[Digital Electronics] - [Network equipment]

TP-LINK TL-ER6520G Enterprise Router | Multi-WAN Full Gigabit | Support multiple authentication

Product code: -13472500030
Unit price 511.17$
Sold quantity 182
Available stock 81
Expired or Cancelled

Product parameters:

  • Product name: TP-Link / TL-E ...
  • Brand: TP-Link / 普联 技术
  • TP-Link Model Number: TL-ER6520G
  • Color classification: dark gray
  • Wireless: Wired
  • Cable router speed: 1000Mbps
  • Cable transmission rate: 10/100 / 1000Mbps
  • Wireless transmission rate: None
  • Network standard: 802.3u 802.3 802.2 802.3x 802.1x
  • Wireless network support Frequency: Not supported
  • Applicable to: Broadband VPN Router Internet cafes dedicated broadband router Enterprise Routers Network Security Routers Multiservice Routers Carrier-class high-end routers Broadband Router
  • USB interface quantity: Not supported
  • Whether to support VPN: support
  • Yes No Built-in firewall: Yes
  • WDS support: Not supported
  • WPS: Not supported
  • Removable: None
  • After-sales service: Genius
  • Condition: New
  • Packing volume: 440x227x44 (mm)

Dual-core full-Gigabit enterprise VPN router

  • Five 10/100 / 1000M Ethernet RJ45 ports
  • Dual-core 64-bit network dedicated processor, single-core clocked at 500MHz
  • 256MB DDRII high speed memory
  • Internet behavior management, URL filtering and access control list
  • Internal and external network ARP protection and common attack protection
  • Intelligent IP bandwidth management and connection limit
  • Traffic balancing strategy and line backup to meet the multi-line access needs

TL-ER6520G is a dual-core, full-Gigabit enterprise VPN router developed by TP-LINK. It is mainly targeted at the network environments that require high-speed Internet access, online behavior management and remote secure communication in enterprises, offices, parks and hotel chains. -ER6520G dual-core 64-bit network processor, single-core frequency up to 500MHz, with 256MB DDRII high-speed memory, with a strong network data forwarding capabilities, while supporting IPSec / PPTP / L2TP VPN, Internet behavior management, firewall, flow control and Electronic bulletins and other rich features, suitable for the formation of safe, efficient and easy to manage the entire Gigabit enterprise network.

High-speed and stable dual-core full Gigabit hardware platform

Using dual-core 64-bit network processor, 256MB DDRII high-speed memory, packet processing capacity has been greatly enhanced, can achieve Gigabit-level data forwarding.

Flexible and practical interface configuration

It provides five 10/100 / 1000M physical ports. The five physical ports in the factory state do not distinguish between WAN and LAN roles. You can divide the network into different segments according to actual needs (such as WAN, LAN, DMZ Etc.), and then the physical port freely assigned to each sector, with a very high flexibility.Also supports a physical port binding multiple virtual interfaces, such as eth interface, PPPoE interface, L2TP interface, PPTP interface, greatly enhance Physical port flexibility to adapt to complex network requirements.

Secure and reliable IPSec / PPTP / L2TP VPN

Supports IKE and manual mode to set up VPN connection (IPSec, IPSec, IPSec, IPSec, IPSec, IPSec, VPN). It supports standard IPSec VPN functions, such as DES, 3DES, AES128, AES192, and AES256, and supports data integrity, data source authentication, packet replay and data encryption. , And for domestic users to use more dynamic IP, PPPoE dial-up access network features, allowing the configuration of VPN connection through the domain name; Allow up to the establishment of 200 IPSec VPN tunnels to meet the corporate headquarters and branch offices, enterprises and Business partners / suppliers to establish long-distance secure communications needs.

Supports PPTP / L2TP server and client functions, allowing the establishment of up to 100 PPTP VPN tunnels and 100 L2TP VPN tunnels.Users can choose according to the actual needs of flexible use of server and client functions: When deployed in corporate headquarters, the general use of PPTP / L2TP server function to meet the needs of employees or branch offices remote secure access to the company network needs; When you need to establish a VPN connection with the remote PPTP / L2TP server, you need to use PPTP / L2TP client function.

Comprehensive and effective online behavior management

(QQ / Web QQ / MSN / Ali Want, etc.), P2P software (Thunder / Thunder to see / eDonkey, etc.), financial software (such as software) (Http proxy, socks4 proxy, socks5 proxy), etc., a total of up to nearly 60 species, just in the game (QQ games, Thunder games, happy farm, QQ farms, etc.) Configuration page, select the appropriate option, you can control the permissions of the staff to support the user group configuration blocking policy can be assigned to different users different permissions to ensure the normal use of key users.

Support for black and white sites and user groups based on the filtering strategy can limit staff access to various types of Web sites, to avoid the potential harm of access to malicious Web sites.

Rich security policy

By configuring basic access control rules, you can enable or disable employees to use a variety of network applications, including FTP download, send and receive mail, Web browsing, video and voice communications, etc. On the staff of the Internet access to the fine management.

Provides IP and MAC address auto-scan and one-button binding function, which can bind IP address and MAC address information of LAN port (internal network) and WAN port (external network) at the same time, effectively prevent ARP spoofing within / outside network; ARP spoofing caused by the problem of network dropped; ARP spoofing in time, according to the frequency of the initiative to send ARP correction information in a timely manner to restore the normal state of the network, effectively reduce the degree of harm.

It can protect against common DoS attacks, scanning attacks, and suspicious packet attacks, such as: TCP Syn Flood, UDP Flood, ICMP Flood, WinNuke attack, fragment attack, WAN attack, and WAN attack defense. Port ping, TCP Scan (Stealth FIN / Xmas / Null), IP spoofing and so on.

Supports MAC address-based filtering to effectively block access to illegal hosts.

Flexible flow control

Supports intelligent IP bandwidth control function, according to the actual bandwidth utilization flexibility to enable bandwidth control strategy for each host in the network (IP) for two-way bandwidth control, effectively inhibit BT, Thunder P2P applications such as excessive bandwidth, avoid network Game cards, slow Internet access issues, to protect the network at all times.

IP-based connection limit function to limit the number of connections per computer, the rational use of a limited number of NAT connections to prevent a small number of users over a large number of connections to ensure that the game, Internet, chat, video, voice and other smooth get on.

It supports multiple load balancing strategies, such as intelligent equalization, special application routing, ISP routing, and policy routing. In this way, it can effectively improve network service quality and make full use of interface bandwidth to enhance network experience and protect users' investment.

Convenient and practical management and maintenance

All Chinese Web interface operating style, all functions can be configured through the graphical interface, each configuration provides the necessary help information, user-configured router.

Provide log list and log server functions, detailed logging to monitor the operation of the network to help quickly detect network anomalies, locate the source of the problem in a timely manner to exclude network failure; provide graphical interface, real-time monitoring of CPU utilization and other key resources within the router, Of the various dangers and attacks.

Support for local LAN or Internet remote management router to facilitate chain operations and remote assistance; support Ping detection, routing, and other fault detection detection tool, and can backup and import the router configuration file to facilitate routine maintenance and management.

Hardware specifications

Network standards

IEEE 802.3, IEEE 802.3u, IEEE 802.3ab, IEEE 802.3x


Five 10/100 / 1000M Ethernet electrical ports

One console port (RJ45)


Dual-core 64-bit MIPS network-specific processor, single-core frequency 500MHz





Indicator light

Per port

Link / Act, Speed

Per device


Input power

100-240 V ~, 50/60 Hz

Cooling mode

Thermal silicone + natural cooling


440x227x44 (mm)

Use of the environment

Operating temperature: 0 ℃ ~ 40 ℃

Operating humidity: 10% to 90% RH non-condensing

Storage temperature: -40 ℃ ~ 70 ℃

Storage humidity: 5% to 90% RH non-condensing

Software specifications

Network protocol


basic settings

Interface Settings

Customize the section

Customize the interface

DHCP service



Switch settings

Port statistics, port monitoring, and port traffic limit

Quick Configuration Wizard

Transmission control



One to one NAT

virtual server

Port Trigger

ALG services



IP bandwidth control

Connection limit

Traffic / connections monitoring

Maximum number of concurrent connections


Traffic balance

Intelligent equalization, special application routing, policy routing, and ISP routing

Line backup

Regular backup, fault backup

Route settings

Static routes

RIP services

System Routing View

Security Management

ARP protection

IP MAC binding


ARP scanning

ARP list

Attack Protection

MAC filtering

Access Policy

Access Control Rules

URL filtering

Application control

Instant messaging software restrictions

QQ / Web QQ / MSN / Fetion / Ali Want / Skype / Gtalk / Tencent TM / play more YY

P2P software restrictions

Thunder / Thunder to see / bit comet / eDonkey / QQLive / PPStream / PPTV / Flashget

Financial Software Restrictions

Big Wisdom / Analyst / Flush / Qianlong / Compass / Securities Star / China Merchants Securities / GF Securities, etc.

Game software restrictions

QQ games / Thunder games / Lianzhong world / Hao Fang platform / Fantasy Westward Journey / World of Warcraft / KartRider

Video Software Restrictions

Fast broadcast / popular / Phi Phi / UUSee / CNTV / PPTV / QQLive / PPStream

Web Game Limitations

Happy Farm / QQ farm

Music Software Restrictions

Cool dog / cool me / QQ music / TTPlayer

Basic Application Restrictions

Http / http submit / https / mms / rtsp

Agent Restrictions

Http proxy / socks4 proxy / socks5 proxy



200 tunnels


100 tunnels


100 tunnels

system service

Electronic bulletin

Dynamic DNS

UPnP service

DNS proxy

System parameters

Management and maintenance

Equipment management


Chinese Web management, CLI management, Telnet management, remote management

Administrator account settings

Modify the account, modify the timeout, modify the management port

Backup and import configurations

software upgrade

system status

Hardware and software version, system time, CPU utilization, interface status

Traffic Statistics

Interface traffic statistics

IP traffic statistics

Diagnostic tools

Diagnostic tools

Ping, tracert

On-line detection

System log

System log

Enterprise network typical application


TL-ER6520G uses dual-core Gigabit hardware platform, deployed in the corporate headquarters as an export gateway to meet the internal and external network traffic data forwarding needs; while providing a flexible interface layout to support the simultaneous connection of multiple broadband lines and provide a wealth of Traffic balance and line backup strategy to ensure fast and stable corporate Internet traffic forwarding; Internet employees for the diversity of behavior, difficult control of the problem, the router provides a powerful online behavior management capabilities to help network administrators easily regulate the use of Internet access; IPSec / PPTP / L2TP VPN to meet the needs of corporate headquarters and branch offices, staff travel remote security communications needs; with TP-LINK Gigabit switch products, easy to set up fast, efficient, secure and easy to manage the entire Gigabit enterprise network.

Apply the topology

Equipment List

Types of

Product number

product name

Headquarters export router


Dual-core full-Gigabit enterprise VPN router

Headquarters central switch


24 +4 full Gigabit Layer 2 full Managed Switch

Headquarters access switch


24 + 4G Gigabit Layer 2 network switch

Branch egress router

TL-ER6110 / TL-ER6120

Enterprise VPN Router