TP-Link TL-ER6020 TL-ER6020 v1 User Guide - Page 4
Application
![]() |
View all TP-Link TL-ER6020 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 4 highlights
3.3.3 Session Limit ...58 3.3.4 Load Balance...59 3.3.5 Routing ...64 3.4 Firewall...69 3.4.1 Anti ARP Spoofing 69 3.4.2 Attack Defense ...72 3.4.3 MAC Filtering ...74 3.4.4 Access Control...75 3.4.5 App Control...81 3.5 VPN...83 3.5.1 IKE...83 3.5.2 IPsec...87 3.5.3 L2TP/PPTP...94 3.6 Services ...98 3.6.1 PPPoE Server...98 3.6.2 E-Bulletin ...104 3.6.3 Dynamic DNS ...106 3.6.4 UPnP ...112 3.7 Maintenance ...113 3.7.1 Admin Setup ...113 3.7.2 Management...116 3.7.3 License ...118 3.7.4 Statistics...119 3.7.5 Diagnostics ...121 3.7.6 Time...124 3.7.7 Logs ...125 Chapter 4 Application...127 4.1 Network Requirements...127 -III-
![](/manual_guide/products/tplink-tler6020-tler6020-v1-user-guide-1fe5db5/4.png)
-III-
3.3.3
Session Limit
...........................................................................................................
58
3.3.4
Load Balance
...........................................................................................................
59
3.3.5
Routing
....................................................................................................................
64
3.4
Firewall
.................................................................................................................................
69
3.4.1
Anti ARP Spoofing
...................................................................................................
69
3.4.2
Attack Defense
........................................................................................................
72
3.4.3
MAC Filtering
...........................................................................................................
74
3.4.4
Access Control
.........................................................................................................
75
3.4.5
App Control
..............................................................................................................
81
3.5
VPN
......................................................................................................................................
83
3.5.1
IKE
...........................................................................................................................
83
3.5.2
IPsec
........................................................................................................................
87
3.5.3
L2TP/PPTP
..............................................................................................................
94
3.6
Services
...............................................................................................................................
98
3.6.1
PPPoE Server
..........................................................................................................
98
3.6.2
E-Bulletin
...............................................................................................................
104
3.6.3
Dynamic DNS
........................................................................................................
106
3.6.4
UPnP
.....................................................................................................................
112
3.7
Maintenance
......................................................................................................................
113
3.7.1
Admin Setup
..........................................................................................................
113
3.7.2
Management
..........................................................................................................
116
3.7.3
License
..................................................................................................................
118
3.7.4
Statistics
.................................................................................................................
119
3.7.5
Diagnostics
............................................................................................................
121
3.7.6
Time
.......................................................................................................................
124
3.7.7
Logs
.......................................................................................................................
125
Chapter 4
Application
........................................................................................................
127
4.1
Network Requirements
.......................................................................................................
127