Table of Contents
1. Introduction ...................................................................................................................................... 1-1
Overview ........................................................................................................................................... 1-2
Package Checklist ............................................................................................................................... 1-2
Features ............................................................................................................................................ 1-2
Industrial Networking Capability .................................................................................................... 1-2
Designed for Industrial Applications ............................................................................................... 1-2
Useful Utility and Remote Configuration ......................................................................................... 1-2
2. Getting Started.................................................................................................................................. 2-1
RS-232 Console Configuration (115200, None, 8, 1, VT100) .................................................................... 2-2
Using Telnet to Access the Industrial Secure Router’s Console .................................................................. 2-3
Using a Web Browser to Configure the Industrial Secure Router ............................................................... 2-4
3. EDR-810 Series Features and Functions ............................................................................................ 3-1
Quick Setting Profile ............................................................................................................................ 3-2
System .............................................................................................................................................. 3-5
System Information ..................................................................................................................... 3-5
User Account .............................................................................................................................. 3-6
Date and Time ............................................................................................................................ 3-8
Warning Notification .................................................................................................................... 3-9
SettingCheck ............................................................................................................................ 3-13
System File Update—by Remote TFTP .......................................................................................... 3-14
System File Update—by Local Import/Export ................................................................................ 3-15
Restart ..................................................................................................................................... 3-16
Reset to Factory Default ............................................................................................................. 3-16
Port ................................................................................................................................................ 3-16
Port Settings ............................................................................................................................. 3-16
Link Aggregation ....................................................................................................................... 3-18
The Port Trunking Concept ......................................................................................................... 3-18
Port Mirror ................................................................................................................................ 3-19
Using Virtual LAN .............................................................................................................................. 3-20
The VLAN Concept ..................................................................................................................... 3-20
Configuring Virtual LAN .............................................................................................................. 3-21
Multicast .......................................................................................................................................... 3-23
The Concept of Multicast Filtering ................................................................................................ 3-23
IGMP Snooping ......................................................................................................................... 3-26
IGMP Snooping Settings ............................................................................................................. 3-26
IGMP Table ............................................................................................................................... 3-26
Stream Table ............................................................................................................................ 3-27
Static Multicast MAC .................................................................................................................. 3-27
QoS and Rate Control ........................................................................................................................ 3-28
QoS Classification ...................................................................................................................... 3-28
CoS Mapping ............................................................................................................................ 3-29
ToS/DSCP Mapping .................................................................................................................... 3-30
Rate Limiting ............................................................................................................................ 3-30
MAC Address Table ........................................................................................................................... 3-31
Interface ......................................................................................................................................... 3-32
WAN ........................................................................................................................................ 3-32
LAN ......................................................................................................................................... 3-35
Network Service ............................................................................................................................... 3-35
DHCP Settings .......................................................................................................................... 3-35
SNMP Settings .......................................................................................................................... 3-39
Dynamic DNS ........................................................................................................................... 3-41
Security ........................................................................................................................................... 3-42
User Interface Management ........................................................................................................ 3-42
Authentication Certificate ........................................................................................................... 3-43
Trusted Access .......................................................................................................................... 3-43
RADIUS Server Settings ............................................................................................................. 3-44
Monitor............................................................................................................................................ 3-44
Interface Statistics .................................................................................................................... 3-44
Port Statistics ........................................................................................................................... 3-45
Event Log ................................................................................................................................. 3-46
4. EDR-G902/G903 Series Features and Functions................................................................................ 4-1
Overview ........................................................................................................................................... 4-2
Configuring Basic Settings ................................................................................................................... 4-3
System Identification ................................................................................................................... 4-3
Accessible IP ............................................................................................................................... 4-4
Password.................................................................................................................................... 4-5
Time .......................................................................................................................................... 4-6