beautypg.com

Igures – Allied Telesis AT-WR4500 User Manual

Page 9

background image

AT-WR4500 Series - IEEE 802.11abgh Outdoor Wireless Routers

9

RouterOS v3 Configuration and User Guide

F

IGURES

Figure 1: AT-WR4500 Series typical application ..................................................................................................................12

Figure 2: WinBox Loader discovering .....................................................................................................................................14

Figure 3: WinBox main window................................................................................................................................................15

Figure 4: WinBox with terminal window open .....................................................................................................................15

Figure 5: Station and AP mode example .................................................................................................................................60

Figure 6: WDS Network example............................................................................................................................................62

Figure 7: Nstreme network example.......................................................................................................................................66

Figure 8: Nstreme dual network example..............................................................................................................................68

Figure 9: WEP security example ...............................................................................................................................................70

Figure 10: WPA security example ............................................................................................................................................73

Figure 11: Proxy ARP...................................................................................................................................................................90

Figure 12: Proxy ARP with PPPoE ............................................................................................................................................91

Figure 13: OSPF Backup ........................................................................................................................................................... 104

Figure 14: OSPF Routing tables .............................................................................................................................................. 108

Figure 15: OSPF Backup ........................................................................................................................................................... 109

Figure 16: Static Equal Cost Multi-Path Routing example ............................................................................................... 113

Figure 17: Standard Policy-Based Routing with Failover.................................................................................................. 114

Figure 18: DHCP Relay............................................................................................................................................................. 126

Figure 19: DHCP with RADIUS ............................................................................................................................................. 128

Figure 20: EoIP Application Example..................................................................................................................................... 152

Figure 21: Bonding two EoIP tunnels .................................................................................................................................... 156

Figure 22: IPIP Tunnel example network............................................................................................................................. 160

Figure 23: Router-to-Router Secure Tunnel Example...................................................................................................... 166

Figure 24: Secure Remote office connection through L2TP tunnel.............................................................................. 167

Figure 25: Client to Office secure connection via L2TP tunnel..................................................................................... 169

Figure 26: PPPoE Example ....................................................................................................................................................... 176

Figure 27: Network Setup without PPTP enabled............................................................................................................. 183

Figure 28: Network Setup with encrypted PPTP Tunnel ................................................................................................ 184

Figure 29: Connecting a Remote Client via and Encrypted PPTP Tunnel................................................................... 186

Figure 30: transport mode example using ESP with automatic keying......................................................................... 195

Figure 31: Add accept and masquerading rules in SRC-NAT......................................................................................... 196

Figure 32: Packet Flow Diagram............................................................................................................................................. 211

Figure 33: Firewall Connection Tracking timeouts ........................................................................................................... 213

Figure 34: HotSpot example network .................................................................................................................................. 223

Figure 35: Simple VRRP fail over example........................................................................................................................... 251

Figure 36: Host Information.................................................................................................................................................... 260

Figure 37: Network Load Statistics Matrix ......................................................................................................................... 260

Figure 38: Network load profile by time ............................................................................................................................. 261

Figure 39: Traffic Load by protocol....................................................................................................................................... 261

This manual is related to the following products: