Igures – Allied Telesis AT-WR4500 User Manual
Page 9

AT-WR4500 Series - IEEE 802.11abgh Outdoor Wireless Routers
9
RouterOS v3 Configuration and User Guide
F
IGURES
Figure 1: AT-WR4500 Series typical application ..................................................................................................................12
Figure 2: WinBox Loader discovering .....................................................................................................................................14
Figure 3: WinBox main window................................................................................................................................................15
Figure 4: WinBox with terminal window open .....................................................................................................................15
Figure 5: Station and AP mode example .................................................................................................................................60
Figure 6: WDS Network example............................................................................................................................................62
Figure 7: Nstreme network example.......................................................................................................................................66
Figure 8: Nstreme dual network example..............................................................................................................................68
Figure 9: WEP security example ...............................................................................................................................................70
Figure 10: WPA security example ............................................................................................................................................73
Figure 11: Proxy ARP...................................................................................................................................................................90
Figure 12: Proxy ARP with PPPoE ............................................................................................................................................91
Figure 13: OSPF Backup ........................................................................................................................................................... 104
Figure 14: OSPF Routing tables .............................................................................................................................................. 108
Figure 15: OSPF Backup ........................................................................................................................................................... 109
Figure 16: Static Equal Cost Multi-Path Routing example ............................................................................................... 113
Figure 17: Standard Policy-Based Routing with Failover.................................................................................................. 114
Figure 18: DHCP Relay............................................................................................................................................................. 126
Figure 19: DHCP with RADIUS ............................................................................................................................................. 128
Figure 20: EoIP Application Example..................................................................................................................................... 152
Figure 21: Bonding two EoIP tunnels .................................................................................................................................... 156
Figure 22: IPIP Tunnel example network............................................................................................................................. 160
Figure 23: Router-to-Router Secure Tunnel Example...................................................................................................... 166
Figure 24: Secure Remote office connection through L2TP tunnel.............................................................................. 167
Figure 25: Client to Office secure connection via L2TP tunnel..................................................................................... 169
Figure 26: PPPoE Example ....................................................................................................................................................... 176
Figure 27: Network Setup without PPTP enabled............................................................................................................. 183
Figure 28: Network Setup with encrypted PPTP Tunnel ................................................................................................ 184
Figure 29: Connecting a Remote Client via and Encrypted PPTP Tunnel................................................................... 186
Figure 30: transport mode example using ESP with automatic keying......................................................................... 195
Figure 31: Add accept and masquerading rules in SRC-NAT......................................................................................... 196
Figure 32: Packet Flow Diagram............................................................................................................................................. 211
Figure 33: Firewall Connection Tracking timeouts ........................................................................................................... 213
Figure 34: HotSpot example network .................................................................................................................................. 223
Figure 35: Simple VRRP fail over example........................................................................................................................... 251
Figure 36: Host Information.................................................................................................................................................... 260
Figure 37: Network Load Statistics Matrix ......................................................................................................................... 260
Figure 38: Network load profile by time ............................................................................................................................. 261
Figure 39: Traffic Load by protocol....................................................................................................................................... 261