ESR series service routers could be used in large enterprise networks, SMB networks and operator's networks. Devices provide high performance and bandwidth, and feature protection of transmitted data.
ESR-Series. User manual 1.4 Notes and warnings Notes contain important information, tips or recommendations on device operation and setup. Warnings inform users about hazardous conditions which may cause injuries or device damage and may lead to the device malfunctioning or data loss. ...
• Delivery Package 2.1 Purpose ESR series devices are the high performance multi-purpose network routers. Device combines traditional network features with a complex multi-tier approach to routing security, and ensures robust corporate environment protection. Device has a built-in firewall that enables protection of your and organization network environment and supports latest data security, encryption, authentication and intrusion prevention features.
ESR-Series. User manual 2.2.3 Second-layer functions of OSI model Table 3 lists second-layer functions and special aspects (OSI Layer 2). Table 3 – Second-layer functions description (OSI Layer 2) VLAN support VLAN (Virtual Local Area Network) is a solution used for splitting a network into separate segments on L2 level.
Page 17
ESR-Series. User manual DHCP server DHCP server enables automation and centralization of the network device configuration process. DHCP server allocated on a router allows for a complete solution for the local area network support. DHCP server integrated into the router assigns IP addresses to network devices and transfers additional network settings, e.g.
ESR-Series. User manual 2.2.5 Traffic tunnelling functions Table 5 – Traffic tunnelling functions Tunnelling protocols Tunneling is a method of packet conversion during their network transfer that involves the replacement, modification and addition of a new packet network header. This method may be used for negotiation of transport protocols when the data is transferred through the transit network as well as for creation of secured connections where tunnelled data is being encrypted.
ESR-Series. User manual Authentication Authentication is a user identity check procedure. Routers support the following authentication methods: • local – local user database stored on the device is used for authentication; • group – user database is located on the authentication server.
ESR-Series. User manual 2.3 Main specifications Tble 8 lists main specifications of the router. Table 8 – Main Specifications General parameters Interfaces ESR-1700 4 x Combo Ethernet 10/100/1000BASE-T/1000BASE-X 8 x 10GBASE-R/1000BASE-X (SFP+/SFP) 2 x Hard disk installation slot 1 x Console RJ-45 1 x OOB port 2 x USB 2.0 ESR-3100...
Page 21
ESR-Series. User manual ESR-1500 4 x Combo Ethernet 10/100/1000BASE-T/1000BASE-X 4 x Ethernet 10/100/1000BASE-T (RJ-45) 4 x 10GBASE-R/1000BASE-X (SFP+/SFP) 1 x Console RJ-45 1 x OOB port 2 x USB 2.0 1 x SD card slot ESR-1200 4 x Combo Ethernet 10/100/1000BASE-T/1000BASE-X 12 x Ethernet 10/100/1000BASE-T (RJ-45) 8 x 10GBASE-R/1000BASE-X (SFP+/SFP) 1 x Console RJ-45...
Page 22
ESR-Series. User manual ESR-100 4 x Combo Ethernet 10/100/1000BASE-T/1000BASE-X 1 x Console RJ-45 1 x USB 3.0 1 x USB 2.0 1 x SD card slot ESR-21 8 x Ethernet 10/100/1000BASE-T (RJ-45) 4 x 1000BASE-X (SFP) 3 x Serial port RS-232 1 x Console RJ-45 1 x USB 3.0 1 x USB 2.0...
Page 23
ESR-Series. User manual ESR-12VF 8 x Ethernet 10/100/1000BASE-T (RJ-45) 1 x 1000BASE-X (SFP) 1 x Console RJ-45 3 x FXS 1 x FXO 2 x USB 2.0 ESR-12V 8 x Ethernet 10/100/1000BASE-T (RJ-45) 1 x Console RJ-45 3 x FXS 1 x FXO 2 x USB 2.0 ESR-10...
Page 24
ESR-Series. User manual ESR-200 1000BASE-X SFP ESR-100 ESR-21 ESR-20 ESR-14VF ESR-12VF ESR-10 Duplex or half-duplex interface modes • duplex and half-duplex modes for electric ports • duplex mode for optical ports Maximum bandwidth in ESR-1700 160 Gbps L2 mode (hardware switching) ESR-1511 ESR-1500...
Page 25
ESR-Series. User manual Number of VPN tunnels ESR-1700 ESR-3100 ESR-1511 ESR-1500 ESR-1200 ESR-1000 ESR-200 ESR-100 ESR-21 ESR-20 ESR-14VF ESR-12V(F) ESR-10 Quantity of static routes ESR-1700 ESR-3100 ESR-1511 ESR-1500 ESR-1200 ESR-1000 ESR-200 ESR-100 ESR-21 ESR-20 ESR-14VF ESR-12V(F) ESR-10...
Page 26
ESR-Series. User manual Number of competitive ESR-1700 512k sessions ESR-3100 ESR-1511 ESR-1500 ESR-1200 ESR-1000 ESR-200 256k ESR-100 ESR-21 ESR-20 ESR-14VF ESR-12V(F) ESR-10 VLAN support up to 4k active VLANs according to 802.1Q Number of BGPv4/BGPv6 ESR-1700 routes ESR-3100 ESR-1511 ESR-1500 ESR-1200 ESR-1000 ESR-200...
Page 27
ESR-Series. User manual Number of OSPFv2/ ESR-1700 500k OSPFv3/ISIS routes ESR-3100 ESR-1511 ESR-1500 ESR-1200 ESR-1000 ESR-200 300k ESR-100 ESR-21 ESR-20 ESR-14VF ESR-12V(F) ESR-10 Number of RIP/RIPng routes MAC address table ESR-1700 128k entries ESR-1511 ESR-1500 ESR-1200 ESR-1000 16k entries ESR-3100 2k bridge entries ESR-200 ESR-100...
Page 29
ESR-Series. User manual Compliance IEEE 802.3 10BASE-T Ethernet IEEE 802.3u 100BASE-T Fast Ethernet IEEE 802.3ab 1000BASE-T Gigabit Ethernet IEEE 802.3z Fiber Gigabit Ethernet IEEE 802.3ba 40GBASE-SR4, 40GBASE-LR4 ANSI/IEEE 802.3 Speed autodetection IEEE 802.3x Data flow control IEEE 802.3ad LACP link aggregation IEEE 802.1q VLAN virtual local networks IEEE 802.1v IEEE 802.3ac...
Page 30
ESR-Series. User manual ESR-3100 AC: 100–240 V, 50–60 Hz ESR-1511 DC: 36–72 V ESR-1500 Power options: ESR-1200 • single AC or DC power supply; • two AC or DC power supplies with hot swapping. ESR-1000 ESR-200 AC: 100–264 V, 50–60 Hz ESR-100 ESR-21 ESR-20 ESR-14VF...
Page 31
ESR-Series. User manual ESR-10 Weight ESR-1700 12 kg max ESR-3100 5 kg max ESR-1511 7 kg max ESR-1500 ESR-1200 5.5 kg max ESR-1000 3.6 kg max ESR-200 2.5 kg max ESR-100 ESR-21 3.15 kg max ESR-20 2 kg max ESR-14VF 1 kg max ESR-12V(F) ESR-10...
Page 32
ESR-Series. User manual ESR-14VF 267x43.6x160.5 mm ESR-12V(F) ESR-10 185x32x118 mm Operating temperature ESR-1700 -10 to +45 °C range ESR-3100 ESR-1511 ESR-1500 ESR-1200 ESR-1000 ESR-200 ESR-100 ESR-21 ESR-20 ESR-14VF 0 to +40 °C ESR-12V(F) ESR-10 Storage temperature range -40 to +70 °C Operation relative humidity (non- up to 80% condensing)
ESR-Series. User manual 2.4 Design This section describes the design of the device. Depicted front, rear, and side panels of the device, connectors, LED indicators and controls. The device has a metal housing available for 19” form-factor rack mount; housing size is 1U. 2.4.1 ESR-1700 design ESR-1700 front panel The front panel layout is depicted in figure 1.
Page 34
ESR-Series. User manual № Front panel Description element Flash Activity of exchange with data storage – SD card or USB Flash. Power Device power LED. Master Failover mode operation LED (is not supported in the current version). Fan operation LED. Redundant power supply LED.
ESR-Series. User manual Table 10 – Rear panel connectors description Description № Earth bonding point of the device. Hot-swappable removable ventilation modules. Main power supply. Place for installation of a redundant power supply. ESR-1700 side panels The side panel layout of ESR-1700 is depicted in figures 3 and 4. Figure 3 –...
Page 36
ESR-Series. User manual Table 11 – Description of connectors, LEDs and controls located on ESR-3100 front panel Front panel Description № element Status Current device status LED. Alarm Alarm LED. VPN gateway operation mode LED. Flash Activity of exchange with data storage – SD card or USB Flash. Power Device power LED.
Page 37
ESR-Series. User manual ESR-3100 rear panel The rear panel of ESR-3100 is depicted in the figure below. Figure 6 – ESR-3100 rear panel Table 12 lists rear panel connectors of the router. Table 12 – Rear panel connectors description № Description Main power supply.
ESR-Series. User manual 2.4.3 ESR-1511, ESR-1510 design ESR-1511 front panel The front panel layout is depicted in figure 9. Figure 9 – ESR-1511 front panel Table 13 lists connectors, LEDs and controls located on the front panel of ESR-1511. Table 13 – Description of connectors, LEDs and controls located on ESR-1511 front panel №...
Page 39
ESR-Series. User manual № Front panel Description element Functional key that reboots the device and resets it to factory default configuration: • Pressing the key for less than 10 seconds reboots the device; • Pressing the key for more than 10 seconds resets the terminal to factory settings. USB2 Port for USB device connection.
Page 40
ESR-Series. User manual № Front panel Description element Power Device power LED. Master Failover mode operation LED (is not supported in the current version). Fan operation LED. Redundant power supply LED. Console Console port RS-232 for local management of the device. Ethernet port for router management.
Page 41
ESR-Series. User manual ESR-1511, ESR-1500 rear panel The rear panel layout of ESR-1511 and ESR-1500 routers is depicted in figure 11. Figure 11 – ESR-1511, ESR-1500 rear panel Table 15 lists rear panel connectors of the router. Table 15 – Rear panel connectors description Description №...
ESR-Series. User manual 2.4.4 ESR-1200, ESR-1000 design ESR-1200 front panel The front panel layout is depicted in 14. Figure 14 – ESR-1200 front panel Table 16 lists connectors, LEDs and controls located on the front panel of ESR-1200. Table 16 – Description of connectors, LEDs and controls located on the front panel of ESR-1200 №...
Page 43
ESR-Series. User manual № Front Description panel element Master Indicator of failover modes operation. Fan operation LED. Redundant power supply LED. Functional key that reboots the device and resets it to factory default configuration: • Pressing the key for less than 10 seconds reboots the device; •...
Page 44
ESR-Series. User manual № Front Description panel element Alarm Alarm LED. Active VPN sessions indicator. Flash Activity indicator of exchange with data storages (SD-card or USB Flash). Power Device power LED. Master Indicator of failover modes operation. Fan operation LED. Redundant power supply LED.
ESR-Series. User manual Table 18 – Rear panel connectors description Description № Main power supply. Place for installation of a redundant power supply. Hot-swappable removable ventilation modules. Earth bonding point of the device. ESR-1200, ESR-1000 side panels The side panel layout of ESR-1200, ESR-1000 is depicted in Figures 17 and 18. Figure 17 –...
Page 46
ESR-Series. User manual Figure 20 – ESR-100 front panel Table 19 lists connectors, LEDs and controls located on the front panel of ESR-100 and ESR-200 routers. Table 19 – Description of connectors, LEDs and controls located on ESR-200, ESR-100 front panel №...
Page 47
ESR-Series. User manual Figure 21 – ESR-200, ESR-100 rear panel Table 20 lists rear panel connectors of the router. Table 20 – Rear panel connectors description № Description Earth bonding point of the device. Ventilation module. ESR-100, ESR-200 side panels The side panel layout of ESR-200, ESR-100 is depicted in Figures 22 and 23.
ESR-Series. User manual 2.4.6 ESR-21 design The device has a metal housing available for 19” form-factor rack mount; housing size is 1U. ESR-21 front panel The front panel layout of ESR-21 is depicted in figure 24. Figure 24 – ESR-21 front panel Table 21 lists sizes, LEDs and controls located on ESR-21 front panel.
ESR-Series. User manual № Front panel element Description [1 .. 8] 8 ports of Gigabit Ethernet 10/100/1000BASE-T (RJ-45) Optical Port 4 ports of Gigabit Ethernet 10/100/1000BASE-X (SFP) ESR-21 rear panel The rear panel layout of ESR-21 is depicted in figure 25. Figure 25 –...
Page 50
ESR-Series. User manual ESR-20 front panel The front panel layout is depicted in figure 28. Figure 28 – ESR-20 front panel Table 23 lists connectors, LEDs and controls located on the front panel of ESR-20. Table 23 – Description of connectors, LEDs and controls located on ESR-20 rear panel Front panel element Description №...
ESR-Series. User manual ESR-20 rear panel The rear panel layout of ESR-20 is depicted in figure 29. Figure 29 – ESR-20 rear panel Table 24 lists rear panel connectors of the router. Table 24 – Rear panel connectors description № Description Earth bonding point of the device.
Page 52
ESR-Series. User manual Figure 32 – ESR-12VF, ESR-14VF front panel Table 25 lists connectors, LEDs and controls located on the front panel of ESR-12VF and ESR-14VF routers. Table 25 – Description of connectors, LEDs and controls located on ESR-12VF, ESR-14VF front panel №...
Page 53
ESR-Series. User manual ESR-14VF, ESR-12VF rear panel The rear panel layout of ESR-12VF, ESR-14-VF is depicted in figure 33. Figure 33 – ESR-12VF, ESR-14VF rear panel Table 26 lists rear panel connectors of the router. Table 26 – Rear panel connectors description №...
ESR-Series. User manual ESR-12VF, ESR-14VF side panels The side panel layout of ESR-12VF, ESR-14VF is depicted in Figures 34 and 35. Figure 34 – ESR-12VF, ESR-14VF left side panel Figure 35 – ESR-12VF, ESR-14VF right side panel Side panels of the device have air vents for heat removal. Do not block air vents. This may cause the components to overheat, which may result in device malfunction.
Page 55
ESR-Series. User manual Table 27 – Description of connectors, LEDs and controls located on ESR-12V front panel Front panel element Description № 220V АC Power supply. Power Device power LED. Console Console port RS-232 for local management of the device. Functional key that reboots the device and resets it to factory default configuration: - pressing the key for less than 10 seconds reboots the device.
ESR-Series. User manual Table 28 – Rear panel connectors description Description № Earth bonding point of the device. ESR-12V side panels The side panel layout of ESR-12V is depicted in figures 38 and 39. Figure 38 – ESR-12V left side panel Figure 39 –...
Page 57
ESR-Series. User manual № Front Description panel elemen ON/OFF Power on/off button 12V DC Connector for power adapter connection Console RS-232 console port for local management of the device USB1, 2 USB connectors for connecting external USB devices USB2 [1 .. 4] 4 ports of Gigabit Ethernet –...
Page 58
ESR-Series. User manual Table 30 – Right panel connectors description Side Description № panel elemen Functional key that reboots the device and resets it to factory default configuration: • pressing the key for less than 10 seconds reboots the device. •...
ESR-Series. User manual № Description panel elemen The LED is not used USB1, External USB devices LED USB2 [1 .. 4] Ethernet ports LED [5 .. 6] Optical interfaces LED 2.4.11 Light Indication ESR-1700, ESR-1511, ESR-1500, ESR-1200, ESR-1000 light indication Gigabit Ethernet copper interface statuses are represented by two LEDs –...
Page 60
ESR-Series. User manual Table 32 – Light indication of copper interface status SPEED indicator is lit LINK/ACT indicator is lit Ethernet interface state The port is disabled or connection is not established. Solid on 10Mbps or 100Mbps connection is established. Solid on Solid on 1000Mbps connection is established.
Page 61
ESR-Series. User manual Indicat Indicator function Device State State name Power Device power LED. Green Device power is OK. Main power supply, if installed, is operational. Orange Main power supply failure, fault, or the primary network is missing. Device internal power supply failure. Master Indicator of failover modes operation.
Page 62
ESR-Series. User manual SPEED indicator is lit LINK/ACT indicator is lit Ethernet interface state The port is disabled or connection is not established. Solid on 10Mbps or 100Mbps connection is established. Solid on Solid on 1000Mbps connection is established. Flashes Data transfer is in progress.
Page 63
ESR-Series. User manual SPEED indicator is lit LINK/ACT indicator is lit Ethernet interface state The port is disabled or connection is not established. Solid on 10Mbps or 100Mbps connection is established. Solid on Solid on 1000 Mbps connection is established. Flashes Data transfer is in progress.
Page 64
ESR-Series. User manual Indicator Indicator function Device State name State HA operation mode LED (is not supported in the current version)
Page 65
ESR-Series. User manual ESR-12V(F) light indication Gigabit Ethernet copper interface statuses are represented by two LEDs – green LINK/ACT LED and amber SPEED LED. Table 39 – Light indication of copper and SFP interface status SPEED indicator is lit LINK/ACT indicator is lit Ethernet interface state Port is disabled or connection is not established Solid on...
ESR-Series. User manual ESR-10 light indication Gigabit Ethernet copper interfaces statuses are represented by amber SPEED LED. Table 41 – Light indication of copper interface status SPEED indicator is lit Ethernet interface state Port is disabled or connection is not established Solid on 1000Mbps connection is established Flashes...
ESR-Series. User manual 3 Installation and connection • Support brackets mounting • Device rack installation • ESR-1000, ESR-1200, ESR-1500, ESR-1511, ESR-3100, ESR-1700 power module installation • Connection to Power Supply • SFP transceiver installation and removal • Transceiver installation • Transceiver removal This section describes installation of the device into a rack and connection to a power supply.
ESR-Series. User manual Figure 51 – Device rack installation Device ventilation system is implemented using 'front-rear' layout. Vents are located on the front and side panels of the device; ventilation modules are located at the rear. Do not block air inlet and outlet vents to avoid components overheating and subsequent device malfunction.
ESR-Series. User manual Figure 53 – Plug installation Power module fault indication may be caused not only by the module failure, but also by the absence of the primary power supply. You can check the state of power modules by the indication on the front panel of the router (see Section Light indication) or by diagnostics, available through the router management interfaces.
ESR-Series. User manual 4 Management interfaces • Command line interface (CLI) • Types and naming procedure of router interfaces • Types and naming procedure of router tunnels You may use various management interfaces in order to control and monitor the device. To access the device, you may use network connection via Telnet or SSH as well as direct connection via RS-232 compliant console port.
Page 74
ESR-Series. User manual Interface type Designation Physical interfaces Designation of physical interface includes its type and identifier. The identifier of physical interfaces is as follows: <UNIT>/<SLOT>/ <PORT>, where • <UNIT> – number of a device in a device group, • <SLOT>...
Page 75
ESR-Series. User manual Interface type Designation Sub-interfaces Designation of sub-interface is generated from the designation of basic interface and sub-interface identifier (VLAN) separated by a dot. Designation examples: • gigabitethernet 1/0/12.100 • tengigabitethernet 1/0/2.123 • fortygigabitethernet 1/0/2.1024 • port-channel 1.6 ...
Page 76
ESR-Series. User manual Interface type Designation Logical interfaces Designation of logical interface is the interface sequence number: Designation examples: • loopback 4 • bridge 60 • service-port 1 Serial interfaces Designation of serial interface includes its type and identifier. E1 interfaces identifier is as follows: <UNIT>/<SLOT>/<STREAM>, where •...
ESR-Series. User manual 4.3 Types and naming procedure of router tunnels Network tunnels of various types and purposes are used for the router operation. The naming system allows you to uniquely address the tunnels by their functional purpose. The following table contains the list of tunnels types.
To enable network access to the router on the first startup, static IP address 192.168.1.1/24 has been configured on Bridge 1 interface. 5.2 Router connection and configuration ESR series routers are intended to perform border gateway functions and securing the user network when it is connected to public data networks. Basic router configuration should include: •...
ESR-Series. User manual Ethernet LAN connection Upon the initial startup, the router starts with the factory configuration. The factory configuration is described in the ESR Router Factory Configuration section of this manual. Connect the network data cable (patch cord) to any port within the 'Trusted' zone and to the PC intended for management tasks.
Changing password for "admin" user To ensure the secure system access, you should change the password for the privileged 'admin' user. 'techsupport' account ('eltex' up to version 1.0.7) is required for service centre specialist remote access. 'remote' account – RADIUS, TACACS+, LDAP authentication.
Page 82
ESR-Series. User manual Example of commands, that allow you to create user 'fedor' with password '12345678' and privilege level 15 and create user 'ivan' with password 'password' and privilege level '1': esr# configure esr(config)# username fedor esr(config-user)# password 12345678 esr(config-user)# privilege esr(config-user)# exit esr(config)# username ivan esr(config-user)# password password...
Page 83
ESR-Series. User manual Configuration example for obtaining dynamic IP address from DHCP server on Gigabit Ethernet 1/0/10 interface: esr# configure esr(config)# interface gigabitethernet 1/0/10 esr(config-if)# ip address dhcp esr(config-if)# exit To ensure the correct IP address assigning for the interface, enter the following command when the configuration is applied: esr# show ip interfaces IP address...
Page 84
ESR-Series. User manual Use the following commands to create the allowing rule: esr# configure esr(config)# security zone-pair <source-zone> self esr(config-zone-pair)# rule <number> esr(config-zone-rule)# action permit esr(config-zone-rule)# match protocol tcp esr(config-zone-rule)# match source-address <network object-group> esr(config-zone-rule)# match destination-address <network object-group> esr(config-zone-rule)# match destination-port <service object-group> esr(config-zone-rule)# enable esr(config-zone-rule)# exit esr(config-zone-pair)# exit...
ESR-Series. User manual 6 Firmware update • Updating firmware via system resources • Updating firmware via bootloader • Secondary bootloader update (U-Boot) 6.1 Updating firmware via system resources To update the firmware, use any of the following servers: TFTP, FTP, SCP. Router firmware files obtained from the manufacturer should be allocated on the server.
Page 86
ESR-Series. User manual FTP: esr# copy ftp://[<user>[:<password>]@]<server>:/<file_name> system:firmware SCP: esr# сору scp://[<user>[:<password>]@]<server>://<folder>/<file_name>system:firmware SFTP: esr# copy sftp://[<user>[:<password>]@]<server>:/<file_name> system:firmware For example, let's update basic firmware via SCP: esr# сору scp://adm:password123@192.168.16.168://home/tftp/firmware system:firmware To start the device with the new firmware version, you have to switch the active image. With show bootvar command, locate the image number, containing updated firmware.
ESR-Series. User manual esr# copy sftp://<server>:/<file_name> system:boot-2 6.2 Updating firmware via bootloader Router firmware may be updated via the bootloader as follows: When U-Boot finishes the router initialization, break the device startup with the <Esc> key. Configuring PoE... distribution dest_threshold drop_timer Configuring POE in bypass mode NAE configuration done!
ESR-Series. User manual Launch firmware update procedure: BRCM.XLP316Lite Rev B0.u-boot# run tftp_update_image1 Using nae-0-3 device TFTP from server 10.100.100.1; our IP address is 10.100.100.2 Filename 'esr1000/firmware'. Load address: 0xa800000060000000 Loading: TftpStart:TftpTimeoutMsecs = 10000, TftpTimeoutCountMax = ################################################################# ################################################################# ################################################################# ######################### #################################### done Bytes transferred = 64453909...
Page 89
ESR-Series. User manual Firmware update procedure: When U-Boot finishes the router initialization, break the device startup with the <Esc> key. Configuring PoE... distribution dest_threshold drop_timer Configuring POE in bypass mode NAE configuration done! initializing port 0, type 2. initializing port 1, type 2. SMC Endian Test:b81fb81f nae-0, nae-1...
Page 90
ESR-Series. User manual For version 1.5 and newer: BRCM.XLP316LiteRevB0.u-boot# run tftp_update_uboot Using nae-1 device TFTP from server 10.100.100.1; our IP address is 10.100.100.2 Filename 'esr1000/u-boot.bin'. Load address: 0xa800000078020000 Loading: ########################################################### done Bytes transferred = 852648 (d02a8 hex) SF: Detected MX25L12805D with page size 256, total 16777216 bytes 16384...
ESR-Series. User manual 7.2.1 Recommendations • It is recommended to configure the event message storage in a syslog file on the device and transfer these events to an external syslog server. • It is recommended to limit the size of the syslog file on the device. •...
ESR-Series. User manual 7.3.1 Recommendations • It is recommended to always enable the default password change request for the admin user. • It is recommended to limit the lifetime of passwords and prohibit reusing at least the previous password. • It is recommended to set the minimum password length requirement greater than 8 characters.
ESR-Series. User manual 7.4.1 Recommendations • It is recommended to use a role-based access model on the device. • It is recommended to use personal accounts to authenticate on the device. • It is recommended to enable logging of commands entered by the user. •...
ESR-Series. User manual • It is recommended to always enable protection against unregistered ip-protocols. • It is recommended to enable logging of the protection mechanism against network attacks. 7.6.2 Configuration example Objective: Configure the protection mechanism against network attacks in accordance with the recommendations. Solution: Enable protection against ip spoofing and logging of the protection mechanism: esr(config)# ip firewall screen spy-blocking spoofing...
ESR-Series. User manual 8 Interface management • VLAN Configuration • Configuration algorithm • Configuration example 1. VLAN removal from the interface • Configuration example 2. Enabling VLAN processing in tagged mode • Configuration example 3. Enabling VLAN processing in tagged and untagged modes •...
ESR-Series. User manual 8.1.1 Configuration algorithm Step Description Command Keys Create VLAN esr(config)# vlan <VID> <VID> – VLAN identifier, set in the range of [2..4094]. It is also possible to create multiple vlan (comma separated), vlan range (hyphen separated) or combined entry containing commas and hyphens.
ESR-Series. User manual Step Description Command Keys Configure VLAN list on the interface in esr(config-if-gi)# switchport trunk For ESR-10/12V(F)/14VF/ tagged mode allowed vlan add <VID> 20/21/100/200/3100. <VID> – VLAN identifier, set in the range of [2..4094]. It is also possible to create multiple vlan (with a comma) or vlan range (with a hyphen).
ESR-Series. User manual 8.2.1 Configuration algorithm Step Description Command Keys Enable LLDP on the router. esr(config)# lldp enable Enable the LLDPDU receiving and esr(config-if-gi)# lldp receive proceeding on the physical interface. Enable LLDPDU transmission on the esr(config-if-gi)# lldp transmit physical interface. Set the LLDPDU sending period esr(config)# lldp timer <SEC>...
ESR-Series. User manual 8.2.2 Configuration example Objective: Organize the LLDPDU exchange and proceeding between ESR-1 and ESR-2 routers. Solution: R1 configuration Enable LLDP globally on the router: esr(config)# lldp enable Enable the receiving and transmission of LLDPDU on the gi 1/0/1 interface. esr(config)# interface gigabitethernet...
ESR-Series. User manual 8.3 LLDP MED configuration LLDP MED — LLDP standard enhancement which allows to transmit network policies: VLAN ID, DSCP, priority. 8.3.1 Configuration algorithm Step Description Command Keys Enable LLDP on the router esr(config)# lldp enable Enable LLDPDU transmission on the esr(config-if-gi)# lldp transmit physical interface.
ESR-Series. User manual esr(config)# vlan 10,20 esr(config-vlan)# exit esr(config)# interface gigabitethernet 1/0/1 esr(config-if-gi)# mode switchport esr(config-if-gi)# switchport mode trunk esr(config-if-gi)# switchport trunk allowed vlan add 10,20 esr(config-if-gi)# exit Enable LLDP and MED capability in LLDP globally on the router: esr(config)# lldp enable esr(config)# lldp med fast-start enable Create and configure network policy in the way that VLAN ID 20 is specified for the voice application: esr(config)# network-policy VOICE_VLAN...
ESR-Series. User manual 8.4.1 Configuration algorithm Step Description Command Keys Create a sub-interface of a physical esr(config)# interface <PORT> – physical interface interface (possible if the physical gigabitethernet <PORT>.<S-VLAN> number. interface is in routeport or hybrid mode). <CH> – aggregated interface number.
Page 109
ESR-Series. User manual Step Description Command Keys esr(config-subif)# ip address dhcp For advanced DHCP client operation features, see section DHCP Client management. Disable the Firewall features on the esr(config-subif)# ip firewall interface or enable the interface in the disable security zone (see Firewall configuration).
ESR-Series. User manual 8.4.2 Sub-interface configuration example Objective: Configure subnet 192.168.3.1/24 in VLAN: 828 on the physical interface gigabitethernet 1/0/1. Solution: Create sub-interface for VLAN: 828 esr(config)# interface gigabitethernet 1/0/1.828 Configure IP address from necessary subnet. esr(config)# interface gigabitethernet 1/0/1.828 esr(config-subif)# ip address 192.168.3.1/24 esr(config-subif)# exit...
Page 111
ESR-Series. User manual Step Description Command Keys Create Q-in-Q interface. esr(config)# interface <PORT> – physical interface gigabitethernet <PORT>.<S- number. VLAN>.<C-VLAN> <CH> – aggregated interface number. esr(config)# interface <S-VLAN> – identifier of tengigabitethernet <PORT>.<S- created S-VLAN. VLAN>.<C-VLAN> <C-VLAN> – identifier of created C-VLAN.
Page 112
ESR-Series. User manual Step Description Command Keys esr(config-qinq-if)# ip address For advanced DHCP client dhcp operation features, see section DHCP Client management. Disable the Firewall features on the esr(config-qinq-if)# ip firewall interface or enable the interface in the disable security zone (see Firewall configuration).
ESR-Series. User manual 8.5.2 Q-in-Q configuration example Objective: Configure the termination of subnet 192.168.1.1/24 combination C-VLAN: 741, S-VLAN: 828 on the physical interface gigabitethernet 1/0/1.
ESR-Series. User manual Solution: Create sub-interface for S-VLAN: 828 esr(config)# interface gigabitethernet 1/0/1.828 esr(config-subif)# exit Create a Q-in-Q interface for the S-VLAN: 741 and configure the IP address from the required subnet. esr(config)# interface gigabitethernet 1/0/1.828.741 esr(config-qinq-if)# ip address 192.168.1.1/24 esr(config-qinq-if)# exit ...
Page 115
ESR-Series. User manual Set the password of mobile network esr(config-user)# password ascii- <CLEAR-TEXT> – unencrypted user (if authentication by login/ text password, set by the string of password required by cellular carrier). { <CLEAR-TEXT> | encrypted [1..64] characters, may include <ENCRYPTED-TEXT>...
Page 116
ESR-Series. User manual Set SIM card unlock code (if esr(config-cellular-modem)# pin <WORD> – SIM card unblock necessary). <WORD> code [4..8]. Only digits are allowed. Allow the use of any USB modem esr(config-cellular-modem)# <MODE> – acceptable USB operation mode (optionally). allowed-mode <MODE> modem operation mode [2g, 3g, 4g].
ESR-Series. User manual 8.6.2 Configuration example Objective: Configure connection to the Internet by using USB modem. Solution: For example, consider the connection to the cellular operator MTS. After modem connection, wait until the system detects the device. Determine the port of the device that was assigned to the connected USB modem: esr# show cellular status modem Number...
ESR-Series. User manual To establish a PPP connection through the E1 stream, you must have a ToPGATE-SFP media converter in the ESR router. 8.7.1 Configuration algorithm Step Description Command Keys Put physical interface in switch mode esr(config-if-gi)# mode switchport Set the operation mode of the e1 esr(config-if-gi)# switchport mode interface Set the synchronization source...
Page 119
ESR-Series. User manual Step Description Command Keys Set amount of timeslots esr(config-if-gi)# switchport e1 <RANGE> – amount of timeslots <RANGE> timeslots Use E1 as a single entity, without time esr(config-if-gi)# switchport e1 slots (optional) unframed Configure E1 esr(config)# interface e1 1/ <SLOT>...
ESR-Series. User manual The configuration changes come into effect after applying the following commands: esr# commit Configuration has been successfully committed esr# confirm Configuration has been successfully confirmed 8.8 MLPPP Configuration Multilink PPP (MLPPP) is an aggregated channel that encompasses methods of traffic transition via multiple physical channels while having a single logical connection.
Page 122
ESR-Series. User manual Step Description Command Keys Specify the password that is sent with esr(config-multilink)# ppp chap <CLEAR-TEXT> – unencrypted the router name to a remote party for password ascii-text password, set by the string of CHAP authentication. { <CLEAR-TEXT> | encrypted [8..64] characters, may include <ENCRYPTED-TEXT>...
ESR-Series. User manual Step Description Command Keys Specify the time interval in seconds esr(config-multilink)# ppp timeout <TIME> – time in seconds, after which the router sends a keepalive keepalive <TIME> takes values of [1..32767]. message (optionally). Default value: 10. Specify the time interval in seconds esr(config-multilink)# ppp timeout <TIME>...
Page 125
ESR-Series. User manual Step Description Command Keys Enable network bridge. esr(config-bridge)# enable Specify VRF instance, in which the esr(config-bridge)# ip vrf <VRF> – VRF name, set by the given modem will operate (optionally). forwarding <VRF> string of up to 31 characters. Specify the configured network bridge esr(config-bridge)# description <DESCRIPTION>...
Page 126
ESR-Series. User manual Step Description Command Keys Specify the IPv4/IPv6 address and esr(config-bridge)# ip address <ADDR/LEN> – IP address and subnet mask for the interface to be <ADDR/LEN> subnet mask length, defined as configured or enable IP address obtain AAA.BBB.CCC.DDD/EE where dynamically.
ESR-Series. User manual Step Description Command Keys Specify the network bridge MAC esr(config-bridge)# mac-address <ADDR> – network bridge MAC address different from a system one <ADDR> address, defined as (optionally). XX:XX:XX:XX:XX:XX where each part takes the values of [00..FF]. Enable interface isolation mode on the esr(config-bridge)# protected- exclude vlan –...
ESR-Series. User manual Create bridge 333, map VLAN 333 to it and specify membership in 'trusted' zone: esr(config)# bridge esr(config-bridge)# vlan esr(config-bridge)# security-zone trusted esr(config-bridge)# enable Specify the affilation of L2TPv3 tunnel to bridge mapped to LAN (for L2TPv3 tunnel configuration, see Section L2TPv3 tunnel configuration).
Page 130
ESR-Series. User manual Map VLAN 50 to gi1/0/11, gi1/0/12 interfaces: esr(config)# interface gigabitethernet 1/0/11-12 esr(config-if-gi)# switchport general allowed vlan add tagged Map VLAN 60 to gi1/0/14 interface: esr(config)# interface gigabitethernet 1/0/14 esr(config-if-gi)# switchport general allowed vlan add tagged Create bridge 50, map VLAN 50, define IP address 10.0.50.1/24 and membership in 'LAN1' zone: esr(config)# bridge esr(config-bridge)# vlan esr(config-bridge)# ip address...
ESR-Series. User manual 8.9.4 Configuration example of the second VLAN tag adding/removing Objective: The gigabitethernet 1/0/1 interface receives Ethernet frames with various VLAN tags. It is necessary to redirect them to the gigabitethernet 1/0/2 interface, adding the second VLAN-ID 828. When Ethernet frames with VLAN-ID 828 come on the gigabitethernet 1/0/2, this tag must be removed and sent to the gigabitethernet 1/0/1 interface.
ESR-Series. User manual 8.10.1 Configuration algorithm Step Description Command Keys Specify a redundant interface to which esr(config-if-gi)# backup <IF> – interface to which the the switching will occur when the interface<IF> vlan <VID> switching will occur connection is lost on a primary one. <VID>...
ESR-Series. User manual Solution: First, do the following: Create VLAN 50, -55: esr(config)# vlan 50-55 You should disable STP for gigabitethernet 1/0/9 and gigabitethernet 1/0/10 interfaces, i.e. these protocols cannot operate simultaneously: esr(config)# interface gigabitethernet 1/0/9-10 esr(config-if-gi)# spanning-tree disable Add gigabitethernet 1/0/9 and gigabitethernet 1/0/10 interfaces into VLAN 50-55 in 'general' mode. esr(config-if-gi)# switchport general allowed vlan add 50-55 esr(config-if-gi)# exit...
ESR-Series. User manual 8.11.1 Configuration algorithm Step Description Command Keys Define VLAN over which the mirrored esr(config)# port monitor remote <VID> – VLAN ID, set in the traffic will be transmitted (in case of vlan <VID> <DIRECTION> range of [2..4094]; using remote mirroring).
ESR-Series. User manual Solution: First, do the following: • Create VLAN 50: • On gi 1/0/5 interface, add VLAN 50 in 'general' mode. Main configuration step: Specify VLAN that will be used for transmission of mirrored traffic: еsr1000(config)# port monitor remote vlan For gi 1/0/5 interface, specify a port for mirroring: interface gigabitethernet...
Page 136
ESR-Series. User manual Step Description Command Keys Set the load balancing mechanism for esr(config)# port-channel load- • src-dst-mac-ip – channel aggregation groups. balance { src-dst-mac-ip | balancing mechanism is src-dst-mac | src-dst-ip | src-dst- based on source and mac-ip-port } destination MAC addresses and IP addresses;...
Page 137
ESR-Series. User manual Step Description Command Keys Include a physical interface in the esr(config-if-gi)# channel-group <ID> – sequence number of a channel aggregation group specifying <ID> mode <MODE> channel aggregation group, the mode of the channel aggregation takes values of [1..12]. group formation.
ESR-Series. User manual Step Description Command Keys It is also possible to configure the aggregated interface: · IPv4/IPv6 addressing (see sections IP addressing configuration, IPv6 addressing configuration DHCP client management); · Firewall (see section Firewall configuration); · QoS in basic or advanced mode (see section management);...
ESR-Series. User manual Add gi1/0/1, gi1/0/2 physical interfaces into the created link aggregation group: esr(config)# interface gigabitethernet 1/0/1-2 esr(config-if-gi)# channel-group mode auto Further port-channel configuration is performed by analogy to the common physical interface. 8.13 AUX configuration For ESR-21. AUX configuration is used to specify parameters for interacting with external devices connected via serial interfaces to the ESR.
Page 140
ESR-Series. User manual Step Description Command Keys • odd – a check for oddness; • even – a check for evenness; • none – parity bit is not set; Default is "none", <SPEED> – a speed of a serial interface in bps. Takes the following values: •...
ESR-Series. User manual 8.13.2 Configuration examples Objective 1: Configure IP communication between two ESRs on the serial port, using modems in Leased line mode (automatic modem mode), connected to each other by a telephone cable Modems should be previously entered into automatic connection setting mode. ...
Page 142
ESR-Series. User manual Configure the required RS-232 interfaces: esr-21-1(config)# interface serial 1/0/2 esr-21-1(config-serial)# ip address 1.1.1.1/24 esr-21-1(config-serial)# exit esr-21-1(config)# Configure firewall for security zones: esr-21-1(config)# security zone xx esr-21-1(config-zone)# exit esr-21-1(config)# security zone-pair xx self esr-21-1(config-zone-pair)# rule esr-21-1(config-zone-pair-rule)# action permit esr-21-1(config-zone-pair-rule)# enable esr-21-1(config-zone-pair-rule)# exit esr-21-1(config-zone-pair)# exit...
Page 143
ESR-Series. User manual Specify that the interfaces belong to the security zone: esr-21-2(config)# interface serial 1/0/2 esr-21-2(config-serial)# security-zone xx esr-21-2(config-serial)# exit esr-21-2(config)# Objective 2: Set up IP connectivity between two ESRs on a Serial port, using Dial-Up modems and the Public Switched Telephone Network (PSTN) The ESR-12VF with the following configuration is used as a PSTN emulation: dialplan pattern factory_test...
Page 144
ESR-Series. User manual Configure the parameters for negotiation with the modem: esr-21-1(config)# line aux esr-21-1(config-line-aux)# flowcontrol hardware esr-21-1(config-line-aux)# modem inout esr-21-1(config-line-aux)# exit esr-21-1(config)# Configure the required RS-232 interfaces: esr-21-1(config)# interface serial 1/0/2 esr-21-1(config-serial)# ip address 1.1.1.1/24 esr-21-1(config-serial)# exit esr-21-1(config)# Configure firewall for security zones: esr-21-1(config)# security zone xx esr-21-1(config-zone)# exit esr-21-1(config)# security zone-pair xx self...
Page 145
ESR-Series. User manual Configure the required RS-232 interfaces: esr-21-2(config)# interface serial 1/0/2 esr-21-2(config-serial)# ip address 1.1.1.2/24 esr-21-2(config-serial)# exit esr-21-2(config)# Configure firewall for security zones: esr-21-2(config)# security zone xx esr-21-2(config-zone)# exit esr-21-2(config)# security zone-pair xx self esr-21-2(config-zone-pair)# rule esr-21-2(config-zone-pair-rule)# action permit esr-21-2(config-zone-pair-rule)# enable esr-21-2(config-zone-pair-rule)# exit esr-21-2(config-zone-pair)# exit...
ESR-Series. User manual Create a line with additional modem initialization parameters for the second ESR-21: esr-21-2(config)# chat-script answer_test "ABORT 'BUSY' ABORT 'NO CARRIER' '' AT OK AT&F OK ATM0L0 RING ATAr CONNECT ''" esr-21-2(config)# Enable the use of the modem initialization string: esr-21-2(config)# interface serial...
ESR-Series. User manual 9 Tunneling management • GRE tunnel configuration • Configuration algorithm • IP-GRE tunnel configuration example • DMVPN configuration • Configuration algorithm • Configuration example 1 • Configuration example 2 • L2TPv3 tunnel configuration • Configuration algorithm • L2TPv3 tunnel configuration example •...
Page 148
ESR-Series. User manual Step Description Command Keys Specify the description of the esr(config-gre)# description <DESCRIPTION> – tunnel configured tunnel (optionally). <DESCRIPTION> description, set by the string of up to 255 characters. Set local IP address for tunnel esr(config-gre)# local address <ADDR>...
Page 149
ESR-Series. User manual Step Description Command Keys Assign the broadcast domain for esr(config-gre)# bridge-group <BRIDGE-ID> – bridge encapsulation in the tunnel’s GRE <BRIDGE-ID> identification number, takes packets (only in ethernet mode). values in the range of: • for ESR-10/12V(F)/14VF – [1..50]; •...
Page 150
ESR-Series. User manual Step Description Command Keys Enable key transmitting in GRE tunnel esr(config-gre)# key <KEY> <KEY> – KEY value, takes header (according to RFC 2890) and values in the range of set the key value. Configured only on [1..2000000]. the both tunnel sides.
ESR-Series. User manual Step Description Command Keys Enable the mechanism of IP esr(config-gre)# keepalive dhcp <IF> – physical/logical addresses iterative query using DHCP dependent-interface <IF> interface on which IP address on the specified interfaces when the obtaining via DHCP is enabled. GRE tunnel is disconnected via keepalive (optionally) Specify the time interval between GRE...
Page 152
ESR-Series. User manual Solution: Pre-configure interfaces on the routers for connection with WAN, enable GRE packets reception from a security zone where WAN connected interfaces operate. Create GRE 10 tunnel: esr(config)# tunnel gre Specify local and remote gateways (IP addresses of WAN border interfaces): esr(config-gre)# local address 115.0.0.1 esr(config-gre)# remote address...
ESR-Series. User manual Alternatively, you may specify the following parameters for GRE tunnel: • Enable GRE header checksum calculation and inclusion into a packet with encapsulated packet for outbound traffic: esr(config-gre)# local checksum • Enable check for GRE checksum presence and validity for inbound traffic: esr(config-gre)# remote checksum •...
ESR-Series. User manual Hub tunnels. This means that branches can communicate with each other directly, without the need for traffic to pass through the Hub. To establish such a connection, clients (NHC) over an encrypted IPsec tunnel send their internal (tunnel) address and external (NBMA) address to the NHRP server (NHS).
ESR-Series. User manual Step Description Command Keys Define the destination of multicast esr(config-gre)# ip nhrp multicast • dynamic — send to all traffic. { dynamic | nhs | <ADDR> } peers with which there is a connection; • nhs — send to all static configured servers;...
Page 156
ESR-Series. User manual External IP addres of Hub — 150.115.0.5; External IP address of Spoke-1 — 180.100.0.10; External IP address of Spoke-2 — 140.114.0.4. IPsec VPN parameters: IKE: • Diffie-Hellman group: 2; • encryption algorithm: AES128; • authentication algorithm: SHA1. IPSEC: •...
Page 157
ESR-Series. User manual Specify ttl value: esr(config-gre)# ttl Specify IP address of GRE tunnel: esr(config-gre)# ip address 10.10.0.5/24 Switch the GRE tunnel into multipoint mode to be able to connect to multiple points: esr(config-gre)# multipoint Proceed to NHRP configuration. Configure multicast to dynamically learnt addresses: esr(config-gre)# ip nhrp multicast dynamic Configure the dynamic routing protocol for the Hub.
Page 158
ESR-Series. User manual esr(config)# security ipsec proposal IPSECPROP esr(config-ipsec-proposal)# encryption algorithm aes128 esr(config-ipsec-proposal)# exit esr(config)# security ipsec policy IPSECPOLICY esr(config-ipsec-policy)# proposal IPSECPROP esr(config-ipsec-policy)# exit esr(config)# security ipsec vpn IPSECVPN esr(config-ipsec-vpn)# mode ike esr(config-ipsec-vpn)# ike establish-tunnel route esr(config-ipsec-vpn)# ike gateway IKEGW esr(config-ipsec-vpn)# ike ipsec-policy IPSECPOLICY esr(config-ipsec-vpn)# enable Map IPsec to the GRE tunnel so that clients can establish an encrypted connection:...
Page 159
ESR-Series. User manual Specify the tunnel address of NHS: esr(config-gre)# ip nhrp nhs 10.10.0.5/24 Specify the tunnel address – real: esr(config-gre)# ip nhrp map 10.10.0.5 150.115.0.5 Configure the multicast to the NHRP server: esr(config)# ip nhrp multicast nhs Configure the BGP for spoke: esr(config)# router bgp 65008 esr(config-bgp)# address-family ipv4...
Page 160
ESR-Series. User manual esr(config)# security ike gateway IKEGW_SPOKE esr(config-ike-gw)# ike-policy IKEPOLICY esr(config-ike-gw)# local address 180.100.0.10 esr(config-ike-gw)# local network 180.100.0.10/32 protocol gre esr(config-ike-gw)# remote address any esr(config-ike-gw)# remote network any esr(config-ike-gw)# mode policy-based esr(config-ike-gw)# exit esr(config)# security ipsec proposal IPSECPROP esr(config-ipsec-proposal)# encryption algorithm aes128 esr(config-ipsec-proposal)# exit esr(config)# security ipsec policy IPSECPOLICY esr(config-ipsec-policy)# proposal IPSECPROP...
ESR-Series. User manual You can clear NHRP records with the command: esr# clear ip nhrp 9.2.3 Configuration example 2 Objective: Organize DMVPN between company offices with corresponding subnets LAN1 and LAN2, using mGRE tunnels, NHRP (Next Hop Resolution Protocol), Dynamic Routing Protocol (OSPF), IPsec. In our example, we will have a HUB router and two branches.
Page 162
ESR-Series. User manual Solution: Hub configuration Preliminary, configure the OSPF protocol. esr(config)# router ospf log-adjacency-changes esr(config)# router ospf esr(config-ospf)# router-id 77.77.77.77 esr(config-ospf)# area 10.10.0.0 esr(config-ospf-area)# enable esr(config-ospf-area)# exit esr(config-ospf)# enable esr(config-ospf)# exit Configure the interface and identify its inherence to a security zone. esr(config)# interface gigabitethernet...
Page 163
ESR-Series. User manual esr(config)# security ike policy ike_pol1 esr(config-ike-policy)# pre-shared-key ascii-text password esr(config-ike-policy)# proposal ike_prop1 esr(config-ike-policy)# exit esr(config)# security ike gateway ike_spoke esr(config-ike-gw)# ike-policy ike_pol1 esr(config-ike-gw)# local address 150.115.0.5 esr(config-ike-gw)# local network 150.115.0.5/32 protocol gre esr(config-ike-gw)# remote address any esr(config-ike-gw)# remote network any esr(config-ike-gw)# mode policy-based esr(config-ike-gw)# exit esr(config)# security ipsec proposal ipsec_prop1...
Page 164
ESR-Series. User manual Configure the interface and identify its inherence to a security zone. esr(config)# interface gigabitethernet 1/0/1 esr(config-if-gi)# security-zone untrusted esr(config-if-gi)# ip address 180.100.0.10/30 esr(config-if-gi)# exit Configure the GRE tunnel, define the security zone membership, configure OSPF on the GRE tunnel, configure NHRP and enable the tunnel and NHRP with the enable command.
Page 165
ESR-Series. User manual esr(config)# security ike gateway ike_spoke esr(config-ike-gw)# ike-policy ike_pol1 esr(config-ike-gw)# local address 180.100.0.10 esr(config-ike-gw)# local network 180.100.0.10/32 protocol gre esr(config-ike-gw)# remote address any esr(config-ike-gw)# remote network any esr(config-ike-gw)# mode policy-based esr(config-ike-gw)# exit esr(config)# security ike gateway ike_hub esr(config-ike-gw)# ike-policy ike_pol1 esr(config-ike-gw)# local address 180.100.0.10 esr(config-ike-gw)# local network...
ESR-Series. User manual To view the NHRP records status, use the following command. esr# show ip nhrp Additionally, in the security zone-pair untrusted self, the protocols for the GRE over IPSec tunnel must be allowed. esr(config)# security zone-pair untrusted self esr(config-zone-pair)# rule esr(config-zone-pair-rule)# action permit esr(config-zone-pair-rule)# match protocol gre...
Page 167
ESR-Series. User manual Specify the description of the esr(config-l2tpv3)# description <DESCRIPTION> – tunnel configured tunnel (optionally). <DESCRIPTION> description, set by the string of up to 255 characters. Set local IP address for tunnel esr(config-l2tpv3)# local address <ADDR> – gateway IP address, installation.
ESR-Series. User manual Specify MTU size esr(config-l2tpv3)# mtu <MTU> <MTU> – MTU value, takes (MaximumTransmissionUnit) for the values in the range of: tunnels (optionally). MTU above 1500 will be active only • for ESR-10/12V(F)/14VF when using the "system jumbo-frames” – [1280..9600]; command.
Page 169
ESR-Series. User manual Solution: Create L2TPv3 333 tunnel: esr# configure esr(config)# tunnel l2tpv3 Specify local and remote gateways (IP addresses of WAN border interfaces): esr(config-l2tpv3)# local address 21.0.0.1 esr(config-l2tpv3)# remote address 183.0.0.10...
Page 170
ESR-Series. User manual Specify the type of encapsulating protocol and UDP port numbers: esr(config-l2tpv3)# protocol udp esr(config-l2tpv3)# local port esr(config-l2tpv3)# remote port Specify identifiers for session inside the tunnel for local and remote sides: esr(config-l2tpv3)# local session-id esr(config-l2tpv3)# remote session-id Define the inherence of L2TPv3 tunnel to a bridge that should be mapped to remote office network (for bridge configuration, see Section Configuration example of bridge for VLAN and L2TPv3...
ESR-Series. User manual To view sent and received packet counters, use the following command: esr# show tunnels counters l2tpv3 To view the tunnel configuration, use the following command: esr# show tunnels configuration l2tpv3 In addition to tunnel creation, you should enable UDP inbound traffic in the firewall with source port 519 and destination port 519.
Page 172
ESR-Series. User manual Step Description Command Keys Specify the description of the esr(config-ike-proposal)# <DESCRIPTION> – tunnel configured IKE profile (optionally). description<DESCRIPTION> description, set by the string of up to 255 characters. Specify IKE authentication algorithm esr(config-ike-proposal)# <ALGORITHM> – (optionally). authentication algorithm authentication algorithm, takes <ALGORITHM>...
Page 173
ESR-Series. User manual Step Description Command Keys Bind IKE profile to IKE policy. esr(config-ike-policy)# proposal <NAME> – IKE protocol name, <NAME> set by the string of up to 31 characters. Specify authentication key (mandatory esr(config-ike-policy)# pre- <TEXT> – string [1..64] ASCII if pre-shared-key is selected as shared-key ascii-text<TEXT>...
Page 174
ESR-Series. User manual Step Description Command Keys Specify the time period of response to esr(config-ike-gw)# dead-peer- <SEC> – time interval of DPD mechanism messages detection timeout <SEC> response to DPD mechanism (optionally). messages, takes values of [1..180] seconds. Default value: 30 seconds Bind VTI tunnel to IKE gateway.
Page 175
ESR-Series. User manual Step Description Command Keys Specify the lifetime of IPsec tunnel esr(config-ipsec- policy)# lifetime <SEC> – IPsec tunnel lifetime (optionally). { seconds <SEC> | after which the re-approval is packets <PACKETS> | kilobytes carried out. Takes values in the <KB>...
Page 176
ESR-Series. User manual Step Description Command Keys Set VPN activation mode. esr(config-ipsec-vpn)# ike <MODE> – VPN activation establish-tunnel <MODE> mode: • by-request – connection is enabled by an opposing party; • route – connection is enabled when there is traffic routed to the tunnel;...
ESR-Series. User manual Step Description Command Keys Configure the start of IKE connection esr(config-ipsec-vpn)# ike rekey <SEC> – time interval in keys re-approval before the expiration margin { seconds <SEC> | seconds remaining before the of the lifetime (optionally). packets <PACKETS> | kilobytes connection release (set by the <KB>...
Page 178
ESR-Series. User manual Objective: Configure IPsec tunnel between R1 and R2. • R1 IP address: 120.11.5.1; • R2 IP address: 180.100.0.1; IKE: • Diffie-Hellman group: 2; • encryption algorithm: AES 128 bit; • authentication algorithm: MD5. IP sec: • encryption algorithm: AES 128 bit; •...
Page 179
ESR-Series. User manual Create a static route to the remote LAN. For each subnet located beyond the IPsec tunnel, specify a route via VTI tunnel: esr(config)# ip route 192.0.2.0/24 tunnel vti Create IKE protocol profile. Select Diffie-Hellman group 2, AES 128 bit encryption algorithm and MD5 authentication algorithm in the profile.
Page 180
ESR-Series. User manual Create IPsec VPN. For VPN, specify IKE protocol gateway, IPsec tunnel policy, key exchange mode and connection establishment method. When all parameters are entered, enable tunnel using the enable command. esr(config)# security ipsec vpn ipsec1 esr(config-ipsec-vpn)# mode ike esr(config-ipsec-vpn)# ike establish-tunnel route esr(config-ipsec-vpn)# ike gateway ike_gw1 esr(config-ipsec-vpn)# ike ipsec-policy ipsec_pol1...
Page 181
ESR-Series. User manual Create IKE protocol policy. For the policy, specify the list of IKE protocol profiles that may be used for node and authentication key negotiation: esr(config)# security ike policy ike_pol1 esr(config-ike-policy)# pre-shared-key hexadecimal 123FFF esr(config-ike-policy)# proposal ike_prop1 esr(config-ike-policy)# exit Create IKE protocol gateway.
ESR-Series. User manual To view the tunnel configuration, use the following command: esr# show security ipsec vpn configuration ipsec1 In the firewall, you should enable ESP and ISAKMP protocol (UDP port 500). 9.4.3 Policy-based IPsec VPN configuration algorithm Step Description Command Keys...
Page 183
ESR-Series. User manual Step Description Command Keys Create an IKE profile policy and switch esr(config)# security ike policy <NAME> – IKE policy name, set to its configuration mode. <NAME> by the string of up to 31 characters. Specify the lifetime of IKE protocol esr(config-ike-proposal)# lifetime <SEC>...
Page 184
ESR-Series. User manual Step Description Command Keys Specify the interval between sending esr(config-ike-gw)#dead-peer- <SEC> – interval between messages via DPD mechanism detection interval <SEC> sending messages via DPD (optionally). mechanism, takes values of [1..180] seconds. Specify the time period of response to esr(config-ike-gw)# dead-peer- <SEC>...
Page 185
ESR-Series. User manual Step Description Command Keys Set recipient’s subnet IP address as esr(config-ike-gw)# remote <ADDR/LEN> – subnet IP well as IP and port. network <ADDR/LEN> address and mask of a sender. [ protocol { <TYPE> | <ID> } [ port The parameter is defined as <PORT>...
Page 186
ESR-Series. User manual Step Description Command Keys Specify the lifetime of IPsec tunnel esr(config-ipsec-policy)# lifetime <SEC> – IPsec tunnel lifetime (optionally). { seconds <SEC> | after which the re-approval is packets <PACKETS> | kilobytes carried out. Takes values in the <KB>...
Page 187
ESR-Series. User manual Step Description Command Keys Bind IKE gateway to VPN. esr(config-ipsec-vpn)# ike gateway <NAME> – IKE gateway name, <NAME> set by the string of up to 31 characters. Set the time interval value in seconds esr(config-ipsec-vpn)# ike idle- <TIME>...
ESR-Series. User manual 9.4.4 Policy-based IPsec VPN configuration example Objective: Configure IPsec tunnel between R1 and R2. R1 IP address – 198.51.100.1; R2 IP address – 203.0.113.1;...
Page 189
ESR-Series. User manual IKE: • Diffie-Hellman group: 2; • encryption algorithm: AES 128 bit; • authentication algorithm: MD5. IPSEC: • encryption algorithm: AES 128 bit; • authentication algorithm: MD5. Solution: R1 configuration Configure external network interface and identify its inherence to a security zone: esr# configure esr(config)# interface...
Page 190
ESR-Series. User manual Create IKE protocol gateway. For this profile, specify VTI tunnel, policy, protocol version and mode of traffic redirection into the tunnel. esr(config)# security ike gateway ike_gw1 esr(config-ike-gw)# ike-policy ike_pol1 esr(config-ike-gw)# local address 198.51.100.1 esr(config-ike-gw)# local network 10.0.0.0/16 esr(config-ike-gw)# remote address 203.0.113.1 esr(config-ike-gw)# remote network...
Page 191
ESR-Series. User manual To configure security zones rules, you should create ISAKMP port profile: esr(config)# object-group service ISAKMP esr(config-addr-set)# port-range esr(config-addr-set)# exit Create IKE protocol profile. Select Diffie-Hellman group 2, AES 128 bit encryption algorithm and MD5 authentication algorithm in the profile. The given security parameters are used for IKE connection protection: esr(config)# security ike proposal ike_prop1 esr(config-ike-proposal)# dh-group...
ESR-Series. User manual Create IPsec VPN. For VPN, specify IKE protocol gateway, IPsec tunnel policy, key exchange mode and connection establishment method. When all parameters are entered, enable tunnel using the enable command. esr(config)# security ipsec vpn ipsec1 esr(config-ipsec-vpn)# mode ike esr(config-ipsec-vpn)# ike establish-tunnel immediate esr(config-ipsec-vpn)# ike gateway ike_gw1 esr(config-ipsec-vpn)# ike ipsec-policy ipsec_pol1...
Page 193
ESR-Series. User manual Description Command Keys Specify the IP address of the VTI tunnel esr(config-vti)# ip address <ADDR/ <ADDR/LEN> – IP address and local side (optional). LEN> prefix of a subnet, defined as AAA.BBB.CCC.DDD/EE where each part AAA-DDD takes values of [0..255] and EE takes values of [1..31].
Page 194
ESR-Series. User manual Description Command Keys Create user name. esr(config-access-profile)# user <LOGIN> – login for client, set <LOGIN> by the string of up to 31 characters. Specify a password for a user esr(config-profile)# password <TEXT> – string [8..32] ASCII ascii-text <TEXT> characters.
Page 195
ESR-Series. User manual Description Command Keys Specify the interval between sending esr(config-ike-gw)#dead-peer- <SEC> – interval between messages via DPD mechanism detection interval <SEC> sending messages via DPD (optionally). mechanism, takes values of [1..180] seconds. Default value: 2 Specify the time period of response to esr(config-ike-gw)# dead-peer- <SEC>...
Page 196
ESR-Series. User manual Description Command Keys Set the pool for dynamic allocation of IP esr(config-ike-gw)# remote <NAME> – destination addresses to clients (only for server). network dynamic pool <NAME> addresses pool name, set by the string of up to 31 characters.
Page 197
ESR-Series. User manual Description Command Keys Specify protocol (optionally). esr(config-ipsec- <PROTOCOL> – encapsulation proposal)#protocol <PROTOCOL> protocol, takes the following values: • ah – this protocol performs only traffic authentication, data encryption is not performed; • esp – this protocol authenticates and encrypts traffic.
Page 198
ESR-Series. User manual Description Command Keys Create IPsec VPN policy and switch to esr(config)# security ipsec vpn <NAME> – VPN name, set by its configuration mode. <NAME> the string of up to 31 characters. Define the matching mode of data esr(config-ipsec-vpn)# mode <MODE>...
Page 199
ESR-Series. User manual Description Command Keys Disable key re-approval before the IKE esr(config-ipsec-vpn)# ike rekey Default value: disabled. connection is lost due to the timeout, disable the number of transmitted packets or bytes (optionally). Configure the start of IKE connection esr(config-ipsec-vpn)# ike rekey <SEC>...
Page 200
ESR-Series. User manual Description Command Keys Enable XAUTH clients reconnection esr(config-ipsec-vpn)# security ike <MODE> – reconnect mode, mode with one login/password (server session uniqueids <MODE> may take the following values: only) (optional). • no – established XAUTH connection will be deleted if an «INITIAL_CONTACT»...
ESR-Series. User manual 9.4.6 Remote Access IPsec VPN configuration example Objective: Configure Remote Access IPsec VPN between R1 and R2 using the second IPsec authentication factor, XAUTH. Configure router R1 as the IPsec VPN server, and router R2 as the IPsec VPN client. R2 IP address: 120.11.5.1;...
Page 202
ESR-Series. User manual Create IKE protocol profile. Select Diffie-Hellman group 2, 3DES encryption algorithm and SHA1 authentication algorithm in the profile. The given security parameters are used for IKE connection protection: esr(config)# security ike proposal IKEPROP esr(config-ike-proposal)# dh-group esr(config-ike-proposal)# authentication algorithm sha1 esr(config-ike-proposal)# encryption algorithm 3des esr(config-ike-proposal)# exit Create IKE protocol policy.
Page 203
ESR-Series. User manual Create security parameters profile for IPsec tunnel. Specify 3DES encryption algorithm and SHA1 authentication algorithm in the profile. Use the following parameters to secure IPsec tunnel: esr(config)# security ipsec proposal IPSECPROP esr(config-ipsec-proposal)# authentication algorithm sha1 esr(config-ipsec-proposal)# encryption algorithm 3des esr(config-ipsec-proposal)# exit Create a policy for IPsec tunnel.
Page 204
ESR-Series. User manual To configure security zones rules, you should create ISAKMP port profile: esr(config)# object-group service ISAKMP esr(config-addr-set)# port-range 500,4500 esr(config-addr-set)# exit Create IKE protocol profile. Select Diffie-Hellman group 2, 3DES encryption algorithm and SHA1 authentication algorithm in the profile. The given security parameters are used for IKE connection protection: esr(config)# security ike proposal IKEPROP esr(config-ike-proposal)# dh-group...
Page 205
ESR-Series. User manual Create security parameters profile for IPsec tunnel. Specify 3DES encryption algorithm and SHA1 authentication algorithm in the profile. Use the following parameters to secure IPsec tunnel: esr(config)# security ipsec proposal IPSECPROP esr(config-ipsec-proposal)# authentication algorithm md5 esr(config-ipsec-proposal)# encryption algorithm aes128 esr(config-ipsec-proposal)# exit Create a policy for IPsec tunnel.
ESR-Series. User manual 9.5 LT tunnels configuration LT (англ. Logical Tunnel) is a type of tunnels dedicated for transmission of routing information and traffic between different virtual routers (VRF Lite) configured on a router. LT tunnel might be used for organization of interaction between two or more VRF using firewall restrictions.
ESR-Series. User manual Step Description Command Keys Specify the size of MTU packets that esr(config-lt)# mtu <MTU> <MTU> – MTU value, takes can be passed by the bridge (optionally; values in the range of: possible if only VLAN is included in the bridge).
Page 208
ESR-Series. User manual Solution: Create LT tunnels for each VRF, specifying IP address from one subnet: esr(config)# tunnel lt esr(config-lt)# ip vrf forwarding vrf_1 esr(config-lt)# ip firewall disable esr(config-lt)# ip address 192.168.0.1/30 esr(config-lt)# exit esr(config)# tunnel lt esr(config-lt)# ip vrf forwarding vrf_2 esr(config-lt)# ip firewall disable esr(config-lt)# ip address 192.168.0.2/30...
ESR-Series. User manual 10 QoS management • Basic QoS • Configuration algorithm • Configuration example • Advanced QoS • Configuration algorithm • Configuration example QoS (Quality of Service) is a technology that provides various traffic classes with various service priorities. QoS service allows network applications to co-exist in a single network without altering the bandwidth of other applications.
Page 210
ESR-Series. User manual Step Description Command Keys Set the match between DSCP codes esr(config)# qos map dscp-queue <DSCP> – service classifier in a values of incoming packets and <DSCP> to <QUEUE> packet IP header, takes values outgoing queues. in the range of [0..63]; The given match works for incoming <QUEUE>...
Page 211
ESR-Series. User manual Step Description Command Keys Set the number of the default queue to esr(config)# qos queue default <QUEUE> – queue identifier, which all traffic except IP falls into the <QUEUE> takes values in the range of trust mode for DSCP priorities. [1..8].
ESR-Series. User manual Step Description Command Keys Set the incoming traffic rate limiting. (if esr(config-if-gi)# rate-limit <BANDWIDTH> – average the outgoing rate limiting is required) <BANDWIDTH> [BURST] traffic rate in Kbps, takes the value of [3000..10000000] for TengigabitEthernet interfaces and [64..1000000] for other interfaces and tunnels;...
ESR-Series. User manual esr(config)# interface gigabitethernet 1/0/5 esr(config-if-gi)# qos enable esr(config-if-gi)# exit Enable QoS on the WAN side interface for proper queue handling and bandwidth limitation: esr(config)# interface gigabitethernet 1/0/8 esr(config-if-gi)# qos enable Limit transfer rate to 60Mbps for 7th queue: esr(config-if)# traffic-shape queue 7 60000 esr(config-if)# exit...
Page 214
ESR-Series. User manual Step Description Command Keys Specify DSCP code value which will be esr(config-class-map)# set dscp <DSCP> – DSCP code value, set in IP packets corresponding to the <DSCP> takes values in the range of class being configured. [0..63]. (cannot be assigned simultaneously with IP Precedence and CoS fields).
Page 215
ESR-Series. User manual Step Description Command Keys Include QoS policy in QoS class to esr(config-class-policy-map)# <NAME> – policy name, set by create hierarchical QoS. service-policy <NAME> the string of up to 31 characters. Inserted policy must already be created. Set the committed outgoing bandwidth esr(config-class-policy-map)# <BANDWIDTH>...
Page 216
ESR-Series. User manual Step Description Command Keys Specify the limited number of virtual esr(config-class-policy-map)# <QUEUE-LIMIT> – limited queues (optionally). fair-queue <QUEUE-LIMIT> number of virtual queues, takes values in the range of [16..4096]. Default value: 16. Specify the limited number of packets esr(config-class-policy-map)# <QUEUE-LIMIT>...
ESR-Series. User manual Step Description Command Keys Specify GRED (Generalized Random esr(config-class-policy-map)# <PRECEDENCE> – Early Detection) parameters (if random-detect precedence IPPrecendence value [0..7]; required). <PRECEDENCE><LIMIT><MAX><MI N><PROBABILITY> <LIMIT> – limited size of a queue in bytes, takes values of in the range of [1..1000000]; <MAX>...
Page 219
ESR-Series. User manual Solution: Configure access control lists for filtering by a subnet, proceed to global configuration mode: esr(config)# ip access-list extended fl1 esr(config-acl)# rule esr(config-acl-rule)# action permit esr(config-acl-rule)# match protocol any esr(config-acl-rule)# match source-address 10.0.11.0 255.255.255.0 esr(config-acl-rule)# match destination-address any esr(config-acl-rule)# enable esr(config-acl-rule)# exit esr(config-acl)# exit...
Page 220
ESR-Series. User manual For the rest of traffic, configure a class with SFQ mode: esr(config-policy-map)# class class-default esr(config-class-policy-map)# mode sfq esr(config-class-policy-map)# fair-queue esr(config-class-policy-map)# exit esr(config-policy-map)# exit Enable QoS on the interfaces, policy on gi 1/0/19 interface ingress for classification purposes and gi1/0/20 egress for applying restrictions and SFQ mode for default class: esr(config)# interface...
ESR-Series. User manual 11.1 Routing information advertising policy 11.1.1 RIP Default policy Advertising Filtering methods Filtering policy methods application levels Import Route information reception is Network, Route-map — the last (implicit) RIP process not limited Redistribute rule denies anything that is not explicitly allowed by the previous rules.
ESR-Series. User manual Default policy Advertising Filtering methods Filtering policy methods application levels Export Information about interfaces Route-map — the last (implicit) with OSPF protocol enabled is rule allows anything that is not advertised explicitly denied by the previous rules. Prefix-list —...
ESR-Series. User manual 11.1.4 iBPG protocol Default policy Advertising Filtering methods Filtering policy methods application levels Import Route information reception is Network, Route-map — the last (implicit) address-family, not limited Redistribute rule denies anything that is not peer-group, explicitly allowed by the previous neighbor rules.
ESR-Series. User manual 11.2 Static routes configuration Static routing is a type of routing in which routes are defined explicitly during the router configuration without dynamic routing protocols. 11.2.1 Configuration algorithm You can add a static route by using the following command in global configuration mode: esr(config)# ip route [ vrf <VRF>...
ESR-Series. User manual • <IF> – an IP interface name specified in the form described in Section Types and naming order of router interfaces; • blackhole – when specifying the command, the packets to this subnet will be removed by the device without sending notifications to a sender;...
Page 227
ESR-Series. User manual Specify 192.168.100.1/30 address and the 'LAN' zone for the gi1/0/2 interface. R1 will be connected to R2 device via the given interface for the further traffic routing: esr(config)# interface gi1/0/2 esr(config-if-gi)# security-zone LAN esr(config-if-gi)# ip address 192.168.100.1/30 esr(config-if-gi)# exit Specify 128.107.1.2/30 address and the “WAN”...
ESR-Series. User manual Create a default route by specifying the IP address of R1 router gi1/0/2 interface (192.168.100.1) as a nexthop: esr(config)# ip route 0.0.0.0/0 192.168.100.1 You can use the following command to check the routing table: esr# show ip route 11.3 RIP Configuration RIP is a distance-vector dynamic routing protocol that uses hop count as a routing metric.
Page 229
ESR-Series. User manual Step Description Command Keys Permit or deny the prefixes lists. esr(config-pl)# permit {object- <OBJ-GROUP-NETWORK- group <OBJ-GROUP-NETWORK- NAME> – IP addresses profile NAME > <ADDR/LEN> | <IPV6- name, set by the string of up to ADDR/LEN> } [ { eq <LEN> | le 31 characters;...
Page 230
ESR-Series. User manual Step Description Command Keys Specify the list of passwords for esr(config-rip)# authentication <KEYCHAIN> – key list authentication via md5 hashing key-chain <KEYCHAIN> identifier, set by the string of up algorithm (optionally). to 16 characters. Disable routes advertising on the esr(config-rip)# passive-interface <IF>...
Page 231
ESR-Series. User manual Step Description Command Keys Enable advertising of routes received in esr(config-rip)# redistribute static <NAME> – name of the route an alternative way (optionally). [ route-map <NAME> ] map that will be used for advertised static routes filtration and modification, set by the string of up to 31 characters.
Page 232
ESR-Series. User manual Step Description Command Keys Switch to the interface/tunnel/network esr(config)# interface <IF- <IF-TYPE> – interface type; bridge configuration mode. TYPE><IF-NUM> <IF-NUM> – F/S/P – F frame (1), S – slot (0), P – port. esr(config)# tunnel <TUN- <TUN-TYPE> – tunnel type; TYPE><TUN-NUM>...
ESR-Series. User manual 11.3.2 RIP configuration example Objective: Configure RIP on the router in order to exchange the routing information with neighbouring routers. The router should advertise static routes and subnets 115.0.0.0/24, 14.0.0.0/24, 10.0.0.0/24. Routes should be advertised each 25 seconds. Solution: Pre-configure IP addresses on interfaces according to the network structure shown in figure.
Page 234
ESR-Series. User manual In addition to RIP protocol configuration, open UDP port 520 in the firewall.
ESR-Series. User manual 11.4 OSFP configuration OSPF is a dynamic routing protocol, based on link-state technology and using shortest path first Dijkstra algorithm. 11.4.1 Configuration algorithm Step Description Command Keys Configure OSFP precedence for the esr(config)# ip protocols ospf <VALUE> – protocol main routing table (optionally).
Page 236
ESR-Series. User manual Step Description Command Keys Permit or deny the prefixes lists. esr(config-pl)# permit [ { object- <OBJ-GROUP-NETWORK- group <OBJ-GROUP-NETWORK- NAME> – IPv4/IPv6 addresses NAME> | <ADDR/LEN> | <IPV6- profile name, set by the string ADDR/LEN> } ] [ { eq <LEN> | le of up to 31 characters;...
Page 237
ESR-Series. User manual Step Description Command Keys Enable compatibility with RFC 1583 esr(config-ospf)# compatible (optionally). rfc1583 esr(config-ipv6-ospf)# compatible rfc1583 Add subnets filtration in incoming or esr(config-ospf)# prefix-list <PREFIX-LIST-NAME> – name outgoing updates (optionally). <PREFIX-LIST-NAME> { in | out } of a subnet list being configured, set by the string of up to 31 characters.
Page 238
ESR-Series. User manual Step Description Command Keys Create OSFP area and switch to the esr(config-ospf)# area <AREA_ID> <AREA_ID> – area identifier, scope configuration mode. defined as AAA.BBB.CCC.DDD where each part takes values esr(config-ipv6-ospf)# area of [0..255]. <AREA_ID> Enable subnets advertising. esr(config-ospf-area)# network <ADDR/LEN>...
Page 239
ESR-Series. User manual Step Description Command Keys Enable the subnet summarization or esr(config-ospf-area)# summary- <ADDR/LEN> – IP address and hiding. address <ADDR/LEN> { advertise | subnet mask, defined as not-advertise } AAA.BBB.CCC.DDD/EE where each part AAA-DDD takes values of [0..255] and EE takes values of [1..32];...
Page 240
ESR-Series. User manual Step Description Command Keys Set the time interval in seconds after esr(config-ospf- vlink)# <TIME> – time in seconds, which the router re-sends a packet that restransmit-interval <TIME> takes values of [1..65535]. has not received a delivery confirmation (for example, a DatabaseDescription Default value: 5 seconds.
Page 241
ESR-Series. User manual Step Description Command Keys Specify the list of passwords for esr(config-ospf- vlink)# <KEYCHAIN> – key list authentication via md5 hashing authentication key chain identifier, set by the string of up algorithm. <KEYCHAIN> to 16 characters. Enable virtual connection. esr(config-ospf- vlink)# enable Switch to the interface/tunnel/network esr(config)# interface <IF-...
Page 242
ESR-Series. User manual Step Description Command Keys Specify OSFP authentication algorithm. esr(config-if-gi)# ip ospf <ALGORITHM> – authentication algorithm authentication algorithm: <ALGORITHM> • cleartext – password, transmitted in clear text; • md5 – password is hashed by md5 algorithm. Set the password for OSPF neighbor esr(config-if-gi)# ip ospf <CLEAR-TEXT>...
Page 243
ESR-Series. User manual Step Description Command Keys Set the time interval during which esr(config-if-gi)# ip poll-interval <TIME> – time in seconds, NBMA interface waits before sending a <TIME> takes values of [1..65535]. HELLO packet to a neighbor, even if the neighbor is idle.
ESR-Series. User manual esr(config-ospf)# area 1.1.1.1 esr(config-ospf-area)# enable esr(config-ospf-area)# exit Enable advertising of the routing information from RIP: esr(config-ospf)# redistribute rip Enable OSFP process: esr(config-ospf)# enable esr(config-ospf)# exit Neighbouring routers are connected to gi1/0/5 and gi1/0/15 interfaces. To establish the neighbouring with other routers, map them to OSPF process and the area.
ESR-Series. User manual For R3 stub router, enable advertising of the routing information from RIP: esr(config-ospf)# redistribute rip 11.4.4 Virtual link configuration example Objective: Merge two backbone areas using virtual link. Solution: Virtual link is a specialized connection that allows you to merge a split zone or connect a zone to the backbone zone trough the third zone.
ESR-Series. User manual Consider the routing table on R1 router: esr# show ip route 10.0.0.0/24 [0/0] dev gi1/0/12, [direct 00:49:34] 10.0.1.0/24 [150/20] via 10.0.0.1 on gi1/0/12, [ospf1 00:49:53] (0.0.0.3) 192.168.20.0/24 [150/30] via 10.0.0.1 on gi1/0/12, [ospf1 00:50:15] (0.0.0.3) 192.168.10.0/24 [0/0] dev lo1, [direct 21:32:01] Review the routing table on R3 router:...
ESR-Series. User manual 11.5.1 Configuration algorithm To establish a BGP session it is necessary to allow TCP port 179 on the firewall. Step Description Command Keys Configure BGP precedence for the main esr(config)# ip protocols bgp <VALUE> – protocol routing table (optional).
Page 249
ESR-Series. User manual Step Description Command Keys 3.1.1 If you select the route-map-based esr(config)# route-map <NAME> <NAME> – configured routing filtering method, create a list of rules rule name, set by the string of that will be used to filter the advertised up to 31 characters.
Page 250
ESR-Series. User manual Step Description Command Keys 3.1.3 Define the list of subnets affected by esr(config-route-map-rule)#match <ADDR/LEN> – IP address and the rule. ip address { <ADDR/LEN> | object- subnet mask, in the format of. group <OBJ-GRP-NETNAME> } [ { eq <LEN> | le <LEN> | ge <LEN 1> AAA.BBB.CCC.DDD/EE –...
Page 251
ESR-Series. User manual Step Description Command Keys 3.2.1 If you select the prefix-list-based esr(config)# ip prefix-list <NAME> <NAME> – name of a subnet filtering method, create a list of IP list being configured, set by the networks that will be used to filter the string of up to 31 characters.
Page 252
ESR-Series. User manual Step Description Command Keys 3.2.2 Permit or deny the prefixes lists. esr(config-pl)# permit { <ADDR/ <ADDR/LEN> – IP address and LEN> | object-group <OBJ-GRP- subnet mask, in the format of. NETNAME>} [ { eq <LEN> | le <LEN>...
Page 253
ESR-Series. User manual Step Description Command Keys Set the router identifier. esr(config-bgp)# router-id <ID> <ID> – router identifier, defined as AAA.BBB.CCC.DDD where each part takes values of [0..255]. Set the Route-Reflector identifier of the esr(config-bgp)# cluster-id <ID> <ID> – Route-Reflector cluster cluster to which the router BGP process identifier, defined as belongs.
Page 254
ESR-Series. User manual Step Description Command Keys Set a global password for esr(config-bgp)# authentication <CLEAR-TEXT> – password, set authentication with neighbors. (Used in key ascii-text { <CLEAR-TEXT> | by the string of 8 to 16 conjunction with «authentication encrypted <ENCRYPTED-TEXT> } characters;...
Page 255
ESR-Series. User manual Step Description Command Keys esr(config-bgp-af)# redistribute <ID> – process number, takes ospf <ID> <ROUTE-TYPE 1> values of {1..65535}; [<ROUTE-TYPE 2>] [<ROUTE-TYPE 3>] [<ROUTE-TYPE 4>] [ route-map <ROUTE-TYPE> – route type: <NAME> ] • intra-area – OSPF process routes advertising within a zone;...
Page 256
ESR-Series. User manual Step Description Command Keys Enable subnets advertising. esr(config-bgp-af)# network <ADDR/LEN> – subnet address, <ADDR/LEN> set in one of the following formats: • AAA.BBB.CCC.DDD/EE – network IP address with prefix mask, where AAA- DDD take values of [0..255] and EE takes values of [1..32];...
Page 257
ESR-Series. User manual Step Description Command Keys Set the time of minimum and maximum esr(config-bgp-af)# timers error- <TIME1> – minimum delay delay during which it is prohibited to wait <TIME1> <TIME2> time in seconds, takes values establish a connection in order to of [1..65535].
Page 258
ESR-Series. User manual Step Description Command Keys Set the password for neighbour esr(config-bgp-neighbor)# <CLEAR-TEXT> – password, set authentication (optionally). authentication key ascii-text by the string of 8 to 16 { <CLEAR-TEXT> | encrypted characters; <ENCRYPTED-TEXT> } <ENCRYPTED-TEXT> – encrypted password of 8 to 16 bytes (from 16 to 32 characters) in hexadecimal format (0xYYYY ...) or...
ESR-Series. User manual Step Description Command Keys Set the mode in which private numbers esr(config-bgp-neighbor-af)# all – remove all private AS of autonomous systems are removed remove-private-as [ { all | nearest | number from AS-path; from the AS Path routes BGP attribute replace } ] before sending an update (in nearest –...
Page 260
ESR-Series. User manual esr-R3(config)# interface gigabitethernet 1/0/1 esr-R3(config-if-gi)# ip address 185.0.0.1/30 esr-R3(config-if-gi)# exit esr-R3(config)# interface gigabitethernet 1/0/2 esr-R3(config-if-gi)# ip address 219.0.0.1/30 esr-R3(config-if-gi)# exit esr-R3(config)# interface gigabitethernet 1/0/3 esr-R3(config-if-gi)# ip address 80.66.0.1/24 esr-R3(config-if-gi)# exit esr-R3(config)# interface gigabitethernet 1/0/4 esr-R3(config-if-gi)# ip address 80.66.16.1/24 esr-R3(config-if-gi)# exit...
Page 261
ESR-Series. User manual Configure the firewall to receive BGP traffic from the WAN security zone: esr-R3(config)# object-group service og_bgp esr-R3(config-object-group-service)# port-range esr-R3(config-object-group-service)# exit esr-R3(config)# security zone wan esr-R3(config-zone)# exit esr-R3(config)# security zone-pair wan self esr-R3(config-zone-pair)# rule esr-R3(config-zone-pair-rule)# match protocol tcp esr-R3(config-zone-pair-rule)# match destination-port og_bgp esr-R3(config-zone-pair-rule)# action permit esr-R3(config-zone-pair-rule)# enable...
ESR-Series. User manual Enable IPv4 route exchange: esr-R3(config-bgp-neighbor)# address-family ipv4 unicast esr-R3(config-bgp-neighbor-af)# enable esr-R3(config-bgp-neighbor-af)# exit esr-R3(config-bgp-neighbor)# exit Create a neighborhood with the R1 router via eBGP: esr-R3(config-bgp)# neighbor 185.0.0.2 esr-R3(config-bgp-neighbor)# remote-as esr-R3(config-bgp-neighbor)# enable Enable the exchange of ipv4 routes, permitting the necessary routes for advertising by means of a previously prepared route-map: esr-R3(config-bgp-neighbor)# address-family ipv4 unicast esr-R3(config-bgp-neighbor-af)# route-map bgp-general out...
Page 263
ESR-Series. User manual Step Description Command Keys Enable BFD for BGP neighbor on the esr(config-bgp-neighbor)# bfd- interface enable Set the interval after which the BFD esr(config)# ip bfd idle-tx-interval <TIMEOUT> – interval after message is sent to the neighbor. <TIMEOUT> which the BFD packet should Globally be sent, takes values in...
Page 264
ESR-Series. User manual Step Description Command Keys Set the minimum interval after which esr(config)# ip bfd min-tx-interval <TIMEOUT> – interval after the BFD message is sent to the <TIMEOUT> which the BFD message should neighbor. be sent by the neighbor, takes Globally values in milliseconds in the (optionally)
Page 265
ESR-Series. User manual Step Description Command Keys Set the interval after which the BFD esr(config-if-gi)# ip bfd idle-tx- <TIMEOUT> – interval after message is sent to the neighbor. interval <TIMEOUT> which the BFD packet should On the interface be sent, takes values in (optionally) milliseconds in the range of [200..65535] for...
ESR-Series. User manual Step Description Command Keys Set the amount of dropped packets, at esr(config-if-gi)# ip bfd multiplier <COUNT> – amount of dropped which the BFD neighbor is considered <COUNT> packets, at which the neighbor to be unavailable. is considered to be unavailable, On the interface takes values in the range of [1..100].
ESR-Series. User manual esr(config)# interface gigabitethernet 1/0/1 esr(config-if-gi)# ip firewall disable esr(config-if-gi)# ip address 10.0.0.2/24 Configure eBGP with BFD: esr(config)# router bgp esr(config-bgp)# address-family ipv4 esr(config-bgp-af)# neighbor 10.0.0.1 esr(config-bgp-neighbor)# remote-as esr(config-bgp-neighbor)# update-source 10.0.0.2 esr(config-bgp-neighbor)# bfd-enable esr(config-bgp-neighbor)# enable esr(config-bgp-neighbor)# ex esr(config-bgp-af)# enable esr(config-bgp-af)# exit 11.7 PBR routing policy configuration 11.7.1 Configuration algorithm of Route-map for BGP...
Page 268
ESR-Series. User manual Description Command Keys Set BGPAS-Path attribute value in the esr(config-route-map- <AS-PATH> – list of stand alone system route for which the rule should work rule)# match as-path numbers, defined as AS,AS,AS, takes values of (optionally). [begin | end | contain] [1..4294967295].
Page 269
ESR-Series. User manual Description Command Keys esr(config-route-map- rule)# match ipv6 next- hop object-group <OBJ- GROUP-NETWORK- NAME> Set the profile that includes IP esr(config-route-map- <OBJ-GROUP-NETWORK-NAME> – name of addresses of the router having rule)# match ip route- the IP addresses profile that includes advertised the route for which the source ...
Page 270
ESR-Series. User manual Description Command Keys Set BGP AS-Path attribute value that esr(config-route-map- <AS-PATH> – stand alone systems number list will be added to the beginning of AS- rule)# action set as-path that will be added to the current value in the Path list (optionally).
Page 271
ESR-Series. User manual Description Command Keys Specify Next-Hop value that will be esr(config-route-map- <NEXTHOP> – gateway IP address, defined as set in the route received by BGP rule)# action set ip next- AAA.BBB.CCC.DDD where each part takes (optionally). hop {NEXTHOP> | values of [0..255];...
ESR-Series. User manual Description Command Keys Add filtration and modification of esr(config-bgp- <NAME> – name of the route map having routes in incoming or outgoing neighbor)# route-map been configured; directions. <NAME><DIRECTION> <DIRECTION> – direction: esr(config-ipv6-bgp- • in – filtration and modification of neighbor)# route-map received routes;...
ESR-Series. User manual esr(config-route-map-rule)# match as-path contain esr(config-route-map-rule)# action set community 20:2020 esr(config-route-map-rule)# exit esr(config-route-map)# exit In AS 2500 BGP process, enter neighbour parameter configuration: esr(config)# router bgp 2500 esr(config-bgp)# address-family ipv4 esr(config-bgp-af)# neighbor 185.0.0.2 Map the policy to routing information: esr(config-bgp-neighbor)# route-map from-as20 in 11.7.3 Configuration example 2.
ESR-Series. User manual In AS 2500 BGP process, enter neighbour parameter configuration: esr(config)# router bgp 2500 esr(config-bgp)# address-family ipv4 esr(config-bgp-af)# neighbor 185.0.0.2 Map the policy to routing information being advertised: esr(config-bgp-neighbor)# route-map to-as20 out esr(config-bgp-neighbor)# exit esr(config-bgp)# exit esr(config)# exit 11.7.4 Route-map based on access control lists (Policy-based routing) configuration algorithm Step Description...
ESR-Series. User manual 11.7.5 Route-map based on access control lists (Policy-based routing) configuration example Objective: Distribute traffic between Internet service providers based on user subnets. First, assign IP address to interfaces. Route traffic from addresses 10.0.20.0/24 through ISP1 (184.45.0.150), and traffic from addresses 10.0.30.0/24 –...
ESR-Series. User manual esr(config-route-map)# rule Specify ACL as a filter: esr(config-route-map-rule)# match ip access-group sub20 Specify next-hop for sub20: esr(config-route-map-rule)# action set ip next-hop verify-availability 184.45.0.150 10 esr(config-route-map-rule)# action set ip next-hop verify-availability 80.16.0.23 30 esr(config-route-map-rule)# exit esr(config-route-map)# exit Rule 1 should provide traffic routing from the network 10.0.20.0/24 to address 184.45.0.150, and in case of its failure, to address 80.16.0.23.
ESR-Series. User manual 11.8.1 Configuration algorithm Step Description Command Keys Create VRF instance and switch to the esr(config)# ip vrf <VRF> <VRF> – VRF instance name, VRF instance parameters configuration set by the string of up to 31 mode. characters. Assign the description of the esr(config-vrf)# description <DESCRIPTION>...
VRFs (if configuration required). 11.8.2 Configuration example Objective: ESR series router features 2 connected networks that should be isolated from other networks. Solution: Create VRF: esr(config)# ip vrf bit esr(config-vrf)# exit Create a security zone:...
Page 279
ESR-Series. User manual esr(config)# security zone-pair vrf-sec vrf-sec esr(config-zone-pair)# rule esr(config-zone-rule)# match source-address any esr(config-zone-rule)# match destination-address any esr(config-zone-rule)# match protocol udp esr(config-zone-rule)# match source-port any esr(config-zone-rule)# match destination-port any esr(config-zone-rule)# action permit esr(config-zone-rule)# enable esr(config-zone-rule)# exit esr(config-zone-pair)# rule esr(config-zone-rule)# match source-address any esr(config-zone-rule)# match destination-address any esr(config-zone-rule)# match protocol tcp esr(config-zone-rule)# match source-port any...
ESR-Series. User manual Create interface mapping, assign IP addresses, specify an inherence to a security zone: esr(config)# interface gigabitethernet 1/0/7 esr(config-if-gi)# ip vrf forwarding bit esr(config-if-gi)# ip address 10.20.0.1/24 esr(config-if-gi)# security-zone vrf-sec esr(config-if-gi)# exit esr(config)# interface gigabitethernet 1/0/14.10 esr(config-subif)# ip vrf forwarding bit esr(config-subif)# ip address 10.30.0.1/16 esr(config-subif)# security-zone vrf-sec...
Page 281
ESR-Series. User manual Description Command Keys Specify interfaces or tunnels which are esr(config-wan-rule)# outbound <IF>– interface name; gateways in the route created by { interface <IF> | tunnel <TUN> } MultiWAN service. [WEIGHT] <TUN> – tunnel name; [WEIGHT] – tunnel or interface weight, defined in the range of [1..255].
Page 282
ESR-Series. User manual Description Command Keys esr(config-wan-target)# ipv6 <IPV6-ADDR> – destination address <IPV6-ADDR> IPv6 address, defined as X:X:X:X::X where each part takes values in hexadecimal format [0..FFFF]. Enable the target check. esr(config-wan-target)# enable Commands for 14-17 items should be applied on interfaces/tunnels in MultiWAN Enable WAN mode on the interface for esr(config-if-gi)# wan load- IPv4/IPv6 stack.
ESR-Series. User manual Description Command Keys esr(config-if-gi)# ipv6 wan load- <IPV6> – destination IPv6 balance nexthop { <IPV6> } address (gateway), defined as X:X:X:X::X where each part takes values in hexadecimal format [0..FFFF]. This command will be checking the IP esr(config-if-gi)# wan load- <NAME>...
Page 284
ESR-Series. User manual esr(config)# ip route 108.16.0.0/28 wan load-balance rule Create WAN rule: еsr(config)# wan load-balance rule Specify affected interfaces: еsr(config-wan-rule)# outbound interface tengigabitethernet 1/0/2 еsr(config-wan-rule)# outbound interface tengigabitethernet 1/0/1 Enable the created balancing rule and exit the rule configuration mode: еsr(config-wan-rule)# enable еsr(config-wan-rule)# exit Create a list for the connection integrity check:...
ESR-Series. User manual interface tengigabitethernet 1/0/2 еsr(config)# еsr(config-if)# wan load-balance nexthop 65.6.0.1 In te1/0/2 interface configuration mode, specify a list of targets for connection check: еsr(config-if)# wan load-balance target-list google In te1/0/2 interface configuration mode, enable WAN mode and exit: еsr(config-if)# wan load-balance enable еsr(config-if)# exit To switch into redundancy mode, configure the following:...
Page 286
ESR-Series. User manual Description Command Keys Set the authentication algorithm esr(config-isis)# <ALGORITHM> – authentication algorithm: for the L2 layer (optional). authentication domain algorithm <ALGORITHM> • cleartext – unencrypted password; • md5 – password is hashed by md5 algorithm. Set the authentication password esr(config-isis)# <CLEAR-TEXT>...
Page 287
ESR-Series. User manual Description Command Keys Set the type of metric to be used esr(config-isis)# metric-style narrow — accepts and generates TLVs (on in the IS-IS process (optional). { narrow | wide | transition } network reachability) of the old type; [<LEVEL>] wide —...
Page 288
ESR-Series. User manual Description Command Keys Enable advertising of routes esr(config-isis)# redistribute <AS> – stand alone system number, takes received in an alternative way bgp <AS> [ route-map values of [1..4294967295]. (optionally). <NAME> ] [is-type <LEVEL>] <NAME> – name of the route map that will be used for advertised routes filtration and esr(config-isis)# redistribute modification, set by the string of up to 31...
Page 290
ESR-Series. User manual Description Command Keys Add subnets filtration in incoming esr(config-isis)# prefix-list <LIST-NAME> – name of a subnet list being or outgoing updates (optionally). { ipv6 <LIST_NAME> | configured, set by the string of up to 31 <LIST_NAME> } {in|out} characters.
Page 291
ESR-Series. User manual Description Command Keys Set the interval for sending hello esr(config-if-gi)# isis hello- <TIME> – time in seconds, takes values of packets (optional). interval <TIME> [<LEVEL>] [1..65535]; <LEVEL> – IS-IS protocol operation level: • level-1 – operate only on level 1; •...
ESR-Series. User manual Description Command Keys Set the authentication algorithm esr(config-if-gi)# isis <ALGORITHM> – authentication algorithm: for the hello packets (optional). authentication algorithm <ALGORITHM> [<LEVEL>] • cleartext – unencrypted password; • md5 – password is hashed by md5 algorithm; <LEVEL> – IS-IS protocol operation level: •...
Page 293
ESR-Series. User manual Solution: Pre-configure IP addresses on interfaces according to the network structure shown in figure. Proceed to the ESR1 router configuration. Create IS-IS process with identifier 1 and proceed to the protocol configuration mode: ESR1(config)# router isis Set the number of the zone in which the router will operate and its system ID: ESR1(config-isis)# net 49.0001.1111.1111.1111.00 Configure the router to operate only on the first layer of the IS-IS protocol:...
Page 294
ESR-Series. User manual ESR2(config-if-gi)# isis instance ESR2(config-if-gi)# isis enable Proceed to the ESR3 router configuration. ESR3(config)# router isis ESR3(config-isis)# net 49.0002.3333.3333.3333.00 ESR3(config-isis)# is-type level-2 ESR3(config-isis)# metric-style wide level-2 ESR3(config-isis)# enable ESR3(config-if-gi)# isis instance ESR3(config-if-gi)# isis enable The neighborhood establishment can be viewed with the show isis neighbors command. Execute it on ESR2: ESR2# show isis neighbors IS-IS IS-IS Level...
ESR-Series. User manual 12 MPLS technology management • LDP configuration • Configuration algorithm • Configuration example • Configuring session parameters in LDP • Algorithm for setting Hello holdtime and Hello interval in the global LDP configuration • Algorithm for setting Hello holdtime and Hello interval for address family •...
ESR-Series. User manual 12.1.1 Configuration algorithm Step Description Command Keys In the context of MPLS parameters esr(config-mpls)# forwarding <IF> – an interface's name, configuration, specify the interfaces interface { <IF> | <TUN> } specified in the form described involved in the MPLS switching process in Section Types and naming order of router...
ESR-Series. User manual Step Description Command Keys The following functionality is also available as part of the LDP configuration: • LDP tag filtering configuration (see section LDP tag filtering configuration) • LDP session parameters configuration (see section Configuring session parameters in LDP) •...
Page 298
ESR-Series. User manual ESR pre-configuration: hostname ESR router ospf area 0.0.0.0 enable exit enable exit interface gigabitethernet 1/0/1 ip firewall disable ip address 10.10.10.1/30 ip ospf instance ip ospf exit interface loopback ip address 1.1.1.1/32 ip ospf instance ip ospf exit ESR1 pre-configuration:...
ESR-Series. User manual The LDP session should be in the "Operational" state. ESR1# show mpls ldp neighbor Peer LDP ID: 4.4.4.4; Local LDP ID 1.1.1.1 State: Operational TCP connection: 4.4.4.4:40245 1.1.1.1:646 Messages sent/received: 10/11 Uptime: 00:00:58 ...
Page 301
ESR-Series. User manual ESR routers have the ability to flexibly configure Hello holdtime, Hello interval and Keepalive holdtime settings. Let's consider an example of configuring Hello holdtime for an LDP session: ESR# show run mpls mpls ldp router-id 4.4.4.4 ...
ESR-Series. User manual For a TCP session, Keepalive holdtime is also a matching parameter similar to Hold timer. Keepalive interval is calculated automatically and equals Keepalive holdtime/3. Keepalive holdtime can be set globally as well as for each neighbor. The timer set for a particular neighbor is a higher priority. ESR# show running-config mpls mpls ...
ESR-Series. User manual Step Description Command Keys In the LDP address family configuration esr(config-ldp-af-ipv4-if)# <TIME> — time in the range of mode, set Hello interval on the specified discovery hello interval <TIME> [3..65535] seconds interface Default value: 5 12.2.3 Algorithm for setting Keepalive holdtime parameter in the global LDP configuration Step Description Command...
ESR-Series. User manual Check: To view hello parameters: ESR# sh mpls ldp discovery detailed Local LDP ID: 4.4.4.4 Discovery sources: Interfaces: gigabitethernet 1/0/4: Hello interval: seconds Transport IP address: 4.4.4.4 LDP ID: 1.1.1.1 Source IP address: 10.10.10.1 Transport IP address: 1.1.1.1 Hold time: seconds...
Page 306
ESR-Series. User manual Parameter targeted-LDP Hold timer 45 seconds Keepalive holdtime 180 seconds...
Page 307
ESR-Series. User manual Hold timer is a matching parameter — the smallest is chosen. This example shows that the ESR after matching set 30 seconds: ESR1# sh mpls ldp discovery detailed Targeted hellos: 1.1.1.1 -> 4.4.4.4: Hello interval: seconds Transport IP address: 1.1.1.1 LDP ID:...
ESR-Series. User manual If parameters are set for both the LDP process and a specific neighbor, the priority will be the settings set for the neighbor. ESR# sh running-config mpls mpls ldp router-id 1.1.1.1 keepalive discovery hello holdtime ...
ESR-Series. User manual In the LDP configuration mode, esr(config-ldp)# keepalive <TIME> — time in the range of [3..65535] seconds set Keepalive holdtime <TIME> Default value: 180 12.3.2 Algorithm for setting Hello holdtime, Hello interval and Keepalive holdtime for the specific neighbor Configure the LDP (see section configuration) In the LDP neighbor...
ESR-Series. User manual ESR1# sh mpls ldp discovery detailed Targeted hellos: 1.1.1.1 -> 4.4.4.4: Hello interval: seconds Transport IP address: 1.1.1.1 LDP ID: 4.4.4.4 Source IP address: 4.4.4.4 Transport IP address: 4.4.4.4 Hold time: seconds Proposed hold time: 40/45 (local/peer) seconds To view parameter of the established TCP session: ESR# sh mpls ldp neighbor 4.4.4.4...
ESR-Series. User manual Step Description Command Keys Describe the subnets for which labels esr(config-object-group-network)# <ADDR/LEN> – IP address and will be assigned ip prefix <ADDR/LEN> subnet mask, defined as AAA.BBB.CCC.DDD/EE where each part AAA-DDD takes values of [0..255] and EE takes values of [1..32];...
ESR-Series. User manual ESR_B esr(config)# object-group network ADV_LABELS esr(config-object-group-network)# ip prefix 10.10.0.1/32 esr(config-object-group-network)# ip prefix 10.10.0.2/32 Apply the created object-group on both routers: ESR_A и ESR_B esr(config)# mpls esr(config-ldp)# ldp esr(config-ldp)# advertise-labels ADV_LABELS Check: On ESR_B make sure that the tag is assigned to the appropriate prefixes: esr# sh mpls ldp bindings 10.10.0.1/32 10.10.0.1/32...
Page 313
ESR-Series. User manual Step Description Command Keys Create pw-class in the system and esr(config-l2vpn)# pw-class <WORD> — pw-class name switch to the pw-class configuration <WORD> [1..31] characters long. mode. Add a description for pw-class esr(config-l2vpn-pw-class)# <LINE> – description. Set by (optional).
ESR-Series. User manual Step Description Command Keys Create a pseudo-wire and switch to its esr(config-l2vpn-p2p)# pw <PW_ID> — psewdowire parameters configuration mode <PW_ID> <LSR_ID> identifier, specified in the range [1..4294967295] <LSR_ID> — identifier of LSR to which pseudo-wire is built, specified as AAA.BBB.CCC.DDD, where each part takes values [0..255]...
Page 315
ESR-Series. User manual On the PE1 router create a sub-interface from which traffic from CE1 will be received: PE1# configure PE1(config)# interface gigabitethernet 1/0/4.100 PE1(config-subif)# exit Set the MTU value on the interface towards PE2 to 9600 to avoid MTU overrun after encapsulating the MPLS header and disable the firewall: PE1#(config)# interface...
Page 316
ESR-Series. User manual PE1# commit PE1# confirm Configure the PE2 router in the same way as PE1: PE2# configure PE2(config)# interface gigabitethernet 1/0/4.100 PE2(config-subif)# exit PE2#(config)# interface gigabitethernet 1/0/1 PE2(config-if-gi)# mtu 9600 PE1(config-if-gi)# ip firewall disable PE1(config-if-gi)# exit PE2(config)# mpls PE2(config-mpls)# forwarding interface gigabitethernet...
ESR-Series. User manual The LDP neighborhood is established, pseudowire has moved to 'UP' status. The l2vpn p2p type configuration is now complete. 12.5.3 L2VPN VPLS configuration algorithm Step Description Command Keys Configure the LDP (see section configuration). Create a network bridge in the system without specifying an IP address (see section Bridge configuration).
ESR-Series. User manual Step Description Command Keys Create a pseudo-wire and switch to its esr(config-l2vpn-vpls)# pw <PW_ID> — psewdowire parameters configuration mode <PW_ID> <LSR_ID> identifier, specified in the range [1..4294967295] <LSR_ID> — identifier of LSR to which pseudo-wire is built, specified as AAA.BBB.CCC.DDD, where each part takes values [0..255]...
Page 319
ESR-Series. User manual Solution: Pre-requisite: • Enable Jumbo frames support with the "system jumbo-frames" command (the device must be rebooted for the changes to take effect); • Сonfigure IP addresses on interfaces according to the network structure shown in the figure above; •...
Page 320
ESR-Series. User manual Allow packets with an MPLS header to be received on the interface towards the MPLS network (in this example, the interface towards PE2): PE1(config)# mpls PE1(config-mpls)# forwarding interface gigabitethernet 1/0/1 Configure the LDP protocol and enable neighbor detection on the interface towards PE2: PE1(config-mpls)# ldp PE1(config-ldp)# router-id 1.1.1.1...
Page 321
ESR-Series. User manual Configure PE2 and PE3 routers in the same way as PE1: PE2# configure PE2(config)# bridge PE2(config-bridge)# enable PE2(config-bridge)# exit PE2(config)# interface gigabitethernet 1/0/4.100 PE2(config-subif)# bridge-group PE2(config-subif)# exit PE2(config)# interface gigabitethernet 1/0/2 PE2(config-if-gi)# mtu 9600 PE2(config-if-gi)# ip firewall disable PE2(config-if-gi)# exit PE2(config)# mpls PE2(config-mpls)# forwarding...
ESR-Series. User manual 12.6 L2VPN Kompella mode configuration Unlike Martini mode, where all operation is done by the LDP, in this mode the LDP does only operate with transport labels. Autodetection (not typical of LDP signaling), and the construction of a pseudowire connection is entrusted to BGP.
Page 324
ESR-Series. User manual Step Description Command Keys Specify route target import for the given esr(config-bgp)# route-target <RT> – Route-target value, VPLS instance. import <RT> specified in one of the following forms: • <ASN>:<nn> — where <ASN> may take values [1..65535], nn may take values [1..65535];...
ESR-Series. User manual Step Description Command Keys Specify mtu (optional). esr (config-bgp)# mtu <VALUE> <VALUE> — MTU value [552..10000]. Enable ignoring encapsulation type esr(config-bgp)# ignore (optional). encapsulation-mismatch Enable ignoring MTU values (optional). esr(config-bgp)# ignore mtu- mismatch In the context of address-family l2vpn esr(config-bgp-neighbor-af)# vpls BGP configuration, enable send-community extended...
Page 326
ESR-Series. User manual First, configure the RR router: hostname RR system jumbo-frames router ospf area 0.0.0.0 enable exit enable exit interface gigabitethernet 1/0/2 9500 ip firewall disable ip address 10.30.0.2/30 ip ospf instance ip ospf exit interface gigabitethernet 1/0/3 9500...
Page 327
ESR-Series. User manual Configure the BGP Route Reflector for the address family l2vpn: RR(config)# router bgp 65500 RR(config-bgp)# router-id 10.10.0.4 RR(config-bgp)# neighbor 10.10.0.1 RR(config-bgp-neighbor)# remote-as 65500 RR(config-bgp-neighbor)# route-reflector-client RR(config-bgp-neighbor)# update-source 10.10.0.4 RR(config-bgp-neighbor)# address-family l2vpn vpls RR(config-bgp-neighbor-af)# send-community extended RR(config-bgp-neighbor-af)# enable RR(config-bgp-neighbor-af)# exit RR(config-bgp-neighbor)#...
Page 328
ESR-Series. User manual Pre-configuration ip firewall disable ip address 10.20.0.1/30 ip ospf instance ip ospfexit interface gigabitethernet 1/0/2 9500 ip firewall disable ip address 10.30.0.1/30 ip ospf instance ip ospf exitinterface gigabitethernet 1/0/3 9500 ip firewall disable ip address 10.22.0.1/30 ip ospf instance ip ospf exit...
Page 329
ESR-Series. User manual BGP configuration: PE1(config)# router bgp 65500 PE1(config-bgp)# neighbor 10.10.0.4 PE2(config-bgp)# router-id 10.10.0.1 PE1(config-bgp-neighbor)# remote-as 65500 PE1(config-bgp-neighbor)# update-source 10.10.0.1 PE1(config-bgp-neighbor)# address-family l2vpn vpls PE1(config-bgp-neighbor-af)# send-community extended PE1(config-bgp-neighbor-af)# enable PE1(config-bgp-neighbor-af)# exit PE1(config-bgp-neighbor)# enable PE1(config-bgp-neighbor)# exit PE1(config-bgp)# enable PE1(config-bgp)# exit Check that the BGP session with RR is successfully established: PE1# sh ip bgp neighbors BGP neighbor is...
Page 330
ESR-Series. User manual Pre-configuration interface gigabitethernet 1/0/1 9500 ip firewall disable ip address 10.20.0.2/30 ip ospf instance ip ospf exit interface gigabitethernet 1/0/2 9500 ip firewall disable ip address 10.21.0.1/30 ip ospf instance ip ospf exit interface gigabitethernet 1/0/3 9500 ip firewall disable ip address 10.31.0.1/30...
Page 331
ESR-Series. User manual PE2(config)# router bgp 65500 PE2(config-bgp)# router-id 10.10.0.2 PE2(config-bgp)# neighbor 10.10.0.4 PE2(config-bgp-neighbor)# remote-as 65500 PE2(config-bgp-neighbor)# update-source 10.10.0.2 PE2(config-bgp-neighbor)# address-family l2vpn vpls PE2(config-bgp-neighbor-af)# send-community extended PE2(config-bgp-neighbor-af)# enable PE2(config-bgp-neighbor-af)# exit PE2(config-bgp-neighbor)# enable PE2(config-bgp-neighbor)# exit PE2(config-bgp)# enable PE2(config-bgp)# exit Check that the session with RR is successfully established: PE2# sh ip bgp neighbors BGP neighbor is 10.10.0.4...
Page 332
ESR-Series. User manual Configuration of BGP on PE3: Pre-configuration hostname PE3 system jumbo-frames router ospf area 0.0.0.0 enable exit enable exit interface gigabitethernet 1/0/2 9500 ip firewall disable ip address 10.21.0.2/30 ip ospf instance ip ospf exit interface gigabitethernet 1/0/3...
Page 333
ESR-Series. User manual PE3(config)# router bgp 65500 PE3(config-bgp)# router-id 10.10.0.3 PE3(config-bgp)# neighbor 10.10.0.4 PE3(config-bgp-neighbor)# remote-as 65500 PE3(config-bgp-neighbor)# update-source 10.10.0.3 PE3(config-bgp-neighbor)# address-family l2vpn vpls PE3(config-bgp-neighbor-af)# send-community extended PE3(config-bgp-neighbor-af)# enable PE3(config-bgp-neighbor-af)# exit PE3(config-bgp-neighbor)# enable PE3(config-bgp-neighbor)# exit PE3(config-bgp)# enable PE3(config-bgp)# exit Check that the BGP session is successfully established: PE3# sh ip bgp neighbors BGP neighbor is 10.10.0.4...
Page 334
ESR-Series. User manual Check that the interface is included into the bridge domain: PE1# sh interfaces bridge Bridges Interfaces ---------- -------------------------------------------------------------- bridge gi1/0/4 PE1# sh interfaces status bridge Interface 'bridge 1' status information: Description: Operational state: Administrative state: Up Supports broadcast: Supports multicast: MTU: 1500...
Page 335
ESR-Series. User manual PE3(config)# bridge PE3(config-bridge)# enable PE3(config-bridge)# exit PE3(config)# interface gigabitethernet 1/0/4 PE3(config-if-gi)# mode switchport PE3(config-if-gi)# bridge-group PE3# sh interfaces bridge Bridges Interfaces ---------- -------------------------------------------------------------- bridge gi1/0/4 PE3# sh interfaces status bridge Interface Admin Link MAC address Last change Mode state state...
Page 336
ESR-Series. User manual Specify RD, RT, VE-ID, VPN-ID according to the network scheme and activate the service: In some cases you can skip entering such parameters as RD and RT: if you specify only VPN ID, they will be formed as follows: <AS number> : <vpn-id>. For example, we have an AS 65550 autonomous system number, vpn-id is 10, then the following parameters will be generated: RD - 65550: 10.
Page 337
ESR-Series. User manual Proceed to the PE2 configuration: PE2(config-mpls)# l2vpn PE2(config-l2vpn)# vpls l2vpn PE2(config-l2vpn-vpls)# bridge-group PE2(config-l2vpn-vpls)# autodiscovery bgp PE2(config-bgp)# rd 65500:100 PE2(config-bgp)# route-target export 65500:100 PE2(config-bgp)# route-target import 65500:100 PE2(config-bgp)# vpn id PE2(config-bgp)# ve id PE2(config-bgp)# exit PE2(config-l2vpn-vpls)# enable Check that PE2 is advertising the route information on RR: PE2# sh ip bgp l2vpn vpls all neighbor 10.10.0.4...
Page 338
ESR-Series. User manual The calculated service marks can be viewed as follows: PE2# sh mpls l2vpn bindings Neighbor: 10.10.0.1, PW ID: 2, VE ID: Local label: Encasulation Type: VPLS Control flags: 0x00 MTU: 1500 Remote label: Encasulation Type: VPLS Control flags: 0x00 MTU:...
Page 339
ESR-Series. User manual Proceed to the PE3 configuration: PE3# config PE3(config)# mpls PE3(config-mpls)# l2vpn PE3(config-l2vpn)# vpls l2vpn PE3(config-l2vpn-vpls)# bridge-group PE3(config-l2vpn-vpls)# autodiscovery bgp PE3(config-bgp)# rd 65500:100 PE3(config-bgp)# route-target export 65500:100 PE3(config-bgp)# route-target import 65500:100 PE3(config-bgp)# ve id PE3(config-bgp)# vpn id PE3(config-bgp)# exit PE3(config-l2vpn-vpls)# enable Check the routing information in PE3: PE3# sh ip bgp l2vpn vpls all...
ESR-Series. User manual Check that the pseudowire is built before both PEs and is in the "UP" status: PE3# sh mpls l2vpn vpls l2vpn VPLS: l2vpn bridge 1: MTU: 1500 Status: Up ACs: gigabitethernet 1/0/4: MTU: 1500 Status: Up PWs: PW ID 3, Neighbor 10.10.0.2: MTU: 1500...
ESR-Series. User manual 12.7.1 Configuration algorithm Step Description Command Keys Configure addressing and one of IGP on all P and PE routers Configure LDP transport tag distribution Create VRF esr(config)# ip vrf <VRF> <VRF> – VRF instance name, set by the string of up to 31 characters.
Page 342
ESR-Series. User manual Step Description Command Keys Specify route target import for the esr(config-vrf)# route-target import <RT> – Route-target value, given VRF <RT> specified in one of the following forms: • <ASN>:<nn> — where <ASN> may take values [1..65535], nn may take values [1..65535];...
ESR-Series. User manual Step Description Command Keys Specify the allowed number of routes esr(config-vrf)# ip protocols <PROTOCOL> – protocol type, for this VRF <PROTOCOLS> max-routes may take following values: rip <VALUE> (only in global mode), ospf, isis, bgp; <VALUE> – amount of routes in the routing table, takes values in the range of: •...
Page 344
ESR-Series. User manual Solution: 1 Configuring addressing and enabling IGP on routers ESR1 router ospf log-adjacency-changes router ospf router-id 1.1.1.1 area 0.0.0.0 enable exit enable exit interface loopback ip address 1.1.1.1/32 ip ospf instance ip ospf exit interface gigabitethernet 1/0/1.10 ip firewall disable...
Page 345
ESR-Series. User manual ESR2 router ospf log-adjacency-changes router ospf router-id 2.2.2.2 area 0.0.0.0 enable exit enable exit interface loopback ip address 2.2.2.2/32 ip ospf instance ip ospf exit interface gigabitethernet 1/0/1.10 ip firewall disable ip address 10.10.10.2/30 ip ospf instance ip ospf exit ...
Page 346
ESR-Series. User manual ESR3 router ospf log-adjacency-changes router ospf router-id 3.3.3.3 area 0.0.0.0 enable exit enable exit interface loopback ip address 3.3.3.3/32 ip ospf instance ip ospf exit interface gigabitethernet 1/0/1.20 ip firewall disable ip address 20.20.20.1/30 ip ospf instance ip ospf exit ...
Page 347
ESR-Series. User manual ESR4 router ospf log-adjacency-changes router ospf router-id 4.4.4.4 area 0.0.0.0 enable exit enable exit interface loopback ip address 4.4.4.4/32 ip ospf instance ip ospf exit interface gigabitethernet 1/0/1.40 ip firewall disable ip address 40.40.40.2/30 ip ospf instance ip ospf exit ...
Page 348
ESR-Series. User manual It is necessary to make sure that the protocol is running on every router. ESR1# show ip ospf neighbors Router ID Pri State DTime Interface Router IP --------- --- ----- ----- ------------- --------- 2.2.2.2 128 Full/BDR 00:39 gi1/0/1.10 10.10.10.2 4.4.4.4 128...
Page 350
ESR-Series. User manual One of the following commands can be used to check the LDP convergence: ESR1# show mpls ldp neighbor Peer LDP ID: 2.2.2.2; Local LDP ID 1.1.1.1 State: Operational TCP connection: 2.2.2.2:33933 1.1.1.1:646 Messages sent/received: 1059/1070 Uptime: 17:32:07 LDP discovery sources: gigabitethernet 1/0/1.10...
Page 351
ESR-Series. User manual Configure iBGP between ESR1 and ESR3. Enable extended community sending on both devices. ESR1 ESR1(config)# router bgp log-neighbor-changes ESR1(config)# router bgp 65500 ESR1(config-bgp)# router-id 1.1.1.1 ESR1(config-bgp)# enable ESR1(config-bgp)# neighbor 3.3.3.3 ESR1(config-bgp-neighbor)# remote-as 65500 ESR1(config-bgp-neighbor)# update-source 1.1.1.1 ESR1(config-bgp-neighbor)# enable ESR1(config-bgp-neighbor)# address-family ipv4 unicast ESR1(config-bgp-neighbor-af)# enable ESR1(config-bgp-neighbor-af)# exit...
Page 352
ESR-Series. User manual 4 PE-CE routing configuration Customer1 advertises a BGP(AS65505) subnet 10.100.0.0/24. Configure eBGP session between CE_SiteA and By default: the route advertising is prohibited for EBGP, you should configure an allow rule; for IBGP route advertising is allowed. CE_SiteA Configure the corresponding interfaces.
Page 353
ESR-Series. User manual ESR1 Configure interface to the CE direction. Also create a route-map in which we specify the subnets allowed to be advertised. ESR1 interface gigabitethernet 1/0/2 ip vrf forwarding Customer1 description "Customer1" ip firewall disable ip address 192.168.32.1/30 ...
Page 354
ESR-Series. User manual Allow forwarding routes from VRF to the VPNv4 unicast table ESR1 address-family ipv4 unicast redistribute connected redistribute bgp 65500 exit enable exit The following commands can be used to check the accepted and advertised routes: ESR1# show ip bgp 65500 vrf Customer1 neighbors 192.168.32.2...
Page 355
ESR-Series. User manual CE_SiteB Configure the corresponding interfaces. CE_SiteB interface gigabitethernet 1/0/2 ip firewall disable ip address 192.168.32.6/30 exit interface loopback ip address 10.100.1.1/24 exit route-map OUTPUT rule match ip address 10.100.1.0/24 action permit Configure eBGP between ESR3 and CE_SiteB. CE_SiteB router bgp 65505...
Page 356
ESR-Series. User manual Create a route-map in which we specify the subnets allowed to be advertised. ESR3 route-map OUTPUT rule action permit Configure eBGP between ESR3 and CE_SiteB. ESR3 router bgp 65500 vrf Customer1 router-id 192.168.32.5 neighbor 192.168.32.6 remote-as 65505 update-source 192.168.32.5 address-family ipv4 unicast...
ESR-Series. User manual You can use one of the following commands to view the VPNv4 table: ESR1# show ip bgp vpnv4 unicast all Status codes: * - valid, > - best, i - internal, S - stale Origin codes: i - IGP, e - EGP, ? - incomplete ...
ESR-Series. User manual Solution: ESR(config)# system cpu load-balance mpls passenger ip ESR(config)# system cpu load-balance mpls passenger ipoe-pw-without-cw 12.9 Operation with the bridge domain within MPLS To organize L2VPN service, you need to configure a bridge domain on the device, create the required AC, PW (LDP-signaling) and include all the necessary elements in this bridge domain.
Page 359
ESR-Series. User manual In BGP signaling, the bridge domain only operate in ethernet mode. PE1# config PE1(config)# mpls PE1(config-mpls)# l2vpn PE1(config-l2vpn)# vpls MARTINI_br PE1(config-l2vpn-vpls)# transport-mode vlan PE1# sh mpls l2vpn pseudowire Neighbor PW ID Sig Type Status --------------------------------------- ---------- --- ---------- ------ 10.10.0.2 LDP Eth Tagged Up ...
ESR-Series. User manual 2. Vlan (Tagged) mode: • If AC is a subinterface, the vlan tag is saved before putting it in the bridge. The vlan tag can be saved or overwritten depending on the configuration when you exit the bridge. •...
Page 361
ESR-Series. User manual LDP-signaling. Configuration of MTU for matching PE2(config)# mpls PE2(config-mpls)# l2vpn PE2(config-l2vpn)# pw-class MTU_example PE2(config-l2vpn-pw-class)# encapsulation mpls mtu 9000 PE2(config-l2vpn-pw-class)# exit PE2(config-mpls)# l2vpn PE2(config-l2vpn)# vpls MTU_Example_PW PE2(config-l2vpn-vpls)# pw 200 10.10.0.1 PE2(config-l2vpn-pw)# pw-class PE2(config-l2vpn-pw)# pw-class MTU_example *Просмотр созданных pw-class'ов* PE2# sh mpls l2vpn pw-class...
Page 362
ESR-Series. User manual Consider the example: ...
Page 363
ESR-Series. User manual For BGP-signaling the MTU parameter can also be specified: BGP -signaling. Configuration of MTU for matching PE1(config)# mpls PE1(config-mpls)# l2vpn PE1(config-l2vpn)# vpls l2vpn_MTU PE1(config-l2vpn-vpls)# autodiscovery bgp PE1(config-bgp)# mtu 1500 PE2# sh mpls l2vpn vpls l2vpn_MTU VPLS: l2vpn_MTU PWs: PW ID 2, Neighbor 10.10.0.1: MTU:...
Page 364
ESR-Series. User manual * E.g., we have a bridge domain 100, which includes interfaces gi1/0/1 with MTU value 2000, and gi1/0/2 with MTU value 3000 CE3(config)# bridge CE3(config-bridge)# enable CE3(config-bridge)# exit CE3(config)# interface gigabitethernet 1/0/1 CE3(config-if-gi)# mtu 2000 CE3(config-if-gi)# bridge-group CE3(config-if-gi)# exit CE3(config)# interface...
Page 365
ESR-Series. User manual Description: Operational state: Administrative state: Up Supports broadcast: Supports multicast: MTU: 2000 MAC address: a8:f9:4b:aa:11:00 Last change: minutes and seconds Mode: Routerport Consider the example of traffic passing through the L2VPN service: PE1 has the following MTU values on the interfaces: PE1# sh interfaces status Interface Admin...
Page 366
ESR-Series. User manual Similar behavior when passing traffic in the L3VPN service: If CE1 sends a packet with a higher MTU than on the interface facing the client (gi1/0/2) or towards the mpls- core (gi1/0/1), the packet will be discarded.
ESR-Series. User manual 13.1.1 Local authentication configuration algorithm Step Description Command Keys Set local as authentication method. esr(config)# aaa authentication <NAME> – list name, set by the login { default | <NAME> } string of up to 31 characters. <METHOD 1> [ <METHOD 2>...
Page 369
ESR-Series. User manual Step Description Command Keys Specify the number of failed esr(config)# aaa authentication <COUNT> – amount of failed authentication attempts to block the attempts max-fail <COUNT> authentication attempts after user login and time of the lock <TIME> which a user is blocked, takes (optional) the values of [1..65535];...
Page 370
ESR-Series. User manual Step Description Command Keys Set the minimum number of lower case esr(config)# security passwords <COUNT> – minimum number letters in the local user password and lower-case <COUNT> of lower case letters in the local ENABLE password (optional) user password and ENABLE password.
ESR-Series. User manual Step Description Command Keys Switch to the corresponding terminal esr(config)# line console configuration mode esr(config)# line telnet esr(config)# line ssh Activate user login authentication list esr(config-line-ssh)# login <NAME> – list name, set by the authentication <NAME> string of up to 31 characters. Activate authentication list of user esr(config-line-ssh)# enable <NAME>...
Page 372
ESR-Series. User manual Step Description Command Keys Add RADIUS server to the list of used esr(config)# radius-server host <IP-ADDR> – RADIUS server IP servers and switch to its configuration { <IP-ADDR> | <IPV6-ADDR> } [ vrf address, defined as mode. <VRF>...
Page 373
ESR-Series. User manual Step Description Command Keys Set IPv4/IPv6 address that will be used esr(config-radius-server)# source- <ADDR> – source IP address, as source IPv4/IPv6 address in address { <ADDR> | <IPV6-ADDR> } defined as AAA.BBB.CCC.DDD transmitted RADIUS packets. where each part takes values of [0..255];...
Page 374
ESR-Series. User manual Step Description Command Keys Set the method for iterating over esr(config)# aaa authentication <MODE> – options of iterating authentication methods (optional). mode <MODE> over methods: • chain – if the server returned FAIL, proceed to the following authentication method in the chain;...
ESR-Series. User manual 13.1.3 AAA configuration algorithm via TACACS Step Description Command Keys Set the DSCP code global value for the esr(config)# tacacs-server dscp <DSCP> – DSCP code value, use in IP headers of TACACS server <DSCP> takes values in the range of egress packets (optional).
Page 376
ESR-Series. User manual Step Description Command Keys Set the port number to communicate esr(config-tacacs-server)# port <PORT> – number of TCP port with remote TACACS server (optional). <PORT> to exchange data with a remote server, takes values of [1..65535]. Default value: 49 for TACACS server.
Page 377
ESR-Series. User manual Step Description Command Keys Set the method for iterating over esr(config)# aaa authentication <MODE> – options of iterating authentication methods (optional). mode <MODE> over methods: • chain – if the server returned FAIL, proceed to the following authentication method in the chain;...
ESR-Series. User manual 13.1.4 AAA configuration algorithm via LDAP Step Description Command Keys Specify basic DN (Distinguished name) esr(config)# ldap-server base-dn <NAME> – basic DN, set by the which will be used when searching for <NAME> string of up to 255 characters. users.
Page 379
ESR-Series. User manual Step Description Command Keys Specify the interval after which the esr(config)# ldap-server search <SEC> – time interval in device assumes that LDAP server has timeout <SEC> seconds, takes values of [0..30] not found users entries satisfying the search condition (optional).
Page 380
ESR-Series. User manual Step Description Command Keys Specify the number of failed aaa authentication attempts max- <COUNT> – amount of failed authentication attempts to block the fail <COUNT> <TIME> authentication attempts after user login and time of the lock which a user is blocked, takes (optional) the values of [1..65535];...
Page 381
ESR-Series. User manual Step Description Command Keys Set LDAP as authentication method. esr(config)# aaa authentication <NAME> – list name, set by the login { default | <NAME> } string of up to 31 characters. <METHOD 1> [ <METHOD 2> ] [ <METHOD 3>...
ESR-Series. User manual Step Description Command Keys Switch to the corresponding terminal esr(config)# line <TYPE> <TYPE> – console type: configuration mode. • console – local console; • ssh – secure remote console. Activate user login authentication list. esr(config-line-console)# login <NAME> – list name, set by the authentication <NAME>...
ESR-Series. User manual esr# show aaa authentication 13.2 Command privilege configuration Command privilege configuration is a flexible tool that allows you to assign baseline user privilege level (1–15) to a command set. In future, you may specify privilege level during user creation which will define a command set available to them.
Page 384
ESR-Series. User manual Step Description Command Keys Enable protection against land attacks. esr(config)# firewall screen dos- defense land Enable a limit on the number of packets esr(config)# ip firewall screen dos- <NUM> – limit number of IP sent per second per destination defense packets per second, set in the address...
Page 385
ESR-Series. User manual Step Description Command Keys Enable protection against port scan esr(config)# ip firewall screen spy- <threshold> – interval in attacks. blocking port-scan milliseconds during which the { <threshold> } [ <TIME> ] port scan attack will be recorded [1..1000000]. <TIME>...
ESR-Series. User manual Step Description Command Keys Enable more detailed message output esr(config)# logging firewall about detected and blocked network screen detailed attacks in the CLI. Enable mechanism of DoS attacks esr(config)# logging firewall <ATACK_TYPE> – DoS attack detection and logging via CLI, syslog screen dos-defense type, takes the following and SNMP.
Page 387
ESR-Series. User manual Command Description ip firewall screen dos-defense limit- When the host IP sessions table is overfilled, the host is unable to establish new session-destination sessions and it drops the requests (this may happen during various DoS attacks: SYN flood, UDP flood, ICMP flood, etc.). The command enables limiting the number of packets transmitted per second per destination address, which attenuates DoS attacks.
Page 388
ESR-Series. User manual Command Description ip firewall screen spy-blocking icmp- The given command enables the blocking of all 4 type ICMP packets (source type source-quench quench) including the packets generated by the router itself. The protection prevents an attacker from learning about network topology and hosts availability ip firewall screen spy-blocking icmp- The given command enables the blocking of all 11 type ICMP packets (time...
ESR-Series. User manual Command Description ip firewall screen suspicious-packets The given command enables the blocking of ICMP packets more than 1024 large-icmp bytes. ip firewall screen suspicious-packets This command enables the blocking of fragmented TCP packets with the SYN syn-fragment flag.
ESR-Series. User manual esr(config)# security zone LAN esr(config-zone)# exit esr(config)# security zone WAN esr(config-zone)# exit esr(config)# security zone-pair LAN WAN esr(config-zone-pair)# rule esr(config-zone-pair-rule)# action permit esr(config-zone-pair-rule)# enable esr(config-zone-pair-rule)# ex esr(config-zone-pair)# exit esr(config)# security zone-pair WAN LAN esr(config-zone-pair)# rule esr(config-zone-pair-rule)# action permit esr(config-zone-pair-rule)# enable esr(config-zone-pair-rule)# exit esr(config-zone-pair)# exit...
ESR-Series. User manual 13.4.1 Configuration algorithm Step Description Command Keys Create security zones. esr(config)# security zone <zone- <zone-name> – up to 12 name1> characters. esr(config)# security zone <zone- name2> Specify a security zone description. esr(config-zone)# description <description> – up to 255 <description>...
Page 392
ESR-Series. User manual Step Description Command Keys Determine the size of outstanding esr(config)# ip firewall sessions <COUNT> – table size, takes sessions table (optional). max-expect <COUNT> values of [1..8553600]. Default value: 256. Determine the size of trackable esr(config)# ip firewall sessions <COUNT> ...
Page 393
ESR-Series. User manual Step Description Command Keys Enable application-level session esr(config)# ip firewall sessions <PROTOCOL> - application- tracking for certain protocols (optional). tracking level protocol [ftp, h323, pptp, netbios-ns, tftp] sessions of which should be tracked. <OBJECT-GROUP-SERVICE> – sip session TCP/UDP ports’ profile name, set by the string of up to 31 characters.
Page 394
ESR-Series. User manual Step Description Command Keys esr(config-object-group-network)# <FROM-ADDR> – range starting ip address-range IP address; <FROM-ADDR>-<TO-ADDR> <TO-ADDR> – range ending IP address, optional parameter; If the parameter is not specified, a single IP address is set by the command. The addresses are defined as AAA.BBB.CCC.DDD where each part takes values of [0..255].
Page 395
ESR-Series. User manual Step Description Command Keys Create applications lists which will be esr(config)# object-group <NAME> – application profile used in DPI mechanism. application <NAME> name, set by the string of up to 31 characters. Specify applications list description esr(config-object-group- <description>...
Page 396
ESR-Series. User manual Step Description Command Keys Set name or number of IP for which the esr(config-zone-rule)# match [not] <protocol-type> – protocol rule should work (optional). protocol <protocol-type> type, takes the following values: esp, icmp, ah, eigrp, ospf, igmp, ipip, tcp, pim, udp, vrrp, rdp, l2tp, gre.
ESR-Series. User manual Step Description Command Keys Set the limitation under which the rule esr(config-zone-rule)# match [not] will only work for traffic modified by the destination-nat IP address and destination ports translation service. Set the maximum packet rate (optional, esr(config-zone-pair-rule)# rate- <rate-pps>...
Page 398
ESR-Series. User manual Solution: Create a security zone for each ESR network: esr# configure esr(config)# security zone LAN esr(config-zone)# exit esr(config)# security zone WAN esr(config-zone)# exit Configure network interfaces and identify their inherence to security zones: esr(config)# interface gi1/0/2 esr(config-if-gi)# ip address 192.168.12.2/24 esr(config-if-gi)# security-zone LAN esr(config-if-gi)# exit...
Page 399
ESR-Series. User manual For definition of rules for security zones, create 'LAN' address profile that includes addresses which are allowed to access WAN network and 'WAN' network address profile. esr(config)# object-group network WAN esr(config-object-group-network)# ip address-range 192.168.23.2 esr(config-object-group-network)# exit esr(config)# object-group network LAN esr(config-object-group-network)# ip address-range 192.168.12.2 esr(config-object-group-network)# exit...
ESR-Series. User manual Router always has a security zone named 'self'. When the traffic recipient is the router itself, i.e. traffic is not transit, pass 'self' zone as a parameter. Create a pair of zones for traffic coming from 'WAN' zone into 'self' zone.
Page 401
ESR-Series. User manual Objective: Block access to such resources as youtube, bittorrent and facebook. Solution: Create a security zone for each ESR network: esr# configure esr(config)# security zone LAN esr(config-zone)# exit esr(config)# security zone WAN esr(config-zone)# exit Configure network interfaces and identify their inherence to security zones: esr(config)# interface gi1/0/1...
ESR-Series. User manual To set the rules of traffic passing from “WAN” zone to “LAN” zone, create a couple of zones and add a rule prohibiting the application traffic from passing and a rule allowing the rest of traffic to pass. Rules are applied with the enable command: esr(config)# security zone-pair WAN LAN esr(config-zone-pair)# rule...
ESR-Series. User manual 13.5.1 Configuration algorithm Step Description Command Keys Create access control list and switch to esr(config)# ip access-list <NAME> – access control list its configuration mode. extended <NAME> name, set by the string of up to 31 characters. Specify the description of a esr(config-acl)# description <DESCRIPTION>...
Page 404
ESR-Series. User manual Step Description Command Keys Set sender IP addresses for which the esr(config-acl-rule)# match <ADDR> – sender IP address, rule should work (optional). source-address { <ADDR> <MASK> defined as AAA.BBB.CCC.DDD | any } where each part takes values of [0..255];...
ESR-Series. User manual Step Description Command Keys Set VLAN ID for which the rule should esr(config-acl-rule)# match vlan <VID> – VLAN ID, takes values work (optional). <VID> of [1..4094]. Activate a rule. esr(config-acl-rule)# enable Specify access control list for the esr(config-if-gi)# service-acl input <NAME>...
ESR-Series. User manual By default, ESR devices have a basic set of rules from EmergingThreats designed for testing and verifying system health. 13.6.1 Base configuration algorithm Step Description Command Keys Create IPS/IDS security policy. esr(config)# security ips policy <NAME> – security policy <NAME>...
ESR-Series. User manual 13.6.2 Configuration algorithm for IPS/IDS rules autoupdate from external sources Step Description Command Keys Switch to the autoupdate configuration esr(config-ips)# auto-upgrade mode Specify a name and enter the esr(config-ips-auto-upgrade)# <WORD> – server name, set by configuration mode of the user update user-server <WORD>...
Page 408
ESR-Series. User manual https:// These rules describe well-known botnets and control servers. Sources: rules.emergingthreats.net/ Shadowserver.org, Zeus Tracker, Palevo Tracker, Feodo Tracker, Ransomware open/suricata/rules/ Tracker. botcc.rules https:// These rules describe malicious hosts by the classification of the www.cinsarmy.com rules.emergingthreats.net/ project. open/suricata/rules/ ciarmy.rules https:// These rules describe well-known compromised and malicious hosts.
Page 409
ESR-Series. User manual https:// These rules contain DOS attack signatures. rules.emergingthreats.net/ open/suricata/rules/emerging- dos.rules https:// These rules contain exploit signatures. rules.emergingthreats.net/ open/suricata/rules/emerging- exploit.rules https:// These rules contain signatures of vulnerabilities in the FTP protocol, signs of rules.emergingthreats.net/ incorrect use of the FTP protocol. open/suricata/rules/emerging- ftp.rules https://...
Page 410
ESR-Series. User manual https:// These rules contain different vulnerabilities signatures. rules.emergingthreats.net/ open/suricata/rules/emerging- misc.rules https:// These rules contain malware signatures for mobile platforms. rules.emergingthreats.net/ open/suricata/rules/emerging- mobile_malware.rules https:// These rules contain signatures of vulnerabilities in the NetBIOS protocol, signs of rules.emergingthreats.net/ incorrect use of the NetBIOS protocol. open/suricata/rules/emerging- netbios.rules https://...
Page 411
ESR-Series. User manual https:// These rules contain signatures of vulnerabilities in the SMTP protocol, signs of rules.emergingthreats.net/ incorrect use of the SMTP protocol. open/suricata/rules/emerging- smtp.rules https:// These rules contain vulnerability signatures for SQL DBMS. rules.emergingthreats.net/ open/suricata/rules/emerging- sql.rules https:// These rules contain signatures of vulnerabilities in the telnet protocol, signs of rules.emergingthreats.net/ incorrect use of the telnet protocol.
ESR-Series. User manual https:// These rules describe signs of network worm activity. rules.emergingthreats.net/ open/suricata/rules/emerging- worm.rules 13.6.4 IPS/IDS configuration example with auto-update rules Objective: Organize LAN protection with auto-update rules from open sources. 192.168.1.0/24 – LAN Solution: Create a profile of addresses of LAN which we will protect: esr(config)# object-group network LAN esr(config-object-group-network)# ip prefix 192.168.1.0/24...
Page 413
ESR-Series. User manual Configure the DNS client on the ESR to allow the names of the IPS/IDS rule update sources: esr(config)# domain lookup enable esr(config)# domain name-server 8.8.8.8 Create IPS/IDS security policy: esr(config)# security ips policy OFFICE esr(config-ips-policy)# description "My Policy" esr(config-ips-policy)# protect network-group LAN Allow IPS/IDS operation on the bridge 1 LAN interface: esr(config)# bridge...
ESR-Series. User manual 13.6.5 Basic user rules configuration algorithm Step Description Command Keys Specify a name and enter the esr(config)# security ips-category <WORD> – user rule set name, configuration mode of the set of user user-defined <WORD> set by the string of up to 32 rules.
Page 415
ESR-Series. User manual Step Description Command Keys Set sender IP addresses for which the esr(config-ips-category-rule)# <ADDR> – sender IP address, rule should work. source-address defined as AAA.BBB.CCC.DDD {ip <ADDR> | ip-prefix <ADDR/LEN> where each part takes values of [0..255]; object-group <OBJ_GR_NAME> | policy-object-group <ADDR/LEN>...
Page 416
ESR-Series. User manual Step Description Command Keys Set destination IP addresses for which esr(config-ips-category-rule)# <<ADDR> – recepient IP the rule should trigger. destination-address address, defined as {ip <ADDR> | ip-prefix <ADDR/LEN> AAA.BBB.CCC.DDD where each | object-group <OBJ_GR_NAME> | part takes values of [0..255]; policy-object-group { protect | external } | any } <ADDR/LEN>...
Page 417
ESR-Series. User manual Step Description Command Keys Define the traffic classification which esr(config-ips-category-rule)# • not-suspicious – not will record to the log when this rule will meta classification-type suspicious traffic; trigger (optional). { not-suspicious | unknown | bad- • unknown – unknown unknown | attempted-recon | traffic.
Page 418
ESR-Series. User manual Step Description Command Keys • tcp-connection – TCP connection was detected. • trojan-activity – network Trojan was detected. • unusual-client-port- connection – the client used an unusual port. • network-scan – network scan was detected. • denial-of-service – denial of service attack was detected.
Page 419
ESR-Series. User manual Step Description Command Keys Set number of IP for which the rule esr(config-ips-category-rule)# ip <ID> – IP identification number, should work (optional). protocol-id <ID> takes values of [1..255]. Applicable only for protocol any value. Set ICMP CODE value for which the rule esr(config-ips-category-rule)# ip <CODE>...
Page 420
ESR-Series. User manual Step Description Command Keys Set TCP Window-Size value for which esr(config-ips-category-rule)# ip <SIZE> – TCP Window-Size the rule should trigger (optional). tcp window-size <SIZE> value, takes a value in the range [0..65535]. Applicable only for protocol tcp value. Set HTTP protocol keywords for which esr(config-ips-category-rule)# ip See the Suricata 4.X...
Page 421
ESR-Series. User manual Step Description Command Keys Set the number of offset bytes from the esr(config-ips-category-rule)# <OFFSET> – the number of beginning of the contents of the packet payload offset <OFFSET> offset bytes from the beginning to check (optional). of the packet contents, takes a value in the range [1 ..
ESR-Series. User manual Step Description Command Keys Specify threshold handling method. esr(config-ips-category-rule)# • threshold – display a threshold type message every time a {threshold | limit | both } threshold is reached. • limit – issue a message no more than <COUNT> times per time interval <SECOND>.
Page 423
ESR-Series. User manual Specify protocol type for the rule: esr(config-ips-category-rule)# protocol icmp Since we specified the icmp protocol, we need to specify any as the port of the sender and recipient: esr(config-ips-category-rule)# source-port any esr(config-ips-category-rule)# destination-port any We will indicate our server as the recipient address: esr(config-ips-category-rule)# destination-address ip 192.168.1.10 Attacker can send packets from any address:...
ESR-Series. User manual Set traffic direction: esr(config-ips-category-rule)# direction one-way The rule will trigger on packets larger than 1024 bytes: esr(config-ips-category-rule)# payload data-size 1024 esr(config-ips-category-rule)# payload data-size comparison-operator greate r-than The rule will trigger if the load on the server exceeds 3 Mbps, while an attack message will be generated not more than once a minute: Mbps = 3145728...
ESR-Series. User manual Description Command Keys Specify the given rule force. esr(config-ips-category-rule- <CONTENT> – text message in SNORT 2.X/ advanced)# rule-text <LINE> Suricata 4.X format, specified by a string of up to 1024 characters. When writing rules, the symbol '' needs to be replaced with the symbol ' Activate a rule.
ESR-Series. User manual 13.7 Eltex Distribution Manager interaction configuration EDM (Eltex Distribution Manager) is a service for distributing licensed content to devices via commercial subscription. Using Kaspersky Lab's security infrastructure, including the Kaspersky Security Network cloud-based "collective intelligence" with Kaspersky SafeStream II support, the ESR service router is able to detect malware in all types of traffic (web, email, P2P, instant messaging services, etc.).
Page 427
ESR-Series. User manual Step Description Command Keys Set the port to esr (config-content-provider)# host <PORT> – number of sender TCP/UDP port, connect to the edm port <PORT> takes values of [1..65535]. server. Set the type and esr (config-content-provider)# storage- <DEVICE> – label and partition name on the partition of the device <DEVICE>...
Page 428
ESR-Series. User manual Step Description Command Keys Connect the desired esr (config-ips-vendor)# category Phishing URL Data Feed – Phishing URL category. WORD(1-64) data streams Malicious URL Data Feed – Malicious URL data streams Botnet C&C URL Data Feed – Botnet C&C URL data streams Malicious Hash Data Feed –...
Enable IPS/IDS. esr(config- ips )# enable 13.7.2 Configuration example: Set the content-provider parameters – this is the address of the Eltex server. There must be network reachability between the content-provider server and the router. content-provider host address edm.eltex-co.ru host port...
ESR-Series. User manual show security ips content-provider: esr-20# show security ips content-provider Server: content-provider Last MD5 of received files: c60bd0f10716d3f48e18f24828337135 Next update: October 2020 00:37:06 With this command you can find out if the content provider has downloaded rules from the EDM server (based on the presence of the md5 checksum) and when the next update is scheduled for the device.
Page 433
ESR-Series. User manual Step Description Command Keys Create IP addresses lists which will be esr (config)# object-group network <WORD> – server name, set by used during filtration. <WORD> the string of up to 32 characters. esr (config-object-group- network)# ip prefix <ADDR/LEN> <ADDR/LEN>...
Page 434
ESR-Series. User manual Step Description Command Keys Use all ESR rosiurces for IPS/IDS esr(config-ips)# perfomance max By default, half of the available (optional). processor cores are allocated for IPS/IDS. Set external drive for recording logs in esr(config-ips)# logging storage- <DEVICE_NAME> the name of EVE format (optional).
Page 435
ESR-Series. User manual Step Description Command Keys Set the IP protocol to HTTP. esr(config-ips-category-rule)# protocol http Set sender IP addresses for which the esr(config-ips-category-rule)# <ADDR> – sender IP address, rule should work. source-address defined as AAA.BBB.CCC.DDD {ip <ADDR> | ip-prefix <ADDR/LEN> where each part takes values of | ...
Page 436
ESR-Series. User manual Step Description Command Keys Set destination IP addresses for which esr(config-ips-category-rule)# <<ADDR> – recepient IP the rule should trigger. destination-address address, defined as {ip <ADDR> | ip-prefix <ADDR/LEN> AAA.BBB.CCC.DDD where each | object-group <OBJ_GR_NAME> | part takes values of [0..255]; policy-object-group { protect | external } | any } <ADDR/LEN>...
ESR-Series. User manual Step Description Command Keys Assign a content filter category profile esr(config-ips-category-rule)# ip <NAME> – name of the content http content-filter <NAME> filtering profile, specified as a string of up to 31 characters. any – rule will trigger for http sites of any category.
Page 438
ESR-Series. User manual Configure the DNS client on the ESR to allow the names of the IPS/IDS rule update sources: esr(config)# domain lookup enable esr(config)# domain name-server 8.8.8.8 Create IPS/IDS security policy: esr(config)# security ips policy OFFICE esr(config-ips-policy)# description "My Policy" esr(config-ips-policy)# protect network-group LAN Allow IPS/IDS operation on the bridge gigabitethernet 1/0/2 interface: esr(config)#...
Page 439
ESR-Series. User manual We will drop packets: esr(config-ips-category-rule)# action drop Configure attack message: esr(config-ips-category-rule)# meta log-message «Corporate policy violation» Specify protocol type for the rule: esr(config-ips-category-rule)# protocol http For http requests, the operating system uses a random value as the TCP sender port, so you must specify any: esr(config-ips-category-rule)# source-port any As the TCP destination port for the protocol http is usually used port 80, but Internet sites can also work on non-standard ports, so we specify any:...
ESR-Series. User manual 13.9 "Antispam" service configuration Mail antispam or spam filter is a program for detecting and filtering unwanted e-mail messages that can come through corporate mail servers and public e-mail services (spam, mail phishing, etc.). The main task of the "Anti-spam" service is to detect such unwanted emails while they are still being delivered to the recipient's mailbox.
Page 441
ESR-Series. User manual Step Description Command Keys Set the marking type for e-mails that the esr(config-antispam-profile)# <MARK-TYPE> – the marking "Antispam" service classifies as mark-type <MARK-TYPE> type of an email categorized as "Spam". "Spam". Possible values: • header – add the X-Spam header to email headers;...
Page 442
ESR-Series. User manual Step Description Command Keys Set the description of the email domain esr(config-mailserver-domain)# <DESCRIPTION> – up to 255 (optional). description <DESCRIPTION> characters. Set the name of the email domain to be esr(config-mailserver-domain)# <NAME> - up to 63 characters. served. mail domain <NAME>...
Solution: Ensure that the MX record for the domain eltex-co.ru points to the ESR IP address: esr@eltex:~$ dig +noall +answer eltex-co.ru MX eltex-co.ru. 3548 mail-gate.eltex-co.ru. esr@eltex:~$ dig +noall +answer mail-gate.eltex-co.ru A mail-gate.eltex-co.ru. 3453...
Page 444
Create a mail domain, which will be configured to process emails for the eltex-co.ru domain and retransmit such emails to the local mail server. Add the "Antispam" service profile created above to the configuration of...
ESR-Series. User manual 14 Redundancy management • VRRP configuration • Configuration algorithm • Configuration example 1 • Configuration example 2 • VRRP tracking configuration • Configuration algorithm • Configuration example 14.1 VRRP configuration VRRP ( Virtual Router Redundancy Protocol) is a network protocol designed for increased availability of routers, acting as a default gateway.
Page 446
ESR-Series. User manual Step Description Command Keys esr(config-if-gi)# ipv6 vrrp ip <IPV6-ADDR> – virtual IPv6 <IPV6-ADDR> address, defined as X:X:X:X::X where each part takes values in hexadecimal format [0..FFFF]. You can specify up to 8 IPv6 addresses separated by commas. Set the VRRP router identifier.
Page 447
ESR-Series. User manual Step Description Command Keys Set the amount of GratuituousARP esr(config-if-gi)# vrrp timers garp <COUNT> – amount of messages that will be sent when repeat <COUNT> messages, takes values of switching the router to the Master [1..60]. status (optionally). Default value: 5.
ESR-Series. User manual Step Description Command Keys Specify VRRP version (optionally). esr(config-if-gi)# vrrp version <VERSION> – VRRP version: 2, <VERSION> Set the mode when vrrp IP address esr(config-if-gi)# vrrp force-up remains in the UP status regardless of the status of the interface itself. (optionally) Specify the delay between the esr(config-if-gi)# ipv6 vrrp timers...
ESR-Series. User manual Solution: First, do the following: • create a correspond sub interface; • configure a zone for the sub-interface; • specify IP address for the sub-interface. Main configuration step: Configure R1 router. Configure VRRP in the created sub-interface. Specify unique VRRP identifier: R1(config)#interface 1/0/5.50 R1(config-subif)# vrrp id...
Page 450
ESR-Series. User manual Solution: First, do the following: • create correspond sub interfaces; • configure a zone for the sub-interfaces; • specify IP addresses for the sub-interfaces. Main configuration step: Configure R1 router. Configure VRRP for 192.168.1.0/24 subnet in the created sub-interface. Specify unique VRRP identifier: R1(config-sub)#interface 1/0/5.50...
ESR-Series. User manual Enable VRRP: R1(config-subif)# vrrp R1(config-subif)# exit Configure VRRP for 192.168.20.0/24 subnet in the created sub-interface. Specify unique VRRP identifier: R1(config-sub)#interface 1/0/6.60 R1(config-subif)# vrrp id Specify virtual gateway IP address 192.168.1.20: R1(config-subif)# vrrp ip 192.168.20.1 Specify VRRP group identifier: R1(config-subif)# vrrp group Enable VRRP: R1(config-subif)# vrrp...
Page 453
ESR-Series. User manual Step Description Command Keys Create a static IP route to the specified esr(config)# ip route [ vrf <VRF> ] <VRF> – VRF name, set by the subnet indicating the Tracking object. <SUBNET> { <NEXTHOP> [ resolve ] string of up to 31 characters.
Page 454
ESR-Series. User manual Step Description Command Keys • unreachable – when specifying the command, the packets to this subnet will be removed by the device, a sender will receive in response ICMP Destination unreachable (Host unreachable, code 1); • prohibit – when specifying the command, the packets to this subnet will be removed...
ESR-Series. User manual 14.2.2 Configuration example Objective: Virtual gateway 192.168.0.1/24 is organized for 192.168.0.0/24 subnet, using VRRP protocol and routers R1 and R2. There is a link with a singular subnet 192.168.1.0/30 between R1 and R2 routers. Subnet 10.0.1.0/24 is terminated only on R2 router.
Page 456
ESR-Series. User manual 2 R2 router hostname R2 interface gigabitethernet 1/0/1 switchport forbidden default-vlan exit interface gigabitethernet 1/0/1.741 ip firewall disable ip address 192.168.0.3/24 vrrp id vrrp ip 192.168.0.1/24 vrrp exit interface gigabitethernet 1/0/2 switchport forbidden default-vlan exit interface gigabitethernet 1/0/2.742 ip firewall disable ip address...
ESR-Series. User manual 15 Remote access configuration • Configuring server for remote access to corporate network via PPTP protocol • Configuration algorithm • Configuration example • Configuring server for remote access to corporate network via L2TP protocol • Configuration algorithm •...
Page 458
ESR-Series. User manual Specify IP address that should be esr(config-pptp-server)# outside- <OBJ-GROUP-NETWORK- proceeded by PPTP server. address NAME> – name of the profile { object-group <OBJ-GROUP- having IP address that should NETWORK-NAME> | listened by PPTP server, set by ip-address <ADDR> | interface the string of up to 31 { <IF>...
Page 459
ESR-Series. User manual Select PPTP clients authentication esr(config-pptp-server)# • local – user mode. authentication mode authentication by local { local | radius } base. • radius – user authentication by RADIUS server base. The router must be configured to interact with a RADIUS-server, see section AAA RADIUS...
ESR-Series. User manual Define the list of DNS servers that will esr(config-pptp-server)# dns- <OBJ-GROUP-NETWORK- be used by remote users (optionally). servers NAME> – name of the IP object-group <OBJ-GROUP- addresses profile that includes NETWORK -NAME > required DNS servers addresses, set by the string of up to 31 characters.
Page 461
ESR-Series. User manual Solution: Create an address profile that contains an address to be listened by the server: esr# configure esr(config)# object-group network pptp_outside esr(config-object-group-network)# ip address-range 120.11.5.1 esr(config-object-group-network)# exit Create address profile that contains local gateway address: esr(config)# object-group network pptp_local esr(config-object-group-network)# ip address-range 10.10.10.1 esr(config-object-group-network)# exit...
ESR-Series. User manual Enable PPTP server: esr(config-pptp)# enable When a new configuration is applied, the router will listen to 120.11.5.1:1723. To view PPTP server session status, use the following command: esr# show remote-access status pptp server remote-workers To view PPTP server session counters, use the following command: esr# show remote-access counters pptp server remote-workers To clear PPTP server session counters, use the following command: esr# clear remote-access counters pptp server remote-workers...
Page 463
ESR-Series. User manual Step Description Command Keys Specify the description of the esr(config-l2tp-server)# <DESCRIPTION> – L2TP server configured server (optionally). description <DESCRIPTION> description, set by the string of up to 255 characters. Specify IP address that should be esr(config-l2tp-server)# outside- <OBJ-GROUP-NETWORK- listened by L2TP server.
Page 464
ESR-Series. User manual Step Description Command Keys Select L2TP clients authentication esr(config-l2tp-server)# • local – user mode. authentication mode authentication by local { local | radius } base. • radius – user authentication by RADIUS server base. The router must be configured to interact with a RADIUS-server, see section...
Page 465
ESR-Series. User manual Step Description Command Keys Specify a shared secret authentication esr(config-l2tp-server)# ipsec <TEXT> – string [1..64] ASCII key that should be the same for both authentication pre-shared-key characters; parties of the tunnel. { ascii-text { <TEXT> | encrypted <ENCRYPTED-TEXT>...
ESR-Series. User manual 15.2.2 Configuration example Objective: Configure L2TP server on a router for remote user connection to LAN. Authentication is performed on RADIUS server. • L2TP server address: 120.11.5.1; • Gateway inside the tunnel: 10.10.10.1; • Radius server address: 192.168.1.4; For IPsec, key authentication method is used: key–'password’.
Page 467
ESR-Series. User manual Create address profile that contains local gateway address: esr(config)# object-group network l2tp_local esr(config-object-group-network)# ip address-range 10.10.10.1 esr(config-object-group-network)# exit Create address profile that contains DNS servers: esr(config)# object-group network pptp_dns esr(config-object-group-network)# ip address-range 8.8.8.8 esr(config-object-group-network)# ip address-range 8.8.4.4 esr(config-object-group-network)# exit Create L2TP server and map profiles listed above: esr(config)# remote-access l2tp remote-workers...
ESR-Series. User manual To clear L2TP server session counters, use the following command: esr# clear remote-access counters l2tp server remote-workers To end L2TP server session for user 'fedor', use one of the following commands: esr# clear remote-access session l2tp username fedor esr# clear remote-access session l2tp server remote-workers username fedor To view L2TP server configuration, use the following command: esr# show remote-access configuration l2tp remote-workers...
Page 469
ESR-Series. User manual Step Description Command Keys Define type of connection with a private esr(config-openvpn-server)# <TYPE> – encapsulation network via OpenVPN server. tunnel <TYPE> protocol, takes the following values: • ip – point-to-point connection; • ethernet – L2 domain connection. Specify IP addresses list from which esr(config-openvpn-server)# <FROM-ADDR>...
Page 470
ESR-Series. User manual Step Description Command Keys Define the additional parameters for a esr(config-openvpn-server)# <NAME> – user name, set by specified OpenVPN server user (when username < NAME > the string of up to 31 using a local base for user characters.
Page 471
ESR-Series. User manual Step Description Command Keys Enable the advertising of specified esr(config-openvpn-server)# route <ADDR/LEN> – subnet address, subnets, the gateway is OpenVPN <ADDR/LEN> set in the following format: server IP address (optionally). AAA.BBB.CCC.DDD/EE – network IP address with prefix mask, where AAA-DDD take values of [0..255] and EE takes values of [1..32].
Page 473
ESR-Series. User manual • Specify IP address for te1/0/1 interface Import certificates and keys via tftp: esr# copy tftp://192.168.16.10:/ca.crt certificate:ca/ca.crt esr# copy tftp://192.168.16.10:/dh.pem certificate:dh/dh.pem esr# copy tftp://192.168.16.10:/server.key certificate:server-key/server.key esr# copy tftp://192.168.16.10:/server.crt certificate:server-crt/server.crt esr# copy tftp://192.168.16.10:/ta.key certificate:ta/ta.key Create OpenVPN server and a subnet for its operation: esr(config)# remote-access openvpn AP esr(config-openvpn)# network 10.10.100.0/24...
ESR-Series. User manual esr# show remote-access status openvpn server AP To view OpenVPN server session counters, use the following command: esr# show remote-access counters openvpn server AP To clear OpenVPN server session counters, use the following command: esr# clear remote-access counters openvpn server AP To end OpenVPN server session for user 'fedor', use one of the following commands: esr# clear remote-access session openvpn username fedor esr# clear remote-access session openvpn server AP username fedor...
Page 475
ESR-Series. User manual Step Description Command Keys Specify the interface through which the esr(config-pppoe)# interface <IF> <IF> – interface or interface PPPoE connection will be established. group. Specify user name and password for esr(config-pppoe)# username <NAME> – user name, set by connection to PPPoE server.
ESR-Series. User manual Step Description Command Keys Specify MTU size esr(config-pppoe)# mtu <MTU> <MTU> – MTU value, takes (MaximumTransmissionUnit) for values in the range of: PPPoE tunnel. MTU above 1500 will be active only • for ESR-10/12V(F)/14VF when using the 'system jumbo-frames' –...
Page 477
ESR-Series. User manual • Accounts for connection – tester; • Account passwords – password; • The connection should be established from the gigabitethernet 1/0/7 interface. Solution: Pre-configure PPPoE server with the accounts. Enter the PPPoE client configuration mode and disable the firewall: esr# configure esr(config)# tunnel pppoe esr(config-pppoe)# ip firewall disable...
ESR-Series. User manual Specify the interface through which the PPPoE connection will be established: esr(config-pppoe)# interface gigabitethernet 1/0/7 esr(config- pppoe)# enable To view the tunnel status, use the following command: esr# show tunnels configuration pppoe To view PPPoE client session counters, use the following command: esr# show tunnels counters pppoe 15.5 Configuring remote access client via PPTP PPTP ( Point-to-Point Tunneling Protocol) is a point-to-point tunneling protocol that allows establishing secure...
Page 479
ESR-Series. User manual Step Description Command Keys Specify MTU size esr(config-pptp)# mtu <MTU> <MTU> – MTU value, takes (MaximumTransmissionUnit) for the values in the range of: tunnel (optionally). • for ESR-10/12V(F)/14VF – [552..9600]; • for ESR-20/21 – [552..9500]; • ESR-100/200/1000/1200 /1500/1511/1700 –...
ESR-Series. User manual Step Description Command Keys Enable recording of the current tunnel esr(config-pptp)# history statistics usage statistics (optional). Change the time interval in seconds esr(config-pptp)# ppp timeout <TIME> – time in seconds, after which the router sends a keepalive keepalive <TIME >...
ESR-Series. User manual Solution: Create PPTP tunnel: esr(config)# tunnel pptp Specify the account (Ivan user) to connect to the server: esr(config-pptp)# username ivan password ascii-text simplepass Specify the remote gateway: esr(config-pptp)# remote address 20.20.0.1 Specify a security zone: esr(config-pptp)# security-zone VPN Enable PPTP tunnel: esr(config-pptp)# enable To view the tunnel status, use the following command:...
ESR-Series. User manual 15.6.1 Configuration algorithm Step Description Command Keys Create a L2TP tunnel and switch to its esr(config)# tunnel l2tp <INDEX> <INDEX> – tunnel identifier, set configuration mode. in the range of: [1..10]. Specify VRF instance, in which the given esr(config-l2tp)# ip vrf forwarding <VRF>...
Page 483
ESR-Series. User manual Step Description Command Keys Specify a shared secret authentication esr(config-l2tp)# ipsec <TEXT> – string [1..64] ASCII key that should be the same for both authentication pre-shared-key characters; parties of the tunnel. { ascii-text { <TEXT> | encrypted <ENCRYPTED-TEXT>...
ESR-Series. User manual Step Description Command Keys Change the time interval in seconds esr(config-l2tp)# ppp timeout <TIME> – time in seconds, after which the router sends a keepalive keepalive <TIME > takes values of [1..32767]. message (optional). Default value: 10 Change the number of failed data-link esr(config-l2tp)# ppp failure-count <NUM>...
Page 485
ESR-Series. User manual Specify the remote gateway: esr(config-l2tp)# remote address 20.20.0.1 Specify a security zone: esr(config-l2tp)# security-zone VPN Specify IPsec authentication method: esr(config-l2tp)# ipsec authentication method pre-shared-key Specify IPsec security key: esr(config-l2tp)# ipsec authentication pre-shared-key ascii-text password Enable L2TP tunnel: esr(config-l2tp)# enable To view the tunnel status, use the following command: esr# show tunnels status l2tp...
ESR-Series. User manual 16 Service management • DHCP server configuration • Configuration algorithm • Configuration example • Destination NAT configuration • Configuration algorithm • Destination NAT configuration example • Source NAT configuration • Configuration algorithm • Configuration example 1 • Configuration example 2 •...
Page 487
ESR-Series. User manual Step Description Command Keys Create pool of DHCP server IPv4/IPv6 esr(config)# ip dhcp-server pool <NAME> – IPv4/IPv6 server addresses and switch to its <NAME> [vrf <VRF>] profile name, set by the string configuration mode. of up to 31 characters. esr(config)# ipv6 dhcp-server pool <VRF>...
Page 488
ESR-Series. User manual Step Description Command Keys Add IPv4/IPv6 address for a specific esr(config-dhcp-server)# address <ADDR> – client IP address, physical address to the address pool of <ADDR> defined as AAA.BBB.CCC.DDD configurable DHCP server (optionally). {mac-address <MAC> | client- where each part takes values of identifier <CI>} [0..255];...
Page 489
ESR-Series. User manual Step Description Command Keys Specify DNS server IPv4/IPv6 esr(config-dhcp-server)# dns- <ADDR> – DNS server IP addresses list. The list is transmitted to server <ADDR> address, defined as clients as part of DHCP option 6 AAA.BBB.CCC.DDD where each (optionally).
ESR-Series. User manual Step Description Command Keys Specify specific supplier information esr(config-dhcp-vendor-id)# <HEX> – vendor-specific (DHCP Option 43). vendor-specific-options <HEX> information, specified in hexadecimal format up to 128 symbols. esr(config-ipv6-dhcp-vendor-id)# vendor-specific-options <HEX> Specify NetBIOS server IP address esr(config-dhcp-server)# netbios- <ADDR> – NetBIOS server IP (DHCP option 44) (optionally).
Page 491
ESR-Series. User manual • default route: 192.168.1.1; • domain name: eltex.loc; • DNS server list: DNS1: 172.16.0.1, DNS2: 8.8.8.8. esr(config-dhcp-server)# domain-name "eltex.loc" esr(config-dhcp-server)# default-router 192.168.1.1 esr(config-dhcp-server)# dns-server 172.16.0.1,8.8.8.8 esr(config-dhcp-server)# exit To enable IP address distribution from the configurable pool by DHCP server, IP interface should be created on the router that belongs to the same subnet as the pool addresses.
ESR-Series. User manual To enable DHCP message transmission to the server, you should create the respective port profiles including source port 68 and destination port 67 used by DHCP and create the allowing rule in the security policy for UDP packet transmission: esr(config)# object-group service dhcp_server esr(config-object-group-service)# port-range...
ESR-Series. User manual 16.2.1 Configuration algorithm Step Description Command Keys Switch to the configuration mode of esr(config)# nat destination destination address translation service. Create a pool of IP addresses and/or esr(config-dnat)# pool <NAME> <NAME> – NAT addresses pool TCP/UDP ports with a specific name name, set by the string of up to (optionally).
Page 494
ESR-Series. User manual Step Description Command Keys Specify the profile of services (tcp/udp esr(config-dnat-rule)# match [not] <PORT-SET-NAME> – port ports) {sender | recipient} for which the {source|destination}-port <PORT- profile name, set by the string rule should work (optionally). SET-NAME> of up to 31 characters. “Any” value points at any source TCP/UDP port.
ESR-Series. User manual 16.2.2 Destination NAT configuration example Objective: Establish access from the public network, that belongs to the 'UNTRUST' zone, to LAN server in 'TRUST' zone. Server address in LAN – 10.1.1.100. Server should be accessible from outside the network–address 1.2.3.4, access port 80.
Page 496
ESR-Series. User manual Solution: Create 'UNTRUST' and 'TRUST' security zones. Specify the inherence of the network interfaces being used to zones. Assign IP ‑addresses to interfaces simultaneously. esr# configure esr(config)# security zone UNTRUST esr(config-zone)# exit esr(config)# security zone TRUST esr(config-zone)# exit esr(config)# interface gigabitethernet...
ESR-Series. User manual esr(config-dnat)# ruleset DNAT esr(config-dnat-ruleset)# from zone UNTRUST esr(config-dnat-ruleset)# rule esr(config-dnat-rule)# match destination-address NET_UPLINK esr(config-dnat-rule)# match protocol tcp esr(config-dnat-rule)# match destination-port SRV_HTTP esr(config-dnat-rule)# action destination-nat pool SERVER_POOL esr(config-dnat-rule)# enable esr(config-dnat-rule)# exit esr(config-dnat-ruleset)# exit esr(config-dnat)# exit To transfer the traffic coming from 'UNTRUST' zone into 'TRUST' zone, create the respective pair of zones. Only DNAT-translated traffic with the destination address matching the 'SERVER_IP' specified in the profile should be transferred.
Page 498
ESR-Series. User manual Step Description Command Keys Create a pool of IP addresses and/or esr(config-snat)# pool <NAME> <NAME> – NAT addresses pool TCP/UDP ports with a specific name name, set by the string of up to (optionally). 31 characters. Set the range of IP addresses which will esr(config-snat-pool)# ip address- <IP>...
Page 499
ESR-Series. User manual Step Description Command Keys Set the rule group scope. The rules will esr(config-snat-ruleset)# to { zone <NAME> – isolation zone be applied only to traffic coming to a <NAME> | name; certain zone or interface. interface <IF> tunnel <TUN> | | default } <IF>...
ESR-Series. User manual Step Description Command Keys Specify the action “translation of esr(config-snat-rule)# action off – translation is disabled; source address and port” for the traffic source-nat { off | meeting the requirements of “match” pool <NAME> | netmap <ADDR/ pool<NAME>...
Page 501
ESR-Series. User manual Solution: Begin configuration with creation of security zones, configuration of network interfaces and their inherence to security zones. Create 'TRUST' zone for LAN and 'UNTRUST' zone for public network. esr# configure esr(config)# security zone UNTRUST esr(config-zone)# exit esr(config)# security zone TRUST esr(config-zone)# exit esr(config)#...
Page 502
ESR-Series. User manual To transfer traffic from 'TRUST' zone into 'UNTRUST' zone, create a pair of zones and add rules allowing traffic transfer in this direction. Additionally, there is a check in place to ensure that data source address belongs to 'LOCAL_NET' address range in order to limit the access to public network.
ESR-Series. User manual 16.3.3 Configuration example 2 Objective: Configure access for users in LAN 21.12.2.0/24 to public network using Source NAT function without the firewall. Public network address range for SNAT 200.10.0.100-200.10.0.249. Solution: Begin configuration with network interface configuration and disabling the firewall: esr(config)# interface gigabitethernet...
ESR-Series. User manual esr(config-snat)# ruleset SNAT esr(config-snat-ruleset)# to interface te1/0/1 esr(config-snat-ruleset)# rule esr(config-snat-rule)# match source-address LOCAL_NET esr(config-snat-rule)# action source-nat pool TRANSLATE_ADDRESS esr(config-snat-rule)# enable esr(config-snat-rule)# exit esr(config-snat-ruleset)# exit In order the router could response to the ARP requests for addresses from the public pool, you should launch ARP Proxy service.
Page 505
ESR-Series. User manual Solution: Begin configuration with network interface configuration and disabling the firewall: esr(config)# interface gigabitethernet 1/0/1 esr(config-if-gi)# ip address 21.12.2.1/24 esr(config-if-gi)# ip firewall disable esr(config-if-gi)# exit esr(config)# interface tengigabitethernet 1/0/1 esr(config-if-te)# ip address 200.10.0.1/24 esr(config-if-te)# ip firewall disable esr(config-if-te)# exit For Static NAT configuration, create 'LOCAL_NET' LAN address profile, that includes local subnet, and 'PUBLIC_POOL' public network address profile.
ESR-Series. User manual Configure Static NAT service in SNAT configuration mode. In the set attributes, specify that the rules are applying only to packets transferred to public network through te1/0/1 port. The rules include data source address test for belonging to “LOCAL_NET” pool and destination addresses test for belonging to “PUBLIC_POOL”...
Page 507
ESR-Series. User manual Step Description Command Keys Create proxy profile. esr(config)# ip http profile <NAME> – profile name. <NAME> Choose default action. esr(config-profile)# default action <URL> – address of the host to {deny|permit|redirect} which requests will be sent. [redirect-url <URL>] Specify description (optionally).
Page 508
ESR-Series. User manual Step Description Command Keys Add necessary services (tcp/udp ports) esr(config-object-group-service)# ESR proxy server uses for its to the list. port-range 3128-3135 operation the ports starting from the base port defined in step 10 The http proxy uses ports from base port to base port + the number of cpu of this ESR model - 1...
ESR-Series. User manual If the Firewall function on the ESR is not forcibly disabled, you must create an allow rule for the Self zone. 16.5.2 HTTP proxy configuration example Objective: Organize URL filtering for a number of addresses using a proxy. Solution: Create a set of URLs to filter by.
ESR-Series. User manual Create a profile: esr(config)# ip http profile list1 esr(config-profile)# default action permit esr(config-profile)# urls local test1 action redirect redirect-url http://test.loc esr(config-profile)# exit Enable proxying on the interface by profile 'list1': esr(config)# interface 1/0/1 esr(config-if)# ip http proxy list1 esr(config-if)# ip https proxy list1 If you use Firewall, create permissive rules for it: For example we use the ESR-20 which has 4 CPUs.
Page 511
ESR-Series. User manual Step Description Command Keys Set authentication key (optional). esr(config-ntp)# key <ID> <ID> – key identifier, set in the range of [1..255]. Set the maximum time interval between esr(config-ntp)# maxpoll <INTERVAL> – maximum value of poll sending messages to the NTP server <INTERVAL>...
ESR-Series. User manual Step Description Command Keys Set the DSCP code value for the use in esr(config)# ntp dscp <DSCP> – DSCP code value, takes IP headers of NTP server egress <DSCP> values in the range of [0..63] packets (optionally). Default value: 46 Enable query-only mode that limits esr(config)# ntp object- <NAME>...
Page 513
ESR-Series. User manual First, do the following: • specify security zone for gi1/0/1 interface; • configure the IP address for the gi1/0/1 interface to provide IP connectivity to the NTP server. Example: security zone untrust exit object-group service NTP port-range exit interface...
Page 514
ESR-Series. User manual esr# show ntp peers...
ESR-Series. User manual Step Description Command Keys Set the rate of the statistics sending to esr(config)# netflow refresh-rate <RATE> – rate of the statistics a Netflow collector. <RATE> sending, set in packets/flow, takes the value of [1..10000]. Default value: 10. Enable Netflow on the router.
ESR-Series. User manual 2 Main configuration step: Specify collector IP address: esr(config)# netflow collector 10.10.0.2 Enable netflow statistics export collection for gi1/0/1 network interface: esr(config)# interface gigabitethernet 1/0/1 esr(config-if-gi)# ip netflow export Enable netflow on the router: еsr(config)# netflow enable To view the Netflow statistics, use the following command: esr# show netflow statistics Netflow configuration for traffic accounting between zones is performed by analogy to sFlow configuration;...
ESR-Series. User manual Step Description Command Keys Create the sFlow collector and esr(config)# sflow collector <ADDR> <ADDR> – collector IP address, switch to its configuration mode. defined as AAA.BBB.CCC.DDD where each part takes values of [0..255]. Enable statistics sending to the esr(config-if-gi)# ip sflow export sFlow server in the interface/tunnel/ network bridge configuration mode.
ESR-Series. User manual Enable sFlow protocol statistics export for all traffic within 'rule1' for TRUSTED-UNTRUSTED direction: esr(config)# security zone-pair TRUSTED UNTRUSTED esr(config-zone-pair)# rule esr(config-zone-pair-rule)# action sflow-sample esr(config-zone-pair-rule)# match protocol any esr(config-zone-pair-rule)# match source-address any esr(config-zone-pair-rule)# match destination-address any esr(config-zone-pair-rule)# enable Enable sFlow on the router: еsr(config)# sflow enable SFlow configuration for traffic accounting from the interface is performed by analogy to...
Page 521
ESR-Series. User manual Step Description Command Keys Specify community for the access via esr(config)# snmp-server <COMMUNITY> – community SNMPv2c. community <COMMUNITY> for the access via SNMP; [ <TYPE> ] [ { <IP-ADDR> | <IPV6-ADDR> } ] <TYPE> – access level: [ client-list <OBJ-GROUP- NETWORK-NAME>...
Page 522
ESR-Series. User manual Step Description Command Keys Create SNMPv3 user. esr(config)# snmp-server user <NAME> – user name, set by <NAME> the string of up to 31 characters. Set the value of SNMP value that esr(config)# snmp-server location <LOCATION> – information contains the information on the device <LOCATION>...
Page 523
ESR-Series. User manual Step Description Command Keys Enable filtration and set the profile of IP esr(config-snmp-user)# client-list <NAME> – name of the addresses from which SNMPv3 packets <NAME> previously conscious object- with the given SNMPv3 user name can group, specified in a string of be received.
ESR-Series. User manual Step Description Command Keys Enable SNMP notifications esr(config)# snmp-server host <IP-ADDR> – IP address, transmission to the specified IP { <IP-ADDR> | <IPV6-ADDR> } [vrf defined as AAA.BBB.CCC.DDD address and switch to SNMP <VRF>] where each part takes values of notifications configuration mode.
Page 525
ESR-Series. User manual Solution: First, do the following: • Specify zone for gi1/0/1 interface; • Configure IP address for gi1/0/1 interface. Main configuration step: Enable SNMP server: esr(config)# snmp-server Create SNMPv3 user: esr(config)# snmp-server user admin...
ESR-Series. User manual Specify security mode: esr(snmp-user)# authentication access priv Specify authentication algorithm for SNMPv3 requests: esr(snmp-user)# authentication algorithm md5 Set the password for SNMPv3 request authentication: esr(snmp-user)# authentication key ascii-text 123456789 Specify the transmitted data encryption algorithm: esr(snmp-user)# privacy algorithm aes128 Set password for the transmitted data encryption: esr(snmp-user)# privacy key ascii-text 123456789...
Page 527
ESR-Series. User manual Step Description Command Keys Specify the host name (optionally). esr(config-zabbix)# hostname <WORD> – host name, set by <WORD> the string of up to 255 For active mode, the name must match characters. the host name on the zabbix server. esr(config-zabbix-proxy)# hostname <WORD>...
ESR-Series. User manual Step Description Command Keys Specify the processing time for remote esr(config-zabbix)# timeout <TIME> – timeout, takes value commands (optionally). <TIME> in seconds [1..30]. esr(config-zabbix-proxy)# timeout Default value: 3. It is <TIME> recommended to set the maximum value since some commands may take longer than the default.
ESR-Series. User manual esr(config-zabbix)# timeout esr(config-zabbix)# enable 17.4.3 Zabbix-server configuration example Create the host:...
Page 530
ESR-Series. User manual Create the script (Administration -> Scripts-> Create Script) ESR routers support execution of the following priveleged commands: • Ping: zabbix_get -s {HOST.CONN} 10050 "system.run[ sudo ping -c 3 192.168.32.101]" The client (ESR) that received this command from the server will execute ping command to the specified host (in our example, up to 192.168.32.101) and return the result to the server.
Page 531
ESR-Series. User manual • Fping in VRF zabbix_get -s {HOST.CONN} -p 10050 "system.run[sudo netns-exec -n backup sudo fping 192.168.32.101 ]" • Traceroute zabbix_get -s {HOST.CONN} -p 10050 -k "system.run[ sudo traceroute 192.168.32.101] The client (ESR) that received this command from the server will execute traceroute command to the specified host (in our example, up to 192.168.32.101) and return the result to the server.
ESR-Series. User manual Iperf command execution example: It is also possible to execute commands that do not require privileges, such as: snmpget, cat, pwd, wget and others. Example of the snmpget command execution 17.5 Syslog configuration Syslog (system log) – standard for sending and registering messages about events occurring in the system is used in networks operating over IP.
ESR-Series. User manual 17.5.1 Configuration algorithm Step Description Command Keys Set the level of syslog messages that esr(config)# syslog snmp <SEVERITY> – message will be sent to the snmp server in the <SEVERITY> importance level, takes values form of snmp-trap. (in order of decreasing importance): Set the level of syslog messages that...
Page 534
ESR-Series. User manual Step Description Command Keys Set the maximum number of files saved esr(config)# syslog max-files <NUM> – maximal numberf of during rotation (optionally) <NUM> files , takes values [1 .. 1000] Enable the sending of syslog messages esr(config)#syslog host <HOSTNAME>...
ESR-Series. User manual Step Description Command Keys Enable registration of changes to the esr(config)#logging userinfo user settings (optionally). 17.5.2 Configuration example Objective: Configure message sending for the following system events: • failed user authentication; • changes to the configuration of logging system events; •...
ESR-Series. User manual Set the logging of failed authentication attempts: esr(config)# logging login on-failure Set the logging of syslog configuration changes: esr(config)# logging syslog configuration Set the logging of start/stop of the system process: esr(config)# logging service start-stop Set the logging of changes to the user profile: esr(config)# logging userinfo The configuration changes come into effect after applying the following commands: esr# commit...
ESR-Series. User manual 17.6.2 Configuration example Objective: Check file system integrity: Solution: Launch integrity check esr# verify filesystem Filesystem Successfully Verified 17.7 Router configuration file archiving ESR routers have the option of local and/or remote configuration file copying by timer or when applying the configuration.
ESR-Series. User manual Step Description Command Keys Set a period of time for automatic esr(config-ahchive)# time-period <TIME> – periodicity of configuration backup (optional, relevant <TIME> automatic redundancy of the only for auto mode) configuration, takes the value in minutes [1..35791394]. Default value: 720 minutes Set the maximum number of locally esr(config-ahchive)# count-backup...
Page 539
ESR-Series. User manual Set local and remote configuration backup mode: esr(config)# type both Configure the path for remote configuration backups and the maximum number of local backups: esr(config-archive)# path tftp://172.16.252.77:/esr-example/esr-example.cfg esr(config-archive)# count-backup Set the interval for the configuration backup if there are no changes: esr(config-archive)# time-period 1440 Enable archiving of router configuration by timer and upon successful configuration change:...
ESR-Series. User manual 18 BRAS (Broadband Remote Access Server) management • Configuration algorithm • Example of configuration with SoftWLC • Example of configuration without SoftWLC 18.1 Configuration algorithm Step Description Command Keys Add RADIUS server to the list of used esr(config)# radius-server host <IP-ADDR>...
Page 541
ESR-Series. User manual Step Description Command Keys Set the password for authentication on esr(config-das-server)# key ascii- <TEXT> – string of [8..16] ASCII remote DAS server. text characters; <ENCRYPTED- {<TEXT>|encrypted <ENCRYPTED- TEXT> – encrypted password, TEXT> } [8..16] bytes size, set by the string of [16..32] characters.
Page 542
ESR-Series. User manual Step Description Command Keys Bind the specified QoS class to the esr(config-subscriber-default- <NAME> – name of the class default service. service)# class-map <NAME> being bound, set by the string of up to 31 characters. Specify a name of the URL list that will esr(config-subscriber-default- <LOCAL-NAME>...
Page 543
ESR-Series. User manual Step Description Command Keys Enable session authentication by IP esr(config-subscriber-control)# address (optionally). session ip-authentication Enable transparent transmission of esr(config-subscriber-control)# backup traffic for BRAS (optionally). backup traffic-processing transparent Specify the interval after which esr(config)# subscriber-control <DELAY> – time interval in currently unused URL lists will be unused-filters-remove-delay seconds, takes values of...
ESR-Series. User manual Step Description Command Keys Enable the application control on the esr(config-if-gi)# subscriber- <NAME> – application profile interface (optionally). control application-filter <NAME> name, set by the string of up to 31 characters. Set/clear the upper bound of BRAS esr(config-subscriber-control)# <Threshold>...
Page 545
ESR-Series. User manual Create 3 security zones, according to the network structure: esr# configure esr(config)# security zone trusted esr(config-zone)# exit esr(config)# security zone untrusted esr(config-zone)# exit esr(config)# security zone dmz esr(config-zone)# exit Configure public port parameters and assign its default gateway: esr(config)# interface gigabitethernet...
Page 546
Location parameter (see bridge 2 configuration). The module which is responsible for AAA operations is based on eltex-radius and available by SoftWLC IP address. Numbers of ports for authentication and accounting in the example below are the default values for SoftWLC.
Page 547
ESR-Series. User manual Specify access parameters to the DAS (Direct-attached storage) server: esr(config)# object-group network server esr(config-object-group-network)# ip address-range 192.0.2.20 esr(config-object-group-network)# exit esr(config)# das-server CoA esr(config-das-server)# key ascii-text password esr(config-das-server)# port 3799 esr(config-das-server)# clients object-group server esr(config-das-server)# exit esr(config)# aaa das-profile CoA esr(config-aaa-das-profile)# das-server CoA esr(config-aaa-das-profile)# exit...
Page 548
Specify web resources which are available without authorization: esr(config)# object-group url defaultservice esr(config-object-group-url)# url http://eltex.nsk.ru esr(config-object-group-url)# exit The URL filtering lists are kept on SoftWLC server (you need to change only IP address of SoftWLC server, if addressing is different from the example. Leave the rest of URL without changes): esr(config)# subscriber-control filters-server-url http://192.0.2.20:7070/Filters/file/...
Page 549
ESR-Series. User manual Configure rules for transition between security zones: esr(config)# object-group service telnet esr(config-object-group-service)# port-range esr(config-object-group-service)# exit esr(config)# object-group service ssh esr(config-object-group-service)# port-range esr(config-object-group-service)# exit esr(config)# object-group service dhcp_server esr(config-object-group-service)# port-range esr(config-object-group-service)# exit esr(config)# object-group service dhcp_client esr(config-object-group-service)# port-range esr(config-object-group-service)# exit esr(config)# object-group service ntp esr(config-object-group-service)#...
Page 550
ESR-Series. User manual Enable access to the Internet from trusted and dmz zones: esr(config)# security zone-pair trusted untrusted esr(config-zone-pair)# rule esr(config-zone-pair-rule)# action permit esr(config-zone-pair-rule)# match protocol any esr(config-zone-pair-rule)# match source-address any esr(config-zone-pair-rule)# match destination-address any esr(config-zone-pair-rule)# enable esr(config-zone-pair-rule)# exit esr(config-zone-pair)# exit esr(config)# security zone-pair dmz untrusted esr(config-zone-pair)# rule esr(config-zone-pair-rule)# action permit...
Page 551
ESR-Series. User manual Enable ICMP transmission to the device. For BRAS operation you need to open ports for web proxying - TCP 3129/3128 (NetPortDiscovery Port/Active API Server port: esr(config)# object-group service bras esr(config-object-group-service)# port-range 3129 esr(config-object-group-service)# port-range 3128 esr(config-object-group-service)# exit esr(config)# security zone-pair trusted self esr(config-zone-pair)#...
ESR-Series. User manual Configure SNAT for gigabitethernet 1/0/1 port: esr(config)# nat source esr(config-snat)# ruleset inet esr(config-snat-ruleset)# to interface gigabitethernet 1/0/1 esr(config-snat-ruleset)# rule esr(config-snat-rule)# match source-address any esr(config-snat-rule)# action source-nat interface esr(config-snat-rule)# enable esr(config-snat-rule)# end 18.3 Example of configuration without SoftWLC Objective: Configure BRAS without SoftWLC support.
Page 553
ESR-Series. User manual #Service name for a session (A – the service is enabled, N – the service is disabled) Cisco-Account-Info = "{A|N}<SERVICE_NAME>" Service profile: <SERVICE_NAME> Cleartext-Password := <MACADDR> # Matches class-map name in ESR settings Cisco-AVPair = "subscriber:traffic-class=<CLASS_MAP>", # Action that is applied to the traffic by ESR (permit, deny, redirect) Cisco-AVPair = "subscriber:filter-default-action=<ACTION>", # The ability of IP flows passing (enabled-uplink, enabled-downlink, enabled, disabled) Cisco-AVPair =...
Page 554
Step 2: ESR configuration. BRAS functional configuration requires the BRAS licence: esr(config)# sh licence Licence information ------------------- Name: Eltex Version: Type: ESR-X S/N: NP00000000 MAC: XX:XX:XX:XX:XX:XX Features: BRAS – Broadband Remote Access Server Configuration of parameters for the interaction with RADIUS server: esr(config)# radius-server host 192.168.1.2...
Page 555
ESR-Series. User manual Specify parameters for the DAS server: esr(config)# das-server das esr(config-das-server)# key ascii-text encrypted 8CB5107EA7005AFF esr(config-das-server)# exit esr(config)# aaa das-profile bras_das esr(config-aaa-das-profile)# das-server das esr(config-aaa-das-profile)# exit esr(config)# vlan esr(config-vlan)# exit Then, create rules for redirecting to portal and passing traffic to the Internet: esr(config)# ip access-list extended BYPASS esr(config-acl)# rule...
Page 556
Configuration of filtering by URL is obligatory. It is necessary to configure http-proxy filtering on BRAS for non- authorised users: esr(config)# object-group url defaultserv esr(config-object-group-url)# url http://eltex.nsk.ru esr(config-object-group-url)# url http://ya.ru esr(config-object-group-url)# url https://ya.ru esr(config-object-group-url)# exit Configure and enable BRAS, define NAS IP as address of the interface interacting with RADIUS server...
Page 557
ESR-Series. User manual Perform the following settings on the interfaces that require BRAS operation (minimum one interface is required for the successful start): esr(config)# bridge esr(config-bridge)# vlan esr(config-bridge)# ip firewall disable esr(config-bridge)# ip address 10.10.0.1/16 esr(config-bridge)# ip helper-address 192.168.1.2 esr(config-bridge)# service-subscriber-control any esr(config-bridge)# location USER esr(config-bridge)# protected-ports...
Page 558
ESR-Series. User manual To view the information and statistics on the user control sessions, use the following command: esr # sh subscriber-control sessions status Session id User name IP address MAC address Interface Domain -------------------- --------------- --------------- ----------------- 1729382256910270473 Bras_user 10.10.0.3 54:e1:ad:8f:37:35...
ESR-Series. User manual Step Description Command Keys Configure a registration server address esr(config-voip-sip-proxy)# ip <IP> – registration server IP address registration-server <IP> address. Configure a registration server port: esr(config-voip-sip-proxy)# ip <PORT> – number of portregistration-server <PORT> registration server UDP port, takes values of [1..65535].
Page 561
ESR-Series. User manual Step Description Command Keys Select SIP profile for a certain port. esr(config-voice-port-fxs)# profile <PROFILE> – SIP profile sip <PROFILE> number, set in the form of a digit from 1 to 5. Configure a login for authentication. esr(config-voice-port-fxs)# <LOGIN>...
ESR-Series. User manual Step Description Command Keys Number of the subscriber that will esr(config-voice-port-fxo)# hotline <PHONE> – phone number that receive calls from PSTN number ipt <PHONE> calls are made to when using the service, takes the value from 1 to 50. "Hot/Warm line"...
Page 563
ESR-Series. User manual Step Description Command Keys Creating a pattern in a routing rule. esr(config-pbx-rule)# pattern <REGEXP> – regular <REGEXP> expression specifying the routing rule. Set by the string of up to 256 characters. The rules for creating regular expressions are described in section Dial plan configuration example.
ESR-Series. User manual Step Description Command Keys Create a password for the subscriber esr(config-pbx-user)# password <password> – password that (optional). <password> will be used by the user for authentication, set by the string of up to 16 characters. The use of SIP profile for the esr(config-pbx-user)# profile <SIPPROFILE>...
ESR-Series. User manual Step Description Command Keys Select the transport protocol esr(config-pbx-reg-server)# The default is udp. (optionally). protocol {tcp | udp } Trunk activation. esr(config-pbx-reg-server)# enable 19.6 VoIP configuration example Objective: Connect analogue telephones and fax modems to the IP network via ESR router. SIP server, located on the ESR, functions as proxy server and registration server.
Page 566
ESR-Series. User manual Configure a primary SIP proxy server and registration server: esr(config-sip-profile)# proxy primary Configure SIP proxy server address (use an embedded SIP server as SIP proxy server): esr(config-voip-sip-proxy)# ip address proxy-server 192.0.2.5 Configure a SIP proxy server port: esr(config-voip-sip-proxy)# ip port proxy-server 5080 If standard 5060 port is used, you do not need to specify it.
Page 567
ESR-Series. User manual If it is necessary to use SIP Domain for the registration, use the following command: esr(config-sip-profile)# sip-domain registration enable In this configuration all calls will be directed to SIP proxy server. If it is necessary to specify another direction for outgoing calls, you should perform the following: Create a numbering plan, see section Dial plan configuration...
ESR-Series. User manual 19.7 Dial plan configuration example Objective: Configure a dial plan in such a manner that calls to local numbers (connected to the given ESR-12V) are switched locally and calls to all other directions – through SIP proxy. Solution: Create a dial plan: esr(config)# dialplan pattern firstDialplan...
Page 569
ESR-Series. User manual «+» – repeating the previous character from 1 to infinity number of times. {a,b} – repeating the previous character from a to b times; {a,} – repeating the previous character equal to or more than a times; {,b} –...
ESR-Series. User manual signal will be returned. Also a set of three-digit numbers starting with “1”, the Invite of which will be sent to 10.110.60.51 IP address and 5060 port, will be returned. • Example 7: (S3 *xx#|#xx#|#xx#|*xx*x+#) – management and the use of VAS. Local calls inside the device may be required in some cases.
Page 571
ESR-Series. User manual Assign SIP profile to FXO port: esr(config-voice-port-fxo)# profile sip Enable the number transmission to PSTN: esr(config-voice-port-fxo)# pstn transmit-number Disable prefix transmission: esr(config-voice-port-fxo)# no pstn transmit-prefix For outgoing calls to work, you need to specify the following rule in the dial plan settings, which means that outgoing calls to numbers with prefix 9 are routed locally to the FXO set: 9x.@{local}:5064 This completes the baseline configuration of outgoing calls to PSTN.
ESR-Series. User manual 20 FREQUENTLY ASKED QUESTIONS 20.1 Receiving of routes, which are configured in VRF via BGP or/and OSPF, failed. The neighbouring is successfully installed, but record of routes in RIB is denied %ROUTING-W-KERNEL: Can not install route. Reached the maximum number of BGP routes in the RIB Allocate RIB resource for VRF (0 by default).
1/0/1 20.8 How to configure ip-prefix-list 0.0.0.0./0? Example of prefix-list configuration is shown below. The configuration allows route reception by default. esr(config)# ip prefix-list eltex esr(config-pl)# permit default-route 20.9 Problem of asynchronous traffic transmission is occurred In case of asynchronous routing, Firewall will forbid "incorrect" ingress traffic (which does not open new connection and does not belong any established connection) for security reasons.
ESR-Series. User manual Firewall should be disabled on the ingress interface. esr(config-if-gi)# ip firewall disable 20.10 How to save the local copy of the router configuration? If you need to copy the current running or candidate configuration on the router itself, you can use the copy command specifying "system:running-config"...
ESR-Series. User manual 21 ESR technical support For technical assistance in issues related to operation of Eltex Ltd. equipment, please contact the Service Centre. Feedback form on the website: http://eltex-co.com/support/ Sevicedesk: https://servicedesk.eltex-co.ru/ Visit Eltex official website to get the relevant technical documentation and software, benefit from our...
Need help?
Do you have a question about the ESR Series and is the answer not in the manual?
Questions and answers