Дерево страниц
Перейти к концу метаданных
Переход к началу метаданных

ESR router factory configuration 

The device is shipped to the consumer with the factory configuration installed that includes essential basic settings. Factory configuration allows using the router as a gateway with SNAT without applying any additional settings. Also, factory configuration contains settings that allow you to obtain network access to the device for advanced configuration.

Description of factory settings

To establish network connection, the configuration features 2 security zones named 'Trusted' for local area network and 'Untrusted' for public network. All interfaces are divided between two security zones:

  1. 'Untrusted' zone is meant for a public network (WAN) connection. In this zone, DHCP ports are open in order to obtain dynamic IP address from the provider. All incoming connections from this zone to the router are blocked.

    This security zone includes the following interfaces:

    • for WLC-15: GigabitEthernet 1/0/1, GigabitEthernet 1/0/6;
    • for WLC-30: GigabitEthernet 1/0/1, Tengigabitethernt 1/0/1-2;
    • for WLC-3200: TwentyfivegigabitEthernet 1/0/1-2;
    • for ESR-10/12V: GigabitEthernet 1/0/1;

    • for ESR-12VF/ESR-14VF: GigabitEthernet 1/0/1; GigabitEthernet 1/0/9;

    • for ESR-15: GigabitEthernet 1/0/1; GigabitEthernet 1/0/6;
    • for ESR-20: GigabitEthernet 1/0/1;

    • for ESR-21: GigabitEthernet 1/0/1;

    • for ESR-30: GigabitEthernet 1/0/1; GigabitEthernet 1/0/1-2;
    • for ESR-100/200: GigabitEthernet 1/0/1;

    • for ESR-1000/1500/3100: GigabitEthernet 1/0/1, TengigabitEthernet 1/0/1-2;

    • for ESR-1200/1700: GigabitEthernet 1/0/1, TengigabitEthernet 1/0/1, TengigabitEthernet 1/0/2;

    • for ESR-1511: GigabitEthernet 1/0/1, FortygigabitEthernet 1/0/1-2;
    • for ESR-3200: GigabitEthernet 1/0/1-2.

      Zone interfaces are grouped into a single L2 segment via Bridge 2 network bridge.
  2. 'Trusted' zone is meant for a local area network (LAN) connection. Telnet and SSH ports for remote access, ICMP ports for router availability test, DHCP ports for clients obtaining IP addresses from the router. Outgoing connections from this zone into the Untrusted zone are allowed.

    This security zone includes the following interfaces:

    • for WLC-15: GigabitEthernet 1/0/2-5;
    • for WLC-30: GigabitEthernet 1/0/2-4;
    • for WLC-3200: TwentyfivegigabitEthernet 1/0/3-12;
    • for ESR-10: GigabitEthernet 1/0/2-6;

    • for ESR-12V(F)/ESR-14VF: GigabitEthernet 1/0/2-8;

    • for ESR-15: GigabitEthernet 1/0/2-5;
    • for ESR-20: GigabitEthernet 1/0/2-4;

    • for ESR-21: GigabitEthernet 1/0/2-12;

    • for ESR-30: GigabitEthernet 1/0/3-4;
    • for ESR-100: GigabitEthernet 1/0/2-4;

    • for ESR-200: GigabitEthernet 1/0/2-8;

    • for ESR-1000: GigabitEthernet 1/0/2-24;

    • for ESR-1200: GigabitEthernet 1/0/2-16, TengigabitEthernet 1/0/3-8;

    • for ESR-1500: GigabitEthernet 1/0/2-8, TengigabitEthernet 1/0/3-4;

    • for ESR-1511: GigabitEthernet 1/0/2-8, TengigabitEthernet 1/0/1-4;
    • for ESR-1700: GigabitEthernet 1/0/2-4, TengigabitEthernet 1/0/3-12;

    • for ESR-3100: GigabitEthernet 1/0/2-8, TengigabitEthernet 1/0/3-8;

    • for ESR-3200: Twentyfivegigabitethernet 1/0/3-12.

      Zone interfaces are grouped into a single L2 segment via Bridge 2 network bridge.

On the Bridge 2 interface, DHCP client is enabled to obtain dynamic IP address from the provider. On Bridge 1 interface, static IP address 192.168.1.1/24 is configured. Created IP address acts as a gateway for LAN clients. For LAN clients, DHCP address pool 192.168.1.2-192.168.1.254 is configured with the mask 255.255.255.0. For clients in order to access the Internet, the router should have Source NAT service enabled.

Security zone policies have the following configuration:

Table 65 – Security zone policy description

Traffic origin zone

Traffic destination zone

Traffic type

Action

Trusted

Untrusted

TCP, UDP, ICMP

enabled

Trusted

Trusted

TCP, UDP, ICMP

enabled

Trusted

self

TCP/22 (SSH), ICMP, UDP/67 (DHCP Server), UDP/123 (NTP)

enabled

Untrusted

self

UDP/68 (DHCP Client)

enabled

To enable device configuration on the first startup, 'admin' user with 'password' password has been created in the router configuration. The user will be prompted to change administrator password during the initial configuration of the router.

To enable network access to the router on the first startup, static IP address 192.168.1.1/24 has been configured on Bridge 1 interface.

Device connection and configuration

ESR series routers and WLC controllers are intended to perform border gateway functions and securing the user network when it is connected to public data networks.

Basic router configuration should include:

  • Assigning IP addresses (static or dynamic) to the interfaces that participate in data routing;
  • Creation of security zones and distribution of interfaces between these zones;
  • Creation of policies governing data transfer through these zones;
  • Configuration of services that accompany the data routing (NAT, Firewall, etc.).

Advanced settings depend on the requirements of the specific device application pattern and may be easily added or modified with the existing management interfaces.

Connection to the device

There are several device connection options:

Ethernet LAN connection

Upon the initial startup, the device starts with the factory configuration.

Connect the network data cable (patch cord) to any port within the 'Trusted' zone and to the PC intended for management tasks.

In the router factory configuration, DHCP server is enabled with IP address pool in 192.168.1.0/24 subnet.

When network interface is connected to the management computer, the latter should obtain the network address from the server.

If IP address is not obtained for some reason, assign the interface address manually using any address except for 192.168.1.1 in 192.168.1.0/24 subnet.

RS-232 console port connection

Using RJ-45/DBF9 cable included into device delivery package, connect the router 'Console' port to the computer RS-232 port.

Launch terminal application (e.g. HyperTerminal or Minicom) and create a new connection. VT100 terminal emulation mode should be used.

Specify the following settings for RS-232 interface:

Data rate: 115200 bps
Data bits: 8 bits
Parity: none
Stop bits: 1
Flow control: none

Applying the configuration change

Any changes made in the configuration will take effect only after applying the command:

esr# commit
Configuration has been successfully committed

After applying the command above, the configuration rollback timer is started. To stop the timer and rollback mechanism, use the following command:

esr# confirm
Configuration has been successfully confirmed

The default 'rollback' timer value is 600 seconds. To change this timer, use the command:

esr(config)# system config-confirm timeout <TIME>
  • <TIME> – time period of configuration confirmation pending, takes value in seconds [120..86400].

Basic device configuration

Upon the first startup, the device configuration procedure includes the following steps:

  • Changing password for "admin" user.
  • Creation of new users.
  • Assigning device name (Hostname).
  • Setting parameters for public network connection in accordance with the provider requirements.
  • Configuring remote connection to router.
  • Applying basic settings.

Changing password for 'admin' user

To ensure the secure system access, you should change the password for the privileged 'admin' user.

'techsupport' account ('eltex' up to version 1.0.7) is required for service centre specialist remote access.

'remote' account – RADIUS, TACACS+, LDAP authentication.

'admin', 'techsupport', 'remote' users cannot be deleted. Only passwords and a privilege level can be changed.

If information about 'admin' user is not displayed in the configuration, then the parameters of this user are configured by default ('password' password, privilege level 15).

Username and password are required for login during the device administration sessions.

To change 'admin' password, use the following commands:

esr# configure
esr(config)# username admin
esr(config-user)# password <new-password>
esr(config-user)# exit

Creation of new users

Use the following commands to create a new system user or configure the username, password, or privilege level:

esr(config)# username <name>
esr(config-user)# password <password>
esr(config-user)# privilege <privilege>
esr(config-user)# exit

Privilege levels 1–9 allow accessing the device and viewing its operation status, but the device configuration is disabled. Privilege levels 10-14 allow both the access to the device and configuration of majority of its functions. Privilege level 15 allows both the access to the device and configuration of all its functions.

Example of commands, that allow you to create user 'fedor' with password '12345678' and privilege level 15 and create user 'ivan' with password 'password' and privilege level '1':

esr# configure
esr(config)# username fedor
esr(config-user)# password 12345678
esr(config-user)# privilege 15
esr(config-user)# exit
esr(config)# username ivan
esr(config-user)# password password
esr(config-user)# privilege 1
esr(config-user)# exit

Assigning device name

To assign the device name, use the following commands:

esr# configure
esr(config)# hostname <new-name>

When a new configuration is applied, command prompt will change to the value specified by <new-name> parameter.

Configuration of public network parameters

To configure router network interface in the public network, you should assign parameters defined by the network provider – default IP address, subnet mask and gateway address – to the device.

Example of static IP address configuration commands for Gigabit Ethernet 1/0/2.150 sub-interface used for obtaining access to the device via VLAN 150.

Interface parameters:

  • IP address: 192.168.16.144;
  • Subnet mask: 255.255.255.0;
  • Default gateway IP address: 192.168.16.1.
esr# configure
esr(config)# interface gigabitethernet 1/0/2.150 
esr(config-subif)# ip address 192.168.16.144/24
esr(config-subif)# exit
esr(config)# ip route 0.0.0.0/0 192.168.16.1

To ensure the correct IP address assigning for the interface, enter the following command when the configuration is applied:

esr# show ip interfaces
IP address            Interface                           Type
-------------------   ---------------------------------   -------
192.168.16.144/24     gigabitethernet 1/0/2.150           static

Provider may use dynamically assigned addresses in their network. If the there is DHCP server in the network, you can obtain the IP address via DHCP.

Configuration example for obtaining dynamic IP address from DHCP server on Gigabit Ethernet 1/0/10 interface:

esr# configure
esr(config)# interface gigabitethernet 1/0/10
esr(config-if)# ip address dhcp
esr(config-if)# exit

To ensure the correct IP address assigning for the interface, enter the following command when the configuration is applied:

esr# show ip interfaces
IP address            Interface                           Type
-------------------   ---------------------------------   -------
192.168.11.5/25       gigabitethernet 1/0/10              DHCP

Configuring remote connection to device

In the factory configuration, remote access to the router or controller may be established via Telnet or SSH from the 'trusted' zone. To enable remote access to the router or controller from other zones, e.g. from the public network, you should create the respective rules in the firewall.

When configuring access to the router or controller, rules should be created for the following pair of zones:

  • source-zone – zone that the remote access will originate from;
  • self – zone which includes device management interface.

Use the following commands to create the allowing rule:

esr# configure
esr(config)# security zone-pair <source-zone> self
esr(config-zone-pair)# rule <number>
esr(config-zone-rule)# action permit
esr(config-zone-rule)# match protocol tcp
esr(config-zone-rule)# match source-address <network object-group>
esr(config-zone-rule)# match destination-address <network object-group>
esr(config-zone-rule)# match destination-port <service object-group>
esr(config-zone-rule)# enable
esr(config-zone-rule)# exit
esr(config-zone-pair)# exit

Example of commands that allow users from 'untrusted' zone with IP addresses in range 132.16.0.5-132.16.0.10 to connect to the device with IP address 40.13.1.22 via SSH:

esr# configure
esr(config)# object-group network clients
esr(config-addr-set)# ip address-range 132.16.0.5-132.16.0.10
esr(config-addr-set)# exit
esr(config)# object-group network gateway
esr(config-addr-set)# ip address-range 40.13.1.22
esr(config-addr-set)# exit
esr(config)# object-group service ssh
esr(config-port-set)# port-range 22
esr(config-port-set)# exit
esr(config)# security zone-pair untrusted self
esr(config-zone-pair)# rule 10
esr(config-zone-rule)# action permit
esr(config-zone-rule)# match protocol tcp
esr(config-zone-rule)# match source-address clients
esr(config-zone-rule)# match destination-address gateway
esr(config-zone-rule)# match destination-port ssh
esr(config-zone-rule)# enable
esr(config-zone-rule)# exit
esr(config-zone-pair)# exit
  • Нет меток