User's Manual

EnRoute50x/51x User’s Guide
TR0153 Rev. E1 7
13 Client IP Configuration via DHCP ................................................................... 99
13.1 Using the Local DHCP Server.............................................................................99
13.2 Using a Centralized DHCP Server ....................................................................102
13.2.1 Support for Clients with Static IP Addresses.................................................... 103
13.2.2 Configuring the EnRoute500s .......................................................................... 103
13.2.3 Configuring the Central DHCP Server.............................................................. 106
14 Connecting an EnRoute500 Mesh Network to a WAN................................. 107
14.1 Static Routing Configuration on WAN Router....................................................107
14.1.1 “Single Gateway, Implicit Addressing Scheme” Option .................................... 107
14.1.2 “Single Gateway, Explicit Addressing Scheme” Option.................................... 108
14.1.3 “Multiple Gateway, Implicit Addressing Scheme” Option.................................. 108
14.1.4 “Multiple Gateway, Explicit Addressing Scheme” Option ................................. 109
14.2 Network Address Translation (NAT) on Mesh Gateways ..................................109
14.3 Layer 2 Mesh Emulation in DHCP Relay Mode.................................................110
14.4 VPN Access to a Mesh Gateway ......................................................................111
15 Controlling Access to the EnRoute500 ........................................................ 112
15.1 Firewall..............................................................................................................112
15.2 Gateway Firewall...............................................................................................113
15.3 Blocking Client-to-Client Traffic.........................................................................114
15.4 Connection Tracking .........................................................................................116
15.4.1 Limiting Number of TCP Connections Per Client Device.................................. 116
15.4.2 Connection Tracking Table Size ...................................................................... 116
15.4.3 Connection Tracking Timeout .......................................................................... 117
15.5 Custom Firewall Rules ......................................................................................117
15.6 Access Control Lists (ACLs)..............................................................................119
15.6.1 Access Point Access Control Lists (ACLs)....................................................... 119
15.6.2 Mesh ACL ........................................................................................................ 120
16 Quality of Service (QoS) Configuration........................................................ 122
16.1 Priority Levels....................................................................................................122
16.2 Rate Limiting .....................................................................................................125
16.3 Rate Reservation ..............................................................................................127
17 Enabling VLAN Tagging ................................................................................ 130
17.1 Client Access Interface Configuration ...............................................................130
17.2 Gateway Configuration......................................................................................131
18 Integration with Enterprise Equipment ........................................................ 133
18.1 Configuring Splash Pages.................................................................................133
18.1.1 Enabling Splash Pages .................................................................................... 133
18.1.2 Configuring Splash URLs................................................................................. 135
18.1.3 Sample HTML Code for Splash Pages............................................................. 136
18.1.4 Configuring the Authentication Server.............................................................. 137
18.1.5 Trusted MAC Addresses .................................................................................. 138
18.1.6 Bypass Splash Pages for Access to Specific Hosts ......................................... 139