 14: Configuring Network

    Part 2 Configuring Network CHAPTERS 1. Overview 2. WAN Configuration 3. LAN Configuration 4. IPTV Configuration 5. MAC Configuration 6. Switch Configuration 7. VLAN Configuration 8. IPv6 Configuration...
  • Page 15: Overview

    Configuring Network Overview Overview The Network module provides basic router functions, including WAN connection, DHCP service, VLAN, IPTV service and more. 1.1 Supported Features The router can provide a maximum of four WAN ports. Each WAN port has its own internet connection, providing link backup and load balancing.
  • Page 16: Wan Configuration

    Configuring Network WAN Configuration WAN Configuration You can configure at most four WAN ports. Each WAN port can have its own WAN connection, providing link backup and load balancing. To complete WAN configuration, follow these steps: 1) Configure the number of WAN ports. 2) Configure the WAN connection.
  • Page 17 Configuring Network WAN Configuration Static IP: If your ISP provides you with a fixed IP address and the corresponding parameters, choose Static IP. Dynamic IP: If your ISP automatically assigns the IP address and the corresponding parameters, choose Dynamic IP. PPPoE: If your ISP provides you with a PPPoE account, choose PPPoE.
  • Page 18 Configuring Network WAN Configuration Specify the MTU (Maximum Transmission Unit) of the WAN port. MTU is the maximum data unit transmitted in the physical network. When Dynamic IP is selected, MTU can be set in the range of 576-1500 bytes. The default value is 1500.
  • Page 19 Configuring Network WAN Configuration Connection Type Choose the connection type as Static IP if your ISP has offered you a fixed IP address. IP Address Enter the IP address provided by your ISP. Subnet Mask Enter the subnet mask provided by your ISP. Default Gateway Enter the default gateway provided by your ISP.
  • Page 20 Configuring Network WAN Configuration  Configuring the PPPoE Choose the menu Network > WAN > WAN to load the following page. Figure 2-4 Configuring the PPPoE In the Connection Configuration section, select the connection type as PPPoE. Enter the corresponding parameters and click Save. Connection Type Choose the connection type as PPPoE if your ISP provides you with a PPPoE account.
  • Page 21 Configuring Network WAN Configuration Downstream Specify the downstream bandwidth of the WAN port. The value configured here is the Bandwidth lower limit of the “Maximum Downstream Bandwidth” on Transmission > Bandwidth Control > Bandwidth Control page, to make “Bandwidth Control” take effect, please ensure this parameter is set correctly.
  • Page 22 Configuring Network WAN Configuration  Configuring the L2TP Choose the menu Network > WAN > WAN to load the following page. Figure 2-5 Configuring the L2TP In the Connection Configuration section, select the connection type as L2TP. Enter the corresponding parameters and click Save. Connection Type Choose the connection type as L2TP if your ISP provides you with an L2TP account.
  • Page 23 Configuring Network WAN Configuration Upstream Specify the upstream bandwidth of the WAN port. The value configured here is the Bandwidth upper limit of the “Maximum Upstream Bandwidth” on Transmission > Bandwidth Control > Bandwidth Control page, to make “Bandwidth Control” take effect, please ensure this parameter is set correctly.
  • Page 24 Configuring Network WAN Configuration  Configuring the PPTP Choose the menu Network > WAN > WAN to load the following page. Figure 2-6 Configuring the PPTP In Connection Configuration section, select the connection type as PPTP. Enter the corresponding parameters and click Save. Connection Type Choose the connection type as PPTP if your ISP provides you with a PPTP account.
  • Page 25 Configuring Network WAN Configuration Upstream Specify the upstream bandwidth of the WAN port. The value configured here is the Bandwidth upper limit of the “Maximum Upstream Bandwidth” on Transmission > Bandwidth Control > Bandwidth Control page, to make “Bandwidth Control” take effect, please ensure this parameter is set correctly.
  • Page 26 Configuring Network WAN Configuration  Configuring the BigPond Cable Choose the menu Network > WAN > WAN to load the following page. Figure 2-7 Configuring the BigPond Cable In Connection Configuration section, select the connection type as BigPond Cable. Enter the corresponding parameters and click Save. Connection Type Choose the connection type as BigPond if your ISP provides you with a BigPond account.
  • Page 27 Configuring Network WAN Configuration Specify the MTU (Maximum Transmission Unit) of the WAN port. MTU is the maximum data unit transmitted in the physical network. When BigPond Cable is selected, MTU can be set in the range of 576-1500 bytes. The default value is 1500.
  • Page 28: Lan Configuration

    Configuring Network LAN Configuration LAN Configuration The LAN port is used to connect to the LAN clients, and works as the default gateway for these clients. You can configure the DHCP server for the LAN clients, and clients will automatically be assigned to IP addresses if the method of obtaining IP addresses is set as “Obtain IP address automatically”.
  • Page 29: Configuring The Dhcp Server

    Configuring Network LAN Configuration Note: Changing the IP address of LAN port will automatically redirect the browser to the new man- • agement page. If the redirecting failed, please try to reconnect your PC to the router to auto- matically get a new IP address, or configure a proper static IP address manually. Changing the IP address of the LAN port may affect some related functions, like the IP pool of •...
  • Page 30 Optional. Specify the option 60 for device identification. Mostly it is used under the scenario where the clients apply for different IP addresses from different servers according to the needs. By default, it is TP-LINK. If a client requests option 60, the server will respond a packet containing the option 60 configured here.
  • Page 31: Viewing The Dhcp Client List

    Configuring Network LAN Configuration Figure 3-3 Configuring the Address Reservation Enter the MAC address of the client and the IP address to be reserved, then click OK. MAC Address Enter the MAC address of the client. IP Address Enter the IP address to be reserved. Description Optional.
  • Page 32: Iptv Configuration

    Configuring Network IPTV Configuration IPTV Configuration You can configure IPTV according to the type of IPTV service provided by your ISP:  Configure IPTV based on IGMP.  Configure IPTV in Bridge mode.  Configure IPTV in Custom mode. Configuring IPTV Based on IGMP Some ISPs provide IPTV service based on IGMP technology.
  • Page 33: Configuring Iptv In Bridge Mode

    Configuring Network IPTV Configuration 4.2 Configuring IPTV in Bridge Mode If your ISP doesn’t provide any parameters and the IPTV service is not based on IGMP technology, you can enable IPTV function and choose the Bridge mode, then specify a port to connect IPTV set-top box.
  • Page 34 Configuring Network IPTV Configuration Figure 4-3 Configuring the Custom Mode Follow these steps to configure IPTV in Custom mode: 1) Enable IPTV function and choose the mode as Custom. IPTV Check the box to enable IPTV function. Mode Choose the mode as Custom. In Custom mode, the services are labeled with different VLAN tags, which is specified by the ISP.
  • Page 35: Viewing The Statistics

    Configuring Network IPTV Configuration IPTV VLAN Enter the VLAN priority of the IPTV service. It is provided by your ISP. Priority IPTV Multicast Enter the VLAN ID of the IPTV multicast service. It is provided by your ISP. VLAN ID IPTV Multicast Enter the VLAN priority of the IPTV multicast service.
  • Page 36: Mac Configuration

    Configuring Network MAC Configuration MAC Configuration Generally, the MAC address does not need to be changed. However, in some particular situations, you may need to change the MAC address of the WAN port or LAN port.  Configure the MAC Address of the WAN port In the condition that your ISP has bound the account to the MAC address of the dial-up device, if you want to replace the dial-up device with this router, you can just set the MAC address of this router’s WAN port as the same as that of the previous dial-up device for a...
  • Page 37: Configuring Rate Control

    Configuring Network MAC Configuration MAC Clone Restore Factory MAC: Click this button to restore the MAC address to the factory default value. Clone Current PC’s MAC: Click this button to clone the MAC address of the PC you are currently using to configure the router. It’s only available for the WAN ports. Note: To avoid a MAC address conflict in the LAN, it is not permitted to set the MAC address of the router’s LAN port as the MAC address of the current management PC.
  • Page 38: Switch Configuration

    Configuring Network Switch Configuration Switch Configuration The router provides some basic switch port management function, including Port Config and Port Status. Configuring Port Config You can configure the flow control and negotiation mode for the port. Choose the menu Network > Switch > Port Config to load the following page. Figure 6-1 Configuring Flow Control and Negotiation Configure the flow control and negotiation mode for a port.
  • Page 39: Viewing Port Status

    Configuring Network Switch Configuration Figure 6-2 Viewing Port Status Status Displays the port status. Link Down: The port is not connected. Link Up: The port is working normally. Speed (Mbps) Displays the port speed. Duplex Mode Displays the duplex mode of the port. Flow Control Displays if the Flow Control is enabled.
  • Page 40: Vlan Configuration

    Configuring Network VLAN Configuration VLAN Configuration The router supports 802.1Q VLAN, which can divide a LAN into multiple logical LANs. Each logical LAN is a VLAN. Hosts in the same VLAN can communicate with each other. However, hosts in different VLANs cannot communicate directly. Therefore, broadcast packets can be limited to within the VLAN.
  • Page 41: Configuring The Pvid Of A Port

    Configuring Network VLAN Configuration Viewing the VLANs Choose the menu Network > VLAN > VLAN to load the following page. Figure 7-2 Viewing the VLAN In the VLAN list you can view all the VLANs existing in the router. VLAN ID Displays the VLAN ID.
  • Page 42 Configuring Network VLAN Configuration Figure 7-3 Configuring the PVID Configure the PVID of the port, then click Save. Port Displays the port. PVID Specify the PVID for the port. VID indicates the default VLAN for the corresponding port. VLAN Displays the VLAN(s) the port belongs to. Configuration Guide...
  • Page 43: Ipv6 Configuration

    Configuring Network IPv6 Configuration IPv6 Configuration To complete IPv6 configuration, follow these steps: 1) Configure the LAN to specify the type of assigning IPv6 address to the client. 2) Configure the WAN connection. 8.1 Configuring the LAN Configure the type of assigning IPv6 address to the LAN clients. Choose the menu Network >...
  • Page 44: Configuring The Wan

    Configuring Network IPv6 Configuration Assigned Type Select the appropriate type of assigning the IPv6 address according to your ISP. DHCPv6: The DHCP server automatically assigns the IPv6 address and DNS information to the clients. SLAAC+Stateless DHCP: The DHCP server advertises the IPv6 prefix to the client, the client then dynamically form a host identifier that is 64 bits long and will be suffixed to the end of the advertised prefix to form an IPv6 address.
  • Page 45: Configuring The Wan Connection

    Configuring Network IPv6 Configuration WAN Mode Specify the number of WAN ports. 1: Configure physical interface 1 as WAN1. 2: Configure physical interface 1 and interface 2 as WAN1 and WAN2 respectively. 3: Configure physical interface 1, interface 2 and interface3 as WAN1, WAN2 and WAN3 respectively.
  • Page 46 Configuring Network IPv6 Configuration Choose the menu Network > IPv6 > WAN to load the following page.  Configuring the Dynamic IP (SLAAC/DHCPv6) Figure 8-2 Configuring the Dynamic IP (SLAAC/DHCPv6) Follow these steps to configure Dynamic IP connection: 1) In the General section, check the box to enable IPv6 function, then click Save. IPv6 Check the box to enable IPv6 function.
  • Page 47 Configuring Network IPv6 Configuration 3) In the Internet section, click Advanced to configure the way of getting the IPv6 address and DNS address, and configure the Prefix Delegation. Then click Save. Get IPv6 Address Choose the method by which the IPv6 address is obtained from the ISP. DHCPv6: The DHCP server automatically assigns the IPv6 address.
  • Page 48 Configuring Network IPv6 Configuration Follow these steps to configure static IP connection: 1) In the General section, check the box to enable IPv6 function, then click Save. IPv6 Check the box to enable IPv6 function. 2) In the Internet section, choose the Internet Connection type as Static IP, and configure the corresponding parameters.
  • Page 49 Configuring Network IPv6 Configuration  Configuring the PPPoE Figure 8-4 Configuring the PPPoE Follow these steps to configure PPPoE connection: 1) In the General section, check the box to enable IPv6 function, then click Save. IPv6 Check the box to enable IPv6 function. 2) In the Internet section, choose the Internet Connection type as PPPoE, and configure the corresponding parameters.
  • Page 50 Configuring Network IPv6 Configuration Internet Choose PPPoE as the connection type. Connection Type Note: If your ISP provides only one PPPoE account for both IPv4 and IPv6 con- • nections, and you have already established an IPv4 connection on this WAN port, you can check PPPoE same session with IPv4 connection, then the WAN port will use the PPP session of IPv4 PPPoE connection to get the IPv6 address.
  • Page 51 Configuring Network IPv6 Configuration  Configuring the 6to4 Tunnel 6to4 is an internet transition mechanism for migrating from IPv4 to IPv6, a system that allows IPv6 packets to be transmitted over an IPv4 network. The IPv6 packet will be encapsulated in the IPv4 packet and transmitted to the IPv6 destination through IPv4 network.
  • Page 52 Configuring Network IPv6 Configuration 3) (Optional) In Internet section, click Advanced to configure the DNS server. Then click Save. Use the following Check the box to manually enter the IP address DNS server provided by your DNS Server ISP. Note: If this option is not enabled, the router will use the default DNS servers with the IPv6 addresses as 2001:4860:4860::8888 and 2001:4860:4860::8844.
  • Page 53: Configuring Preferences

    Part 3 Configuring Preferences CHAPTERS 1. Overview 2. IP Group Configuration 3. Time Range Configuration 4. Service Type Configuration...
  • Page 54: Overview

    Configuring Preferences Overview Overview You can preset certain preferences, such as IP groups, time ranges, IP Pools and service types. These preferences will appear as options for you to choose when you are configuring the corresponding parameters for some functions. For example, the IP groups configured here will appear as options when you are configuring the effective IP addresses for functions like Bandwidth Control, Session Limit , Policy Routing and so on.
  • Page 55: Ip Group Configuration

    Configuring Preferences IP Group Configuration IP Group Configuration IP groups configured here can be used as effective IP addresses for multiple functions like Bandwidth Control, Session Limit , Policy Routing and so on. To complete IP Group configuration, follow these steps: 1) Add IP address entries.
  • Page 56: Grouping Ip Address Entries

    Configuring Preferences IP Group Configuration Grouping IP Address Entries Choose the menu Preferences > IP Group > IP Group and click Add to load the following page. Figure 2-2 Create an IP Group Follow these steps to create an IP group and add IP address entries to the group: 1) Specify a name and configure the range to add an IP address range.
  • Page 57: Time Range Configuration

    Configuring Preferences Time Range Configuration Time Range Configuration Time range configuration allows you to define time ranges by specifying the period in a day and days in a week. The time range configured here can be used as the effective time for multiple functions like Bandwidth Control, Link Backup, Policy Routing and so on.
  • Page 58 Configuring Preferences Time Range Configuration Figure 3-2 Working Calendar Mode Select the time slices and click OK to set the time range. You can click the time slices, or alternatively drag the areas to select or deselect the time slices.  Manually Manually mode allows you to enter the time range and select the effective days in a week manually.
  • Page 59: Service Type Configuration

    Configuring Preferences Service Type Configuration Service Type Configuration The service type entries configured here can be used as part of the matching conditions when configuring the Access Control rules in Firewall. Choose the menu Preferences > Service Type > Service Type to load the following page. Figure 4-1 Service Type List The entries in gray are system predefined service types.
  • Page 60 Configuring Preferences Service Type Configuration Click Add to load the following page. Figure 4-2 Add an Service Type Entry Follow these steps to add a service type entry: 1) Enter a name for the service type. Service Type Name Enter a name for the service type. Only letters, digits or underscores are allowed.
  • Page 61 Configuring Preferences Service Type Configuration When Other is selected, the following page will appear. Figure 4-5 Other Protocols Protocol Number Specify the protocol number of the packets. Packets with the protocol number field matched are considered as the target packets. 3) (Optional) Enter a brief description of this service type to make identifying it easier. 4) Click OK.
  • Page 62: Configuring Transmission

    Part 4 Configuring Transmission CHAPTERS 1. Transmission 2. NAT Configurations 3. Bandwidth Control Configuration 4. Session Limit Configurations 5. Load Balancing Configurations 6. Routing Configurations 7. Configuration Examples...
  • Page 63: Transmission

    Configuring Transmission Transmission Transmission 1.1 Overview Transmission function provides multiple traffic control measures for the network. You can configure the transmission function according to your actual needs. 1.2 Supported Features The transmission module includes NAT, Bandwidth Control, Session Limit, Load Balancing and Routing.
  • Page 64 Configuring Transmission Transmission external ports, the router can forward them to the corresponding host. Port Triggering is mainly applied to online games, VoIPs, video players and so on.  NAT-DMZ When a PC is set to be a DMZ (Demilitarized Zone) host in the local network, it is totally exposed to the internet, which can realize the unlimited bidirectional communication between internal hosts and external hosts.
  • Page 65: Nat Configurations

    Configuring Transmission NAT Configurations NAT Configurations With NAT configurations, you can:  Configure the Multi-Nets NAT.  Configure the One-to-One NAT.  Configure the Virtual Servers.  Configure the Port Triggering.  Configure the NAT-DMZ.  Configure the ALG. 2.1 Configuring the Multi-Nets NAT Note: TL-R470T+ does not support Multi-Nets NAT.
  • Page 66: Configuring The One-To-One Nat

    Configuring Transmission NAT Configurations Interface Specify the effective interface for the rule. Source IP Range Specify the source IP range for the rule. Status Check the box to enable the rule. Description Give a description for the rule entry to facilitate your management. 2) Click OK.
  • Page 67: Configuring The Virtual Servers

    Configuring Transmission NAT Configurations Description Give a description for the rule entry to facilitate your management. Status Check the box to enable the rule. 2) Click OK. Note: One-to-One NAT take effects only when the connection type of WAN is Static IP. 2.3 Configuring the Virtual Servers Choose the menu Transmission >...
  • Page 68: Configuring The Port Triggering

    Configuring Transmission NAT Configurations Configuring the Port Triggering Choose the menu Transmission > NAT > Port Triggering and click Add to load the following page. Figure 2-4 Configuring the Port Triggering Follow these steps to configure the Port Triggering: 1) Specify the name of the Port Triggering rule and configure other related parameters. Interface Specify the effective interface for the rule.
  • Page 69: Configuring The Nat-Dmz

    Configuring Transmission NAT Configurations 2.5 Configuring the NAT-DMZ Choose the menu Transmission > NAT > NAT-DMZ and click Add to load the following page. Figure 2-5 Configuring the NAT-DMZ Follow these steps to configure the NAT-DMZ: 1) Specify the name of the NAT-DMZ rule and configure other related parameters. Interface Specify the effective interface for the rule.
  • Page 70: Bandwidth Control Configuration

    Configuring Transmission Bandwidth Control Configuration Bandwidth Control Configuration Bandwidth Control functions to control the bandwidth by configuring rules for limiting various data flows. In this way, the network bandwidth can be reasonably distributed and utilized. Choose the menu Transmission> Bandwidth Control to load the following page. Figure 3-1 Configuring the Bandwidth Control Follow these steps to configure the Bandwidth Control rule: 1) In the Bandwidth Control Config Section, enable Bandwidth Control function globally.
  • Page 71 Configuring Transmission Bandwidth Control Configuration Figure 3-2 Add Bandwidth Control rules Specify the name of the Bandwidth Control rule and configure other related parameters. Then click OK. Direction Specify the data stream direction for the rule. Group Specify the address group for the rule to define the controlled users. The IP group referenced here can be created on the Preferences >...
  • Page 72: Session Limit Configurations

    Configuring Transmission Session Limit Configurations Session Limit Configurations To complete Session Limit configuration, follow these steps: 1) Configure session limit. 2) View the session limit information. Configuring Session Limit Choose the menu Transmission> Session Limit > Session Limit to load the following page.
  • Page 73: Viewing The Session Limit Information

    Configuring Transmission Session Limit Configurations Group Specify the address group to which the rule will be applied. The IP group referenced here can be created on the Preferences > IP Group > IP Group page. Max Sessions Specify the max sessions for the controlled users. Status Check the box to enable the rule.
  • Page 74: Load Balancing Configurations

    Configuring Transmission Load Balancing Configurations Load Balancing Configurations With load balancing configurations, you can:  Configure the load balancing  Configure the link backup  Configure the online detection Configuring the Load Balancing Choose the menu Transmission> Load Balancing > Basic Settings to load the following page.
  • Page 75: Configuring The Link Backup

    Configuring Transmission Load Balancing Configurations 5.2 Configuring the Link Backup With Link Backup function, the router will switch all the new sessions from dropped line automatically to another to keep an always on-line network. Choose the menu Transmission> Load Balancing > Link Backup and click Add to load the following page.
  • Page 76: Configuring The Online Detection

    Configuring Transmission Load Balancing Configurations Configuring the Online Detection With Online Detection function, you can detect the online status of the WAN port. Choose the menu Transmission> Load Balancing > Online Detection and click to load the following page. Figure 5-3 Configuring the Online Detection Configure the following parameters on this page and click OK.
  • Page 77: Routing Configurations

    Configuring Transmission Routing Configurations Routing Configurations With routing configurations, you can:  Configure the static routing  Configure the policy routing rule  View the routing table 6.1 Configuring the Static Routing Choose the menu Transmission> Routing > Static Route and click Add to load the following page.
  • Page 78: Configuring The Policy Routing

    Configuring Transmission Routing Configurations Metric Define the priority of the route. A smaller value means a higher priority. The default value is 0. It is recommended to keep the default value. Description Enter a brief description for the rule. Status Check the box to enable the rule.
  • Page 79: Viewing The Routing Table

    Configuring Transmission Routing Configurations 6.3 Viewing the Routing Table Choose the menu Transmission> Routing > Routing Table to load the following page. Figure 6-3 Routing Table The Routing Table shows the information of the current route entries. Destination IP Displays the destination IP address the route leads to. Subnet Mask Displays the subnet mask of the destination network.
  • Page 80: Configuration Examples

    Configuring Transmission Configuration Examples Configuration Examples Example for Configuring NAT Note: This example for configuring NAT is only suitable for TL-R480T+. 7.1.1 Network Requirements A company has two departments: Market Department and RD department. Each department is assigned to an individual subnet. The company has the following requirements: 1) The two departments need to access the internet via the same gateway router.
  • Page 81: Configuration Procedure

    Configuring Transmission Configuration Examples Then configure static routing on the gateway router to make sure the router know where to deliver the packets to IP addresses in different subnets (172.16.10.0/24, 172.16.20.0/24). To meet the second requirement, add One-to-One NAT entry for the Web Server on the gateway router, thus the web server with a private IP address can be accessed at a corresponding valid public IP address.
  • Page 82 Configuring Transmission Configuration Examples  Configuring the static routing 1) Choose the menu Transmission > Routing > Static Route to load the configuration page, and click Add. 2) Add static routes for the two departments respectively: Specify the entry name as RD/ Market, enter 172.16.10.0/172.16.20.0 as the destination IP, and specify the VLAN 1 interface IP of L3 switch as next hop, then choose the interface as WAN1.
  • Page 83: Example For Configuring Load Balancing

    Configuring Transmission Configuration Examples Figure 7-6 Adding a Multi-Nets Entry for RD Department 7.2 Example for Configuring Load Balancing 7.2.1 Network Requirements To make good use of bandwidth, the network administrator decides to bind two WAN links using load balancing. 7.2.2 Network Topology Figure 7-7 Network Topology Router WAN1...
  • Page 84: Configuration Procedure

    Configuring Transmission Configuration Examples 7.2.4 Configuration Procedure Follow the steps below to configure load balancing on the router:  Configuring the WAN parameters For WAN1 port, configure the connection type as PPPoE, and specify Upstream and Downstream bandwidth for this link based on your ADSL bandwidth (You could consult your internet Service Provider for the bandwidth information).
  • Page 85: Network Topology

    Configuring Transmission Configuration Examples 7.3.2 Network Topology Figure 7-9 Network Topology WAN1 Router FTP Server IP:192.168.0.100 7.3.3 Configuration Scheme In this scenario, both virtual server and DMZ host can be configured to meet the requirement. Here we take configuring Virtual Server as an example, owing to that for a DMZ host all ports are open which may result in unsafety.
  • Page 86: Example For Configuring Policy Routing

    Configuring Transmission Configuration Examples Example for Configuring Policy Routing 7.4.1 Network Requirements The network administrator has a router with 3 computers (192.168.0.2-192.168.0.4) connected to the LAN side, all computers are routed to internet by WAN1 port and WAN2 port, the requirements are as follows:  WAN2 link is used to backup WAN1 link to keep an always on-line network.
  • Page 87 Configuring Transmission Configuration Examples 2) Specify the primary WAN as WAN1, the backup WAN as WAN2 and the mode as Failover so that the backup link will be enabled when the primary WAN failed. Keep Status of this entry as Enable. Click OK. Figure 7-12 Configuring the Link Backup  Configuring the Policy Routing Rules 1) Choose the menu Preferences >...
  • Page 88 Configuring Transmission Configuration Examples 3) Choose the menu Transmission > Routing > Policy routing to load the configuration page, and click Add. Specify the policy routing rule name as policy1, the service type as HTTP, the source IP as group1, the destination IP as IPGROUP_ANY which means no limit. Choose WAN1, and keep Status of this entry as Enable.
  • Page 89: Configuring Firewall

    Part 5 Configuring Firewall CHAPTERS 1. Firewall 2. Firewall Configuration 3. Configuration Examples...
  • Page 90: Firewall

    Configuring Firewall Firewall Firewall Overview Firewall is used to enhance the network security. It can prevent external network threats from spreading to the internal network, protect the internal hosts from ARP attacks, and control the internal users’ access to the external network. Supported Features The Firewall module supports four functions: Anti ARP Spoofing, Attack Defense, MAC Filtering and Access Control.
  • Page 91: Mac Filtering

    Configuring Firewall Firewall The router provides two types of Attack Defense: Flood Defense and Packet Anomaly Defense. Flood Defense limits the receiving rate of the specific types of packets, and Packet Anomaly Defense discards the illegal packets directly. MAC Filtering MAC Filtering can flexibly control the access to the network of the specific hosts.
  • Page 92: Firewall Configuration

    Configuring Firewall Firewall Configuration Firewall Configuration In Firewall module, you can configure the following features:  Anti ARP Spoofing  Attack Defense  MAC Filtering  Access Control Anti ARP Spoofing To complete Anti ARP Spoofing configuration, there are two steps. First, add IP-MAC Binding entries to the IP-MAC Binding List.
  • Page 93 Configuring Firewall Firewall Configuration Adding IP-MAC Binding Entries Manually Before adding entries manually, get the IP addresses and MAC addresses of the hosts on the network and make sure of their accuracy. Choose the menu Firewall > Anti ARP Spoofing > IP-MAC Binding to load the following page.
  • Page 94 Configuring Firewall Firewall Configuration Interface Select an interface on which the binding rule takes effect. Description Give a description for identification. Export to DHCP Choose to whether export the entry to the DHCP Address Reservation list. Address Reservation Status Enable this entry. Only when the status is Enable will this entry be effective. 3) Click OK and the added entry will be displayed in the list.
  • Page 95: Enable Anti Arp Spoofing

    Configuring Firewall Firewall Configuration 2) Wait for a moment without any operation. The scanning result will be displayed in the following table. Click to export the entry to the IP-MAC Binding table. Figure 2-5 ARP Scanning Result Also, you can go to Firewall > Anti ARP Spoofing > ARP List to view and bind the ARP Scanning entries.
  • Page 96 Configuring Firewall Firewall Configuration Follow the steps below to configure Anti ARP Spoofing rule: 1) In the General section, enable ARP Spoofing Defense globally. With this option enabled, the router can protect its ARP table from being falsified by ARP spoofing packets. 2) Choose whether to enable the two sub functions.
  • Page 97: Configuring Attack Defense

    Configuring Firewall Firewall Configuration 2.2 Configuring Attack Defense Choose the menu Firewall > Attack Defense > Attack Defense to load the following page. Figure 2-2 Attack Defense Follow the steps below to configure Attack Defense. 1) In the Flood Defense section, check the box and configure the corresponding parameters to enable your desired feature.
  • Page 98 Configuring Firewall Firewall Configuration Multi-connections With this feature enabled, the router will filter the subsequent ICMP ICMP Flood packets if the number of this kind of packets reaches the specified threshold. The valid threshold ranges from 100 to 99999. Stationary source TCP With this feature enabled, the router will filter the subsequent stationary SYN Flood source TCP SYN packets if the number of this kind of packets reaches the...
  • Page 99: Configuring Mac Filtering

    Configuring Firewall Firewall Configuration 2.3 Configuring MAC Filtering To complete MAC Filtering configuration, there are two steps. First, add MAC Filtering entries to the MAC Filtering List. Then configure the filtering rule for these entries. Note: In case MAC Filtering causes access problems to the currently connected devices, it’s recommended to add and verify the MAC Filtering entries first before configuring the filtering rule.
  • Page 100: Configuring Access Control

    Configuring Firewall Firewall Configuration Allow packets with the Choose whether to select this filtering rule. With this rule selected, the MAC addresses listed router will allow the packets with the MAC addresses in the MAC Filtering below and deny the rest List and deny other packets.
  • Page 101 Configuring Firewall Firewall Configuration 2) Configure the required parameters and click OK: Name Specify a name for the rule. It can be 50 characters at most. The name of each entry cannot be repeated. Policy Select whether to block or allow the packets matching the rule to access the network.
  • Page 102: Configuration Examples

    Configuring Firewall Configuration Examples Configuration Examples Example for Anti ARP Spoofing 3.1.1 Network Requirements In the diagram below, several hosts are connected to the network via a layer 2 switch, and the router is the gateway of this network. Since there exists the possibility that the attacker will launch a series of ARP attacks, it is required to configure the router to protect itself and the terminal hosts from the ARP attacks.
  • Page 103: Configuration Procedure

    Configuring Firewall Configuration Examples The attacker pretends to be legal terminal hosts and sends fake ARP packets to the router, cheating the router into recording wrong ARP maps of the hosts. As a result, packets from the gateway cannot be correctly sent to the hosts. To protect the router from this kind of attack, you can configure Anti ARP Spoofing on the router.
  • Page 104 Configuring Firewall Configuration Examples Figure 3-2 Anti ARP Spoofing Page 2) The following page will appear. Enter the IP address and MAC address of Host A, select “LAN” as the effective interface, and give a description “Host A” for this entry. Since the IP address 192.168.0.10 has been used by Host A, we keep Export to DHCP Address Reservation as “Enable"...
  • Page 105: Example For Mac Filtering

    Configuring Firewall Configuration Examples Figure 3-4 Verify IP-MAC Binding Entires 4) In the General section on the same page, check the boxes to enable ARP Spoofing Defense and Send GARP packets when ARP attack is detected, and keep the interval as 1000 milliseconds.
  • Page 106: Configuration Scheme

    Configuring Firewall Configuration Examples 3.2.2 Configuration Scheme To meet this requirement, we can configure MAC Filtering on the router to filter the packets with the MAC address of the attacker. The configuration overview is as follows: 1) Enable MAC Filtering globally and select the filtering rule as “Deny packets with the MAC addresses listed below and allow the rest“.
  • Page 107: Example For Access Control

    Configuring Firewall Configuration Examples 3.3 Example for Access Control 3.3.1 Network Requirements In the diagram below, the R&D and some other departments are connected to a layer 2 switch and access the internet via the router. To limit the acts of the R&D department users, such as sending emails with the exterior mailbox, it is required that the R&D users can only visit websites via HTTP and HTTPs on the internet at any time.
  • Page 108: Configuration Procedure

    Configuring Firewall Configuration Examples 4) Since visiting the internet needs DNS service, add a rule to allow the DNS packets to be sent to the WAN. DNS service is already in the Service Type list by default. 5) Create a rule to block all packets from the R&D department to the WAN. This rule should have the lowest priority among all the rules.
  • Page 109 Configuring Firewall Configuration Examples Figure 3-4 Configure HTTPS Service Type 4) Choose the menu Firewall > Access Control > Access Control to load the configuration page, and click Add. Specify a name for this rule. Select “Allow” as the rule policy, “HTTP” as the service type, “LAN”...
  • Page 110 Configuring Firewall Configuration Examples Figure 3-6 Configure Allow Rule for HTTPS Service 6) Choose the menu Firewall > Access Control > Access Control to load the configuration page, and click Add. Specify a name for this rule. Select “Allow” as the rule policy, “DNS” as the service type, “LAN”...
  • Page 111 Configuring Firewall Configuration Examples This rule means that all packets from the R&D department are blocked from being sent from the LAN to the internet at all times. Figure 3-8 Configure Block Rule for ALL Services 8) Verify your configuration result. In the Access Control List, the rule with a smaller ID has a higher priority.
  • Page 112: Configuring Behavior Control

    Part 6 Configuring Behavior Control CHAPTERS 1. Behavior Control 2. Behavior Control Configuration 3. Configuration Examples...
  • Page 113: Behavior Control

    Configuring Behavior Control Behavior Control Behavior Control 1.1 Overview With the Behavior Control feature, you can control the online behavior of local hosts. You can block specific hosts’ access to specific websites using URLs or keywords, block HTTP posts and prevent certain types of files from being downloaded from the internet. 1.2 Supported Features The Behavior Control module supports two features: Web Filtering and Web Security.
  • Page 114: Behavior Control Configuration

    Configuring Behavior Control Behavior Control Configuration Behavior Control Configuration In Behavior Control module, you can configure the following features:  Web Filtering  Web Security Configuring Web Filtering There are two methods to filter websites: Web Group Filtering and URL Filtering. 2.1.1 Configure Web Group Filtering To configure Web Group Filtering, add one or more web groups first, and then add web group filtering entries using the created groups.
  • Page 115 Enter key, Space key, “,” or “;” to divide different websites. File Path Import member list in your TXT file from your host. The format is “www.tp-link. com” or “*.tp-link.com”, in which “*” is a wildcard. Use Enter key, Space key, “,” or “;” to divide different websites. Description Enter a brief description for the group.
  • Page 116 Configuring Behavior Control Behavior Control Configuration Policy Choose to allow or deny the websites that are in the selected web group(s). Web Group Select one or more web groups. The web group referenced here can be created on the Behavior Control > Web Filtering > Web Group page.
  • Page 117: Configuring Url Filtering

    Configuring Behavior Control Behavior Control Configuration 2.1.2 Configuring URL Filtering Before configuring URL Filtering, go to the Preferences module to configure the IP Group and Effective Time according to your needs. Choose the menu Behavior Control > Web Filtering > URL Filtering and click Add to load the following page.
  • Page 118 Configuring Behavior Control Behavior Control Configuration Mode Select the filtering mode. Keywords: If a website address contains any of the keywords, the policy will be applied to this website. URL Path: If a website address is the same as any of the entire URLs, the policy will be applied to this website.
  • Page 119: Configuring Web Security

    Configuring Behavior Control Behavior Control Configuration 2.2 Configuring Web Security Before configuring Web Security, go to Preferences module to configure the IP Group and Effective Time according to your needs. Choose the menu Behavior Control > Web Security > Web Security and click Add to load the following page.
  • Page 120 Configuring Behavior Control Behavior Control Configuration File Suffix Enter file suffixes to specify the file types. Use Enter key, Space key, “,” or “;” to divide different file suffixes. The hosts of the selected IP group cannot download these types of files from the internet. Effective Select the effective time.
  • Page 121: Configuration Examples

    Configuring Behavior Control Configuration Examples Configuration Examples 3.1 Example for Access Control 3.1.1 Network Requirements In the diagram below, the R&D and some other departments are connected to a layer 2 switch and access the internet via the router. For data security purposes, it is required that the R&D department users can only visit the official website of the company, for example: http://www.tp- link.com.
  • Page 122: Configuration Procedure

    2) Create a web group with the group member www.tp-link.com. 3) Add a Whitelist rule to allow the R&D department users to access www.tp-link.com. 4) Add a Blacklist rule to forbid the R&D department users from accessing all websites. Note that the priority of this rule should be lower than the Whitelist rule.
  • Page 123 Add. Select “RD_Dept” as the IP Group, “Whitelist” as the Policy, “RD_Filtering“ as the Web Group, and “Any” as the Effective Time. Click OK. This rule means that the hosts in the R&D department are allowed to access the website www.tp-link.com at any time. Configuration Guide...
  • Page 124 Configuring Behavior Control Configuration Examples Figure 3-5 Configure Whitelist Rule 5) On the same page, click Add. Select “RD_Dept” as the IP Group, “Blacklist” as the Policy, “All” as the Web Group, and “Any” as the Effective Time. Click OK. This rule means that the hosts in the R&D department are denied access to all websites at all times.
  • Page 125: Example For Web Security

    Configuring Behavior Control Configuration Examples Figure 3-7 Verify Configuration Result 7) In the General section on the same page, enable Web Filtering globally and click Save. Figure 3-8 Enable Web Filtering 3.2 Example for Web Security 3.2.1 Network Requirements In the diagram below, the company’s hosts are connected to a layer 2 switch and access the internet via the router.
  • Page 126: Configuration Scheme

    Configuring Behavior Control Configuration Examples 3.2.2 Configuration Scheme We can configure Web Security to meet these requirements. To block behaviors such as login and comment submitting, we can configure the router to block HTTP post; to block downloading of rar files, we can specify the suffix “rar” in the file suffix column. 3.2.3 Configuration Procedure Follow the steps below to complete the configuration: 1) Choose the menu Behavior Control >...
  • Page 127: Configuring Authentication

    Part 7 Configuring Authentication CHAPTERS 1. Overview 2. Local Authentication Configuration 3. Radius Authentication Configuration 4. Onekey Online Configuration 5. Guest Resources Configuration 6. Viewing the Authentication Status 7. Configuration Example...
  • Page 128: Overview

    Configuring Authentication Overview Overview Portal authentication, also known as Web authentication, is usually deployed in a guest- access network (like a hotel or a coffee shop) to control the client’s internet access. In portal authentication, all the client’s HTTP requests will be redirected to an authentication page first.
  • Page 129: Portal Authentication Process

    Configuring Authentication Overview 1.2 Portal Authentication Process The portal authentication process is shown as below: Figure 1-2 Portal Authentication Process Client Router Web Server Authentication Server http:// Visit the Internet Redirect the client to Web Server Visit the Web Server Returns the authentication login page Enter the Username and Password in the login page Forwards the username and password to the Authentication Server Returns the authentication result...
  • Page 130: Supported Web Server

    Configuring Authentication Overview 1.3.1 Supported Web Server The router has a built-in web server and also supports external web server. You can configure the authentication page either using the built-in server or the external server. Custom Page You can use the built-in web server and customize the authentication page on your router. External Links You can specify the external web server and configure the authentication page on the external web server.
  • Page 131: Local Authentication Configuration

    Configuring Authentication Local Authentication Configuration Local Authentication Configuration To configure local authentication, follow the steps: 1) Configure the authentication page. 2) Configure the local user account. 2.1 Configuring the Authentication Page The browser will redirect to the authentication page when the client try to access the internet.
  • Page 132 Configuring Authentication Local Authentication Configuration Figure 2-1 Configuring the Authentication Page Follow these steps to configure authentication page: 1) In the Settings section, enable authentication status, configure the idle timeout and portal authentication port. Status Check the box to enable portal authentication. Idle Timeout Specify the idle timeout.
  • Page 133 Configuring Authentication Local Authentication Configuration Authentication Choose the authentication page type. Page Custom: You can use the built-in web server to customize the authentication page by specifying the background picture, welcome information and copyright information. External Links: You can specify a external web server to provide the authentication page by entering the URL of the external web server.
  • Page 134: Configuring The Local User Account

    Configuring Authentication Local Authentication Configuration Remind Interval Specify the interval at which the router reminds users if the remind type is specified as “Remind Periodically“. Remind Content Specify the remind content. The content will be displayed on the Remind page. Page Preview Click the button to view the remind page.
  • Page 135 Configuring Authentication Local Authentication Configuration Figure 2-2 Configuring the Formal User Account Specify the user type, configure the username and password for the formal user account, and configure the other corresponding parameters. Then click OK. User Type Specify the user type as Formal User. Username / Specify the username and password of the account.
  • Page 136 Configuring Authentication Local Authentication Configuration Maximum Users Specify the maximum number of users that are allowed use this account to authenticate. Note: If the MAC Binding Type is either Static Binding or Dynamic Binding, only one client can use this username and password to authenticate,i.e., the bound client, even if the value of Maximum Users is configured to be greater than one.
  • Page 137: Optional) Configuring The Backup Of Local Users

    Configuring Authentication Local Authentication Configuration Username / Specify the username and password of the user account. The username cannot be Password the same as any existing one. Authentication Specify the free duration of the account. The default value is 30 minutes. Timeout Maximum Users Specify the maximum number of users that are allowed to use this username and...
  • Page 138: Radius Authentication Configuration

    Configuring Authentication Radius Authentication Configuration Radius Authentication Configuration To configure Radius Authentication, follow the steps: 1) Configure the authentication page. 2) Specify the external Radius server and configure the corresponding parameters. Configuring Radius Authentication Choose the menu Authentication > Authentication Settings > Web Authentication to load the following page.
  • Page 139 Configuring Authentication Radius Authentication Configuration Idle Timeout Specify the idle timeout. The client will be disconnected after the specified period (Idle Timeout) of inactivity, and is required to be authenticated again. Value 0 means the client will always keep online until the authentication timeout leased, even if the client remains inactive.
  • Page 140 Configuring Authentication Radius Authentication Configuration Primary Radius Enter the IP address of the primary Radius server. Server Secondary Optional. Enter the IP address of the secondary Radius server. If the primary Radius Server server is down, the secondary server will be effective. Authentication Enter the service port for Radius authentication.
  • Page 141: Onekey Online Configuration

    Configuring Authentication Onekey Online Configuration Onekey Online Configuration In Onekey Online authentication, users only need to click the “Onekey online” button on the authentication page, then can access the internet. The username and password are not required. 4.1 Configuring the Authentication Page Choose the menu Authentication >...
  • Page 142 Configuring Authentication Onekey Online Configuration Portal Enter the service port for portal authentication. The default setting is 8080. Authentication Port 2) In the Authentication Parameters section, configure the parameters of the authentication page and choose the authentication type, then click Save. Authentication Choose the type of authentication page as Custom Page.
  • Page 143: Guest Resources Configuration

    Configuring Authentication Guest Resources Configuration Guest Resources Configuration Guest resources are limited network resources provided for users before they pass the portal authentication. You can configure the guest resources in two ways:  Five Tuple Type Specify the client and the network resources the client can visit based on the settings of IP address, MAC address, VLAN ID, service port and protocol.
  • Page 144 Configuring Authentication Guest Resources Configuration Figure 5-1 Configuring the Five Tuple Type Specify the client and the network resources the client can visit by configuring the IP address, MAC address and service port, then click OK. Name Enter the name of the guest resource entry. Type Choose the guest resource type as Five Tuple Type.
  • Page 145: Configuring The Url Type

    Configuring Authentication Guest Resources Configuration Note: In a Guest Resource entry, if some parameter is left empty, it means the router will not restrict that parameter. For example, if the source IP range is left empty, it means all the clients can visit the specified guest resources.
  • Page 146 Configuring Authentication Guest Resources Configuration Description Enter a brief description for the Guest Resources entry to make it easier to search and manage. Status Check the box to enable the guest resource entry. Note: In a Guest Resource entry, if some parameter is left empty, it means the router will not restrict that parameter.
  • Page 147: Viewing The Authentication Status

    Configuring Authentication Viewing the Authentication Status Viewing the Authentication Status Choose the menu Authentication > Authentication Status > Authentication Status to load the following page. Figure 6-1 Viewing the Authentication Status Here you can view the clients that pass the portal authentication. Type Displays the authentication type of the client.
  • Page 148: Configuration Example

    Configuring Authentication Configuration Example Configuration Example Here we take the application of Local Authentication as an example. Network Requirements A hotel needs to offer internet service to the guests and push hotel advertisement. For network security, only the authorized guests can access the internet. Figure 7-1 Network Topology Router Core Switch...
  • Page 149: Configuration Procedures

    Configuring Authentication Configuration Example  To push hotel advertisement, you can simply customize the authentication page by set the background picture and the welcome information. 7.3 Configuration Procedures 1) Enable Portal Authentication, choose the authentication type as Local Authentication, and customize the authentication page. 2) Create the authentication accounts for the guests.
  • Page 150: Configuring Authentication Accounts For The Guests

    Configuring Authentication Configuration Example Figure 7-4 Configure the authentication type and expiration reminder 7.3.2 Configuring Authentication Accounts for the Guests Choose the menu Authentication > User Management > User Management to load the following page. Here we take the configuration of Formal User account as an example. We create an account for the guests of room 101.
  • Page 151: Managing Services

    Part 8 Managing Services CHAPTERS 1. Services 2. Dynamic DNS Configurations 3. UPnP Configuration 4. Configuration Example for Dynamic DNS...
  • Page 152: Services

    Managing Services Services Services Overview The Services module incorporates two functions, Dynamic DNS (DDNS) and UPnP (Universal Plug and Play) to provide convenient network services. Support Features Dynamic DNS Nowadays, network protocols such as PPPoE and DHCP are widely employed by ISPs to assign public IP addresses to users.
  • Page 153: Dynamic Dns Configurations

    Managing Services Dynamic DNS Configurations Dynamic DNS Configurations With Dynamic DNS configurations, you can:  Configure and view Peanuthull DDNS  Configure and view Comexe DDNS  Configure and view DynDNS  Configure and view NO-IP DDNS 2.1 Configure and View Peanuthull DDNS Choose the menu Service >...
  • Page 154: Configure And View Comexe Ddns

    Managing Services Dynamic DNS Configurations 3) View the DDNS status. Figure 2-2 View the Status of Peanuthull DDNS Status Displays whether the corresponding DDNS service is enabled. Service Status Displays the current status of DDNS service. Offline: DDNS service is offline. Connecting: DDNS client is connecting to the server.
  • Page 155: Configure And View Dyndns

    Managing Services Dynamic DNS Configurations 2) Configure the following parameters and click OK. Interface Select the interface for the DDNS service. Account Name Enter the account name of your DDNS account. You can click Go to register to visit the official website of Comexe to register an account. Password Enter the password of your DDNS account.
  • Page 156 Managing Services Dynamic DNS Configurations Figure 2-5 Configure DynDNS Follow these steps to configure DynDNS. 1) Click Go to register to visit the official website of DynDNS and register an account and a domain name. 2) Configure the following parameters and click OK. Interface Select the interface for the DDNS service.
  • Page 157: Configure And View No-Ip Ddns

    Managing Services Dynamic DNS Configurations Service Status Displays the current status of DDNS service. Offline: DDNS service is offline. Connecting: DDNS client is connecting to the server. Online: DDNS is working normally. Incorrect account name or password: The account name or password is incorrect.
  • Page 158 Managing Services Dynamic DNS Configurations Update Interval Specify the Update Interval that the device dynamically updates IP addresses for registered domain names. Status Check the box to enable the DDNS service. 3) View the DDNS status. Figure 2-8 View the Status of NO-IP DDNS Status Displays whether the corresponding DDNS service is enabled.
  • Page 159: Upnp Configuration

    Managing Services UPnP Configuration UPnP Configuration Choose the menu Service > UPnP to load the following page. Figure 3-1 Configure UPnP Function Follow these steps to configure UPnP function: 1) In the General section, enable the UPnP function and select the interface. Then click Save.
  • Page 160: Configuration Example For Dynamic Dns

    Managing Services Configuration Example for Dynamic DNS Configuration Example for Dynamic DNS Network Requirement Host A gets internet services from an ISP (Internet Service Provider) via a PPPoE dial-up connection. The user wants to visit the router’s web management interface using another host on the internet.
  • Page 161 Managing Services Configuration Example for Dynamic DNS Figure 4-2 Registering a Domain Name 2) Set the Interface as WAN1, set the Update Interval as 6 hours, and enter the Account Name and Password previously registered before. Click OK. Figure 4-3 Specifying Peanuthull DDNS Parameters Configuration Guide...
  • Page 162: System Tools

    Part 9 System Tools CHAPTERS 1. System Tools 2. Admin Setup 3. Management 4. SNMP 5. Diagnostics 6. Time Settings 7. System Log...
  • Page 163: System Tools

    System Tools System Tools System Tools Overview The System Tools module provides several system management tools for users to manage the router. Support Features Admin Setup Admin Setup is used to configure the parameters for users’ login. With this function, you can modify the login account, specify the IP subnet and mask for remote access and specify the HTTP and HTTPS server port.
  • Page 164: Admin Setup

    System Tools Admin Setup Admin Setup In Admin Setup module, you can configure the following features:  Admin Setup  Remote Management  System Settings 2.1 Admin Setup Choose the menu System Tools > Admin Setup > Admin Setup to load the following page. Figure 2-1 Modifying the Admin Account In the Account section, configure the following parameters and click Save to modify the admin account...
  • Page 165: Remote Management

    System Tools Admin Setup Remote Management Choose the menu System Tools > Admin Setup > Remote Management and click Add to load the following page. Figure 2-2 Configuring Remote Management In the Remote Management section, configure the following parameters and click OK to specify the IP subnet and mask for remote management.
  • Page 166 System Tools Admin Setup HTTP Server Enter the http server port for web management. The port number should be different Port from other servers’. The default setting is 80. After changing the http server port, you should access the interface by using IP address and the port number in the format of 192.168.0.1:1600.
  • Page 167: Management

    System Tools Management Management In Management module, you can configure the following features:  Factory Default Restore  Backup & Restore  Reboot  Firmware Upgrade Factory Default Restore Choose the menu System Tools > Management > Factory Default Restore to load the following page.
  • Page 168: Reboot

    System Tools Management 1) In the Backup section, click Backup to save your current configuration as a configuration file and export the file to the host. 2) In the Restore section, select one configuration file saved in the host and click Restore to import the saved configuration to your router.
  • Page 169: Snmp

    System Tools SNMP SNMP Choose the menu System Tools > SNMP > SNMP to load the following page. Figure 4-1 Configuring SNMP Follow these steps to configure the SNMP function: 1) Check the box to enable the SNMP function. 2) Configure the following parameters and click Save. Contact Enter the textual identification of the contact person for this the device, for example, contact or e-mail address.
  • Page 170: Diagnostics

    System Tools Diagnostics Diagnostics In Diagnostics module, you can configure the following features:  Diagnostics  Remote Assistance Diagnostics Ping and traceroute are both used to test the connectivity between two devices in the network. In addition, ping can show the roundtrip time between the two devices directly and traceroute can show the IP address of routers along the route path.
  • Page 171: Configuring Traceroute

    System Tools Diagnostics Destination IP/ Enter the IP address or the domain name that you want to ping or tracert. Domain Name Interface Select the interface that sends the detection packets. 2) (Optional) Click Advanced and the following section will appear. Figure 5-2 Advanced Parameters for Ping Method Ping Count Specify the count of the test packets to be sent during the ping process.
  • Page 172: Remote Assistance

    System Tools Diagnostics 1) In Diagnostics section, select Traceroute and configure the following parameters. Diagnostic Tool Select Traceroute to test the connectivity between the router and the desired device. Destination IP/ Enter the IP address or the domain name that you want to ping or tracert. Domain Name Interface Select the interface that sends the detection packets.
  • Page 173: Time Settings

    System Tools Time Settings Time Settings In Time Settings module, you can configure the following features:  System Time  Daylight Saving Time Setting the System Time Choose one method to set the system time. 6.1.1 Getting time from the Internet Automatically Choose the menu System Tools >...
  • Page 174: Setting The System Time Manually

    System Tools Time Settings 6.1.2 Setting the System Time Manually Choose the menu System Tools > Time Settings > Time Settings to load the following page. Figure 6-2 Setting the System Time Manually In the Time Settings section, configure the following parameters and click Save. Current Time Displays the current system time.
  • Page 175: Recurring Mode

    System Tools Time Settings Figure 6-3 Predefined Mode Page In the Daylight Saving Time section, select one predefined DST schedule and click Save. DST Status Check the box to enable the DST function. Mode Select Predefined Mode to choose a predefined daylight saving time. Select the Daylight Saving Time of the USA.
  • Page 176: Date Mode

    System Tools Time Settings DST Status Check the box to enable the DST function. Mode Select Recurring Mode to specify a cycle time range for the daylight saving time. This configuration will take effects every year. Time Offset Specify the time added in minutes when Daylight Saving Time takes effect. Starting Time Specify the starting time of Daylight Saving Time.
  • Page 177: System Log

    System Tools System Log System Log Choose the menu System Tools > System Log > System Log to load the following page. Figure 7-1 System Log Page Follow these steps to view the system log: 1) In the Log Settings section, configure the following parameters and click Save. Enable Auto- Check the box to enable this function and the page will refresh automatically refresh...
  • Page 178 System Tools System Log Severity Enable Severity and specify the importance of the logs you want to view in the log list. ALL Level: Logs of all levels. EMERGENCY: Errors that render the router unusable, such as hardware errors. ALERT: Errors that must be resolved immediately, such as flash write errors. CRITICAL: Errors that put the system at risk, such as a failure to release memory.
  • Page 179: Fcc Statement

    Specifications are subject to change without notice. is a registered trademark of TP-Link Technologies Co., Ltd. Other brands and product names are trademarks or registered trademarks of their respective holders. No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation, transformation, or adaptation without permission from TP-Link Technologies Co., Ltd.
  • Page 180: Canadian Compliance Statement

    Canadian Compliance Statement This device complies with Industry Canada license-exempt RSSs. Operation is subject to the following two conditions: 1) This device may not cause interference, and 2) This device must accept any interference, including interference that may cause undesired operation of the device. Le présent appareil est conforme aux CNR d’Industrie Canada applicables aux appareils radio exempts de licence.
  • Page 181: Safety Information

    此為甲類資訊技術設備,于居住環境中使用時,可能會造成射頻擾動,在此種情況下,使用者 會被要求採取某些適當的對策。 限用物質含有情況標示聲明書 限用物質及其化學符號 產 品 元 件 名稱 鉛 鎘 汞 六價鉻 多溴聯苯 多溴二苯醚 CrVI PBDE ○ ○ ○ ○ ○ ○ 外殼 ○ ○ ○ ○ ○ ○ 電 源 供 應 ○ ○ ○ ○ ○ 板 備考1.
  • Page 182 Explanation of the symbols on the product label Symbol Explanation AC voltage Indoor use only. RECYCLING This product bears the selective sorting symbol for Waste electrical and electronic equipment (WEEE). This means that this product must be handled pursuant to European directive 2012/19/EU in order to be recycled or dismantled to minimize its impact on the environment.

This manual is also suitable for:

Tl-r480t plusTl-r600vpn