Дерево страниц
Перейти к концу метаданных
Переход к началу метаданных

1. ABSTRACT

This manual provides instructions for connecting to the power supply network, factory configuration of the device and recommendations for initial configuration of ESR-1000/1200/1700 routers. It describes the typical router power-up scheme, wireless-controller configuration, NAT, redundancy. This manual is intended for technicians who install, configure and commission the device.

2. DESIGN

ESR-1000/1200/1700 routers are made in a metal housing with the ability to install in a 19" frame. The height of the ESR-1000/1200 1U. The height of the ESR-1700 enclosure is 2U.

2.1 ESR-1000, ESR-1200 design

Fig. 2.1.1  ESR-1000 front panel.

Front panel element

Description

1

SD

SD card connector.

2

USB1

Port for USB device connection.

3

USB2

Port for USB device connection.

4

XG1, XG2

Slots for 10G SFP+/ 1G SFP transceivers.

5

[1 .. 24]

24 ports of Gigabit Ethernet 10/100/1000 Base-T (RJ-45).

6

Status

Current device status LED.

Alarm

Alarm LED.

VPN

Active VPN sessions indicator.

Flash

Activity indicator of exchange with data storages (SD card or USB Flash).

Power

Device power LED.

Master

Indicator of failover modes operation.

Fan

Fan operation LED.

RPS

Redundant power supply LED.

7

F

Functional key that reboots the device and resets it to factory default configuration:

  • pressing the key for less than 10 seconds reboots the device;

  • pressing the key for more than 10 seconds resets the terminal to factory settings.

8

Console

Console port RS-232 for local management of the device.

Fig. 2.1.2 ESR-1200 front panel.

Front panel element

Description

1

SD

SD card connector.

2

USB1

Port for USB device connection.

3

USB2

Port for USB device connection.

4

[1 .. 12]

12 ports of Gigabit Ethernet 10/100/1000 Base-T (RJ-45).

5

Combo Ports

4 ports of Gigabit Ethernet 10/100/1000 Base-X (SFP).

6

XG1 - XG8

Slots for 10G SFP+/ 1G SFP transceivers.

7

Status

Current device status LED.

Alarm

Alarm LED.

HA

НА operation mode LED.

Flash

Activity indicator of exchange with data storages (SD card or USB Flash).

Power

Device power LED.

Master

Indicator of failover modes operation.

Fan

Fan operation LED.

RPS

Redundant power supply LED.

8

F

Functional key that reboots the device and resets it to factory default configuration:

  • pressing the key for less than 10 seconds reboots the device;

  • pressing the key for more than 10 seconds resets the terminal to factory settings.

9

Console

Console port RS-232 for local management of the device.


Fig. 2.1.3 ESR-1000, ESR-1200 rear panle.

Description

1

Main power supply.

2

Place for installation of a redundant power supply.

3

Hot-swappable removable ventilation modules.

4

Earth bonding point of the device.

Fig. 2.1.4 ESR-1000, ESR-1200 left side panel.


Fig. 2.1.5 ESR-1000, ESR-1200 right side panel.

Side panels of the device have air vents for heat removal. Do not block air vents. This may cause the components to overheat, which may result in device malfunction.   

2.2 ESR-1700 design

Fig. 2.2.1 ESR-1700 front panel.

Front panel element

Description

1

HDD1

Connector for HDD installation.

2

HDD2

Connector for HDD installation.

3

USB1

Port for USB device connection.

4

USB2

Port for USB device connection.

5

Combo Ports [1 .. 4]

4 ports of Gigabit Ethernet 10/100/1000 Base-X (SFP).

6

XG1 - XG8

Slots for 10G SFP+/ 1G SFP transceivers.

7

Status

Current device status LED

Alarm

Alarm LED.

HA

НА operation mode LED.

Flash

Activity of exchange with data storage SD card or USB Flash.

Power

Device power LED.

Master

Indicator of failover modes operation.

Fan

Fan operation LED.

RPS

Redundant power supply LED.

8

F

Functional key that reboots the device and resets it to factory default configuration:

  • pressing the key for less than 10 seconds reboots the device;

  • pressing the key for more than 10 seconds resets the terminal to factory settings.

9

Console

Console port RS-232 for local management of the device.

10

OOB

Ethernet port for router management.


Fig. 2.2.2 ESR-1700 rear panel.

Description

1

Earth bonding point of the device.

2

Hot-swappable removable ventilation modules.

3

Main power supply.

4

Place for installation of a redundant power supply.


Fig. 2.2.3 Right side panel.


Fig. 2.2.4 Left side panel.

  Side panels of the device have air vents for heat removal. Do not block air vents. This may cause the components to overheat, which may result in device malfunction.   

2.3 Light indication.

Gigabit Ethernet copper interface statuses are represented by two LEDs – green LINK/ACT LED and amber SPEED LED. Location of the copper interface LEDs is depicted in figure 2.3.13. For light indication meaning, see table 2.3.1.

LINK/ACT         SPEED


 Fig. 2.3.1 Location of GigabitEthernet.

SFP interface status is represented by two LEDs – RX/ACT and TX/ACT – depicted in figure 2.3.13. For light indication meaning, see table 2.3.2.

RX/ACT    TX/ACT

Fig. 2.3.2 Location of optical interface indicators.


Table 2.3.1 Light indication of cooper interface status.

SPEED indicator is lit

LINK/ACT indicator is lit

Ethernet interface state

Off

Off

The port is disabled or connection is not established.

Off

Solid on

10Mbps or 100Mbps connection is established.

Solid on

Solid on

1000Mbps connection is established.

X

Flashes

Data transfer is in progress.

Table 2.3.2 Light indication of SFP/SFP+ interfaces status.

RX/ACT indicator is lit

TX/ACT indicator is lit

Ethernet interface state

Off

Off

The port is disabled or connection is not established.

Solid on

Solid on

Connection established.

Flashes

X

Data reception in progress.

X

Flashes

Data transfer is in progress.

The following table describes the statuses of the system indicators of the device.

Table 2.3.3 Status of system indicators.

Indicator name

Indicator function

LED state

Device State
StatusCurrent device status LED.GreenDevice is in normal operation state.
OrangeThe device is in the firmware download state.
AlarmAlarm LED.--
VPNActive VPN sessions indicator.--
FlashActivity indicator of exchange with data storages:
SD-card or USB Flash.
OrangeRead/write operation execution with 'copy' command.
Power

Device power LED.

GreenDevice power is normal. Main power supply, if installed, is operational.
OrangeMain power supply failure, fault, or the primary network is missing.
OffDevice internal power supply failure.
MasterIndicator of failover modes operation.--
FanCooling fan status.OffAll fans are operational.
RedOne or more fans has failed. Possible cause of failure: at least one of the fans has stopped or is
working at lower rpm.
RPSBackup power supply operation mode.Green

Backup power supply is installed and operational.

Off

Backup power supply is not installed.

Red

Backup power supply is missing or failed.

3. CONNECTION TO POWER SUPPLY

1.  Ground the case of the device prior to connecting it to the power supply. An insulated multiconductor wire should be used for earthing. The device grounding and the earthing wire cross-section should comply with Electric Installation Code

2.  If a PC or another device is supposed to be connected to the router console port, the device should be also securely grounded.

3. For ESR-1000/1200/1700.  Connect the power supply cable to the device. Depending on the delivery package, the device can be powered by AC or DC electrical network. To connect the device to AC power supply, use the cable from the delivery package. To connect the device to DC power supply, use wires with a minimum crosssection of 1 мм2.

4.  Turn the device on and check the front panel LEDs to make sure the terminal is in normal operating conditions.

4. ESR ROUTER FACTORY CONFIGURATION

The device is shipped to the consumer with the factory configuration installed that includes essential basic settings. Factory configuration allows using the router as a gateway with SNAT without applying any additional settings. Also, factory configuration contains settings that allow you to obtain network access to the device for advanced configuration.

4.1 Description of factory settings

To establish network connection, the configuration features 2 security zones named 'Trusted' for local area network and 'Untrusted' for public network. All interfaces are divided between two security zones:

 -  'Untrusted' zone is meant for a public network (WAN) connection. In this zone, DHCP ports are open in order to obtain dynamic IP address from the provider. All incoming connections from this zone to the router are blocked. This security zone includes the following interfaces:

ESR-1000/1200/1700: GigabitEthernet1/0/1, TengigabitEthernet1/0/1, TengigabitEthernet1/0/2.  Zone interfaces are grouped into a single L2 segment via Bridge 2 network bridge.

 -  'Trusted' zone is meant for a local area network (LAN) connection. Telnet and SSH ports for remote access, ICMP ports for router availability test, DHCP ports for clients obtaining IP addresses from the router. Outgoing connections from this zone into the Untrusted zone are allowed.
This security zone includes the following interfaces:

ESR-1000: GigabitEthernet1/0/2-24.  Zone interfaces are grouped into a single L2 segment via Bridge 1.

ESR-1200: GigabitEthernet1/0/2-16, TengigabitEthernet1/0/3-8. Zone interfaces are grouped into a single L2 segment via Bridge 1 network bridge.

ESR-1700: GigabitEthernet1/0/2-4, TengigabitEthernet1/0/3-8. Zone interfaces are grouped into a single L2 segment via Bridge 1 network bridge.

On the Bridge 2 interface, DHCP client is enabled to obtain dynamic IP address from the provider. On Bridge 1 interface, static IP address 192.168.1.1/24 is configured. Created IP address acts as a gateway for LAN clients. For LAN clients, DHCP address pool 192.168.1.2-192.168.1.254 is configured with the mask 255.255.255.0. For clients in order to access the Internet, the router should have Source NAT service enabled.

    Security zone policies have the following configuration:

Traffic origin zoneTraffic destination zoneTraffic typeAction
trusteduntrastedTCP, UDP, ICMPenabled
trustedtrustedTCP, UDP, ICMPenabled
trustedself

TCP/23(Telnet), TCP/22(SSH), ICMP,

UDP/67(DHCP Server), UDP/123(NTP)

enabled
untrustedselfUDP/68(DHCP Client)enabled

    To enable device configuration on the first startup, 'admin' user with 'password' password has been created in the router configuration. The user will be prompted to change administrator password during the initial configuration of the router.

    To enable network access to the router on the first startup, static IP address 192.168.1.1/24 has been configured on Bridge 1 interface.

5. CONNECTING TO THE CLI OF ROUTER

At initial startup, the router boots with the factory configuration. The factory configuration is described in paragraph 4 of this document.

5.1. Ethernet LAN connection

1.  Connect the network data cable (patch cord) to any port within the 'Trusted' zone and to the PC intended for management tasks.

2.  In the router factory configuration, DHCP server is enabled with IP address pool in 192.168.1.0/24 subnet. When network interface is connected to the management computer, the latter should obtain the network address from the server. If IP address is not obtained for some reason, assign the interface address manually using any address except for 192.168.1.1 in 192.168.1.0/24 subnet.

5.2. RS-232 console port connection

1.  Using RJ-45/DBF9 cable included into device delivery package, connect the router 'Console' port to the computer RS-232 port.

2.  Launch terminal application (e.g. HyperTerminal or Minicom) and create a new connection. VT100 terminal emulation mode should be used. Specify the following settings for RS-232 interface:

ParameterValue
Data rate115200 bps
Data bits8 bits
Paritynone
Stop bits1
Flow controlnone

6. BASIC ROUTER CONFIGURATION

    Upon the first startup, the router configuration procedure includes the following steps:

      1. Setting the factory configuration.

      2. Changing password for "admin" user.

      3. Creation of new users.

      4.  Assigning device name (Hostname).

      5. Setting parameters for public network connection in accordance with the provider requirements.

      6. Configuring remote connection to router.

      7. Applying basic settings.

By default, the user "admin" with the password "password" is created.

6.1. Installing the default configuration

At initial startup, the router boots with the factory default configuration. The factory configuration is described in paragraph 4 of this document.

Before further configuration it is recommended to reset the configuration to default, this will allow to set only the required network parameters. Reset to default configuration should be performed by connecting to the router via RS-232 console access, because after it is applied all settings will be reset and network access to the router will be impossible.

  

esr-1700# copy system:default-config system:candidate-config

Entire candidate configuration will be reset to default, all settings will be lost upon commit.

Do you really want to continue? (y/N): y

|******************************************| 100% (21B) Default configuration loaded successfully.

esr-1700#commit

esr-1700#confirm

6.2. Changing the administrator password

The password of the privileged user "admin" must be changed for secure login. The user name and password are entered when logging in during device administration sessions. The following commands are used to change the password of the "admin" user:

esr-1700# configure

esr-1700(config)# username admin

esr-1700(config-user)# password <new-password>

esr-1700(config-user)# exit

esr-1700(config)#exit

esr-1700#commit

esr-1700#confirm

6.3. Creating the new users

   The following commands are used to create a new system user or to configure any of the parameters - user name, password, privilege level:

esr-1700# configure

esr-1700(config)# username <user>

esr-1700(config-user)# password <user-password>

esr-1700(config-user)# privilege <1-15>

esr-1700(config-user)# exit

esr-1700(config)#exit

esr-1700#commit

esr-1700#confirm

Privilege levels 1-9 allow access to the device and view its operational status, but prohibit configuration. Privilege levels 10-14 allow both access to and configuration of most device functions. Privilege level 15 allows both access to and configuration of all device functions.

Example commands to create user <fedor> with password <12345678> and privilege level <15> and to create user <ivan> with password <87654321> and privilege level <1>:

esr-1700# configure

esr-1700(config)# username fedor

esr-1700(config-user)# password 12345678

esr-1700(config-user)# privilege 15

esr-1700(config-user)# exit

esr-1700(config)# username ivan

esr-1700(config-user)# password 87654321

esr-1700(config-user)# privilege 1

esr-1700(config-user)# exit

esr-1700(config)#exit

esr-1700#commit

esr-1700#confirm

6.4. Assigning a device name

   The following commands are used to assign a device name:

esr-1700# configure

esr-1700(config)# hostname <new-name>

esr-1700(config)#

esr-1700(config)#exit

esr-1700#commit

esr-1700#confirm

After the configuration is applied, the command line prompt will change to the value specified by the <new-name> parameter.

6.5. Configuring public network settings

To configure the network interface of the router on a public network, you must assign the device the parameters defined by the network provider - IP address, subnet mask and default gateway address. Example GigabitEthernet 1/0/2.150 static IP address configuration commands for accessing the router through VLAN 150.

   Interface parameters:

   - Security zone – untrusted

   - IP address – 192.168.16.144;

   - Subnet mask – 255.255.255.0;

   - default gateway IP address – 192.168.16.1.

esr-1700# configure

esr-1700(config)# security-zone untrusted

esr-1700(config)# exit

esr-1700(config)# interface gigabitethernet 1/0/2.150

esr-1700(config-subif)# security-zone untrusted

esr-1700(config-subif)# ip address 192.168.16.144/24

esr-1700(config-subif)# exit

esr-1700(config)# ip route 0.0.0.0/0 192.168.16.1

esr-1700(config)#exit

esr-1700#commit

esr-1700#confirm

   To verify that an address has been assigned to an interface, enter the following command after applying the configuration:

esr-1700# show ip interfaces


IP address                                            Interface            Admin   Link    Type      

---------------------------------------------------   ------------------   -----   -----   -------   

192.168.16.144/24                                     gi1/0/2.150          Up      UP    static 

   Provider can use dynamically assigned addresses on its network. DHCP can be used to obtain an IP address if a DHCP server is present on the network. Example of a configuration designed to obtain a dynamic IP address from a DHCP server on GigabitEthernet interface 1/0/2 in VLAN 150:

esr-1700# configure

esr-1700(config)# security-zone untrusted

esr-1700(config)# exit

esr-1700(config)# interface gigabitethernet 1/0/2.150

esr-1700(config-subif)# security-zone untrusted

esr-1700(config-subif)# ip address dhcp

esr-1700(config-subif)# exit

esr-1700(config)#exit

esr-1700#commit

esr-1700#confirm

  To verify that the address has been assigned to the interface, enter the following command after applying the configuration:

esr-1700# show ip interfaces


IP address                                            Interface            Admin   Link    Type      

---------------------------------------------------   ------------------   -----   -----   -------   

192.168.16.12/24                                     gi1/0/2.150          Up      UP    DHCP

6.6. Configuring remote access to the router

In the default configuration allowed remote access to the router is not configured, so if the default configuration was applied - then the configuration is possible only with the use of a console cable. In order to allow remote access to the router from certain hosts you need to perform the following actions:

    Enable Telnet and SSH servers on the router:

esr-1700# configure

esr-1700(config)# ip telnet server

esr-1700(config)# ip ssh server

   Create objects in which we specify the telnet and ssh ports:

esr-1700(config)# object-group service telnet

esr-1700(config-object-group-service)# port-range 23

esr-1700(config-object-group-service)# exit

esr-1700(config)# object-group service ssh

esr-1700(config-object-group-service)# port-range 22

esr-1700(config-object-group-service)# exit

   Create security zone:

esr-1700(config)# security zone trusted

esr-1700(config-zone)# exit

   Create an object in which we specify hosts IP addresses from which the access to router is allowed:

esr-1700(config)# object-group network mgmt

esr-1700(config-object-group-network)# ip address-range 192.168.110.1-192.168.110.254

esr-1700(config-object-group-network)# exit

   Create an interface, assign the security zone and IP address:

esr-1700(config)# int gi1/0/1.2

esr-1700(config-subif)# security-zone trusted

esr-1700(config-subif)# ip address 192.168.110.37/24

esr-1700(config-subif)# exit

   Create rules for Telnet and SSH traffic to the router from the addresses of the mgmt object:

   - trusted – zone from which remote access will be performed;

   - self – zone where the router management interface is located;

esr-1700(config)# security zone-pair trusted self

esr-1700(config-zone-pair)# rule 1

esr-1700(config-zone-pair-rule)# action permit

esr-1700(config-zone-pair-rule)# match protocol tcp

esr-1700(config-zone-pair-rule)# match source-address mgmt

esr-1700(config-zone-pair-rule)# match destination-address any

esr-1700(config-zone-pair-rule)# match source-port any

esr-1700(config-zone-pair-rule)# match destination-port telnet

esr-1700(config-zone-pair-rule)# enable

esr-1700(config-zone-pair-rule)# ex

esr-1700(config-zone-pair)# rule 2

esr-1700(config-zone-pair-rule)# action permit

esr-1700(config-zone-pair-rule)# match protocol tcp

esr-1700(config-zone-pair-rule)# match source-address mgmt

esr-1700(config-zone-pair-rule)# match destination-address any

esr-1700(config-zone-pair-rule)# match source-port any

esr-1700(config-zone-pair-rule)# match destination-port ssh

esr-1700(config-zone-pair-rule)# enable

esr-1700(config-zone-pair-rule)# exit

esr-1700(config-zone-pair)# exit

esr-1700(config)# exit

esr-1700#commit

esr-1700#confirm

Verify that the router is accessible via Telnet and SSH from authorized hosts.

6.7 Downloading the wireless-controller support license file

To access wireless-controller functionality you need a license file. In order to obtain it, please contact Eltex.

In order to view the installed licenses you need to perform from the router CLI:

esr-1700# show licence

Active licence not found!

To download the obtained license file to the router, you need to execute:

esr-1700# copy tftp://192.168.110.50:/NP07000041.lic system:licence
|******************************************| 100% (679B) Licence loaded successfully. Please reboot system to apply changes.


  After that reload the router:

esr-1700# reload system

Do you really want to reload system ? (y/N): y

  After reloading, verify that the license is installed:

esr-1700# show licence

Licence information

-------------------

Name:    eltex

Version: 1.0

Type:    ESR-1700

S/N:     NP07000041

MAC:     A8:F9:4B:AB:B4:80

Features:

 WIFI - Wi-Fi controller

7. ROUTER CONFIGURATION

7.1 Resetting to factory configuration

   The factory configuration allows remote access to the router via Telnet or SSH from a "trusted" zone (Chapter 4). The following commands are used to restore the configuration settings to this view:

esr-1700# copy system:factory-config system:candidate-config

esr-1700#commit

esr-1700#confirm

7.2 Resetting to default configuration

   The factory configuration does not always meet the requirements for current tasks, so to prepare the device for configuration, you will need to install the default configuration (there are no settings) after which you can configure all the parameters of the device to meet the requirements of the network. The following commands are used to reset the configuration to default:

esr-1700# copy system:default-config system:candidate-config

esr-1700#commit

esr-1700#confirm

After applying the default configuration, remote access (via SSH, Telnet) to the device will not be possible.

7.3 Applying the settings

   To apply the configuration changes made to the router, the following commands must be entered from the root section of the command interface.

esr-1700# commit

esr-1700# confirm

   If remote access to the device was used during configuration and the network parameters of the management interface are changed, the connection to the device may be lost after entering the commit command. Use the new network parameters set in the configuration to connect to the device and enter the confirm command. If the confirm command cannot be entered, after the confirmation timer (10 minutes) expires, the device configuration will revert to the previous state that existed before the commit command was entered.

7.4 Software Upgrade

    It is recommended that the router be upgraded to the latest version of software (SW) before beginning to configure the router. If the current software version is lower than version 1.2.0, before updating the router software, it is necessary to check the version of the boot loader xload and uboot loader, and if necessary to update to the same version.

   The bootloader is checked from the console when booting the device, the version information can be found in the string:

BRCM XLP Stage 1 Loader (X-Loader:1.0.6.48) [Big-Endian] (Sep 30 2015 - 17:50:18)

   To check the firmware version use the show version command:

ESR1000# show version

Boot version:

1.0.7.162 (date 25/02/2016 time 16:47:23)

SW version:

1.0.7 build 162[71e5eab] (date 25/02/2016 time 16:58:33)

HW version:

1v7

Updating the bootloader (XLOAD)

  To update the preloader you will need a tftp server or sd-card, in the root you need to create a folder esr1000, in the folder esr1000 put the files xload.bin.

Stop the download by pressing any key at the moment:

Temp: LM75/0 temperature (PHYs 1G) 30 C

Temp: LM75/1 temperature (SFP+ 10G) 29 C

Temp: LM75/2 temperature (Switch) 42 C

CPLD: FW Revision 1

Hit any key to stop autoboot: 0

BRCM.XLP316Lite Rev B2.u-boot#

when you press enter, the following message should be displayed:

BRCM.XLP316Lite Rev B2.u-boot#

To update from the sd card, enter the commands:

mmc init

fatload mmc 0:1 ${xload_ram_base} ${xload_file}

sf probe && sf erase ${xload_sf_base} ${xload_sf_size}

sf write ${xload_ram_base} ${xload_sf_base} ${filesize}

To update from tftp, enter the commands:

Setenv serverip 192.168.11.11

Set up the router IP address

Setenv ipaddr 192.168.11.10

Update the xload

Run tftp_update_xload

Reset the router

reset

Updating the U-Boot

To update the router's secondary boot loader (U-Boot), you must enter the following commands from the root section of the command interface:

esr-1000# copy tftp://IP:/filename system:boot

For example server address 101.0.0.0.4 software file name esr1000-1.2.0-build162.uboot:

esr-1000# copy tftp://101.0.0.4:/esr1000-1.2.0-build162.uboot system:boot

esr-1000# reload system

Do you really want to reload system ? (y/N): y

Updating the firmware

To update the software, enter the following commands from the root section of the command interface:

esr-1000#
copy tftp://IP:/filename system:firmware

For example server address 101.0.0.0.24 software file name esr1000-1.4.0-build108.firmware:

esr-1000# copy tftp://101.0.0.24:/esr1000-1.4.0-build108.firmware system:firmware
Download firmware from tftp://101.0.0.24:/esr1000-1.4.0-build108.firmware...
esr1000-1.4.0-build108.firmware          100% |*******************************| 47298k  0:00:00 ETA
Verify image ... OK!Writing data to NAND...
###################################################################################################################################################################################
Firmware updated successfully.

Select the image to be downloaded by looking at the active image:

esr-1000# show bootvar
Image   Version                     Date                   Status         After reboot   
-----   -------------------------   --------------------   ------------   ------------   
1       1.4.0 build                 date 02/04/2018 time   Not Active                    
        108[ad6366f86f]             11:39:31                                             

2       1.2.1 build                 date 25/12/2017 time   Active         *              
        30[c6cfc39187]              10:20:12                                             


The firmware will always be downloaded to the inactive image, so select it to download:

esr-1000# boot system image-1

Do you really want to set boot system image? (y/N): y

Check that it is assigned for download:

esr-1000# sh bootvar
Image   Version                     Date                   Status         After reboot   
-----   -------------------------   --------------------   ------------   ------------   
1       1.4.0 build                 date 02/04/2018 time   Not Active     *              
        108[ad6366f86f]             11:39:31                                             

2       1.2.1 build                 date 25/12/2017 time   Active                        
        30[c6cfc39187]              10:20:12                                             

Reload the router:

esr-1000# reload system
Do you really want to reload system ? (y/N): y

  • Нет меток