TP-LINK multi-WAN port | Gigabit Enterprise Routers | high-performance enterprise routing TL-ER6120G

TP-LINK multi-WAN port | Gigabit Enterprise Routers | high-performance enterprise routing TL-ER6120G

Product description:

Product parameters:

  • Product Name: TP-Link / P-linking technology TL-E ...
  • Brand: TP-Link / Cape linking technology
  • TP-Link Model: TL-ER6120G
  • Color Classification: BUCEROS / character
  • Are Wireless: Wired
  • Wired router speed: 1000Mbps
  • Wired transfer rate: 10/100 / 1000Mbps
  • Wireless transfer rate: None
  • Network standard: 802.11n 802.11b 802.11g
  • Wireless network support frequency: Not supported
  • Applicable objects: Broadband VPN Router Broadband Router cafes dedicated enterprise-class router network router security services routers carrier-class high-end router broadband router
  • Number of USB interface: Does not support
  • Whether to support VPN: Support
  • Are built-in firewall: Yes
  • Support WDS: not supported
  • Whether to support WPS: does not support
  • Are Detachable: None
  • Service: Genius
  • Condition: New
  • Packaging volume: 528mm X 336mm X 100mm
  • GW: 3.68KG

Multi-WAN port Gigabit VPN enterprise router

  • 1 10/100 / 1000M WAN port, a 10/100 / 1000M LAN port, three 10/100 / 1000M WAN / LAN ports can be configured
  • 64-bit network processor, 128MB DDRII high-speed memory
  • Traffic balancing strategy and backup lines, to meet the needs of multi-line access
  • QQ / MSN / Thunder / financial software limitations, URL filtering and access control lists
  • Internal and external network protection and common ARP attack protection
  • Flexible bandwidth management and IP connection limit

TL-ER6120G TP-LINK is designed for enterprise applications and the development of VPN router products, with powerful data processing capability, and support for a wealth of software features, including VPN, IP / MAC address binding, common attack prevention, access control lists, QQ / MSN / Thunder / financial software restrictions, IP bandwidth control, limit the number of connections and electronic bulletin board and other functions, suitable for business, residential, hotels and other established a safe, efficient, easy to manage network.

Powerful data processing capability

64-bit network processor, 128MB DDRII high-speed memory, packet processing capacity has been significantly improved, enabling LAN, wire-speed forwarding data between the WAN port.

It supports a variety of VPN, remote access security guarantee

It provides standard IPSec VPN, support for data integrity check, data origin authentication, anti-replay and data packet encryption (DES, 3DES, AES128, AES192, AES256 encryption algorithm, etc.); support for IKE and manual mode to establish a VPN tunnel and supports configuring VPN connections through its domain name;

Provide PPTP / L2TP VPN, support PPTP / L2TP VPN server mode, allowing traveling employees remote or branch structure secure access to corporate networks.

Various means to control employee Internet behavior

By configuring the basic access control rules to allow or prohibit employees to use a variety of network applications, including FTP downloads, e-mail, Web browsing, video and voice communications. At the same time support the user group based access control rules and time periods can be realized employee Internet refined rights management.

Work online chat, download files and private stocks / finance three major ills affect employee productivity and the quality of the company's network, TL-ER6110 / TL-ER6120 provides for three types of application of this ban a key feature, simply configure page by checking the appropriate option to prohibit employees to use common IM software (QQ / Web QQ / MSN), P2P software (Thunder) and financial software (great wisdom, analysts, straight flush). the routers support user-based group Configuring ban policy, you can assign different permissions for different users to ensure that the key to the user's normal use.

Support site blacklist and whitelist filtering policy based on user groups and to limit employee access to various sites, to avoid access to potentially malicious websites harm caused.

Comprehensive attack protection

Provides IP and MAC addresses automatically scan and a key binding function, can be bound to the LAN port (network), WAN port (external network) Host IP and MAC address information, to effectively prevent internal / external network ARP spoofing to avoid ARP spoofing caused by network dropped the issue;

When subjected to ARP spoofing, you can take the initiative to send the specified frequency ARP correct information in a timely manner to restore the network to normal state, effectively reduce the degree of harm.

Internal support / external network attack protection, can effectively prevent a variety of common DoS attacks, scanning attack, suspicious package aggressive behavior, such as: TCP Syn Flood, UDP Flood, ICMP Flood, WinNuke attacks, fragmented packet attacks, WAN mouth ping, TCP Scan (Stealth FIN / Xmas / Null), IP spoofing.

Support filtering based on MAC addresses, effectively blocking the access of invalid hosts.

User name and password of the device administrator via encrypted transmission, to avoid the possibility of being stolen by someone else managed accounts, while providing overtime protection function, reduce the risk of unauthorized users to get control of the system; the same time, by defining the management device administrator number, to avoid duplication of configuration or multiple administrators to manage conflicts caused by the router, to improve system stability.

Flexible bandwidth management policy

It can be carried out for each host in the network (IP) bidirectional bandwidth control, effectively inhibit BT, Thunder and other P2P applications over bandwidth, avoid network game cards, the problem of slow Internet speed, network security always smooth.

IP-based connection limit function, the number of connections to limit the share of each computer, the rational use of limited NAT connection resources and prevent a few users take up a lot over the number of connections to ensure that games, Internet, chat, video, voice and other smooth get on.

Multi-WAN port load balancing and backup lines

TL-ER6120 provides a 10/100 / 1000M fixed WAN port, a 10/100 / 1000M fixed LAN ports and three 10/100 / 1000M WAN / LAN can be configured to port users the flexibility to configure the WAN port based on the actual network requirements quantity to meet the networking needs of multi-line access;

Support a variety of load balancing policy under the multi-WAN port models, including intelligent balance, special application routing, ISP routing, policy routing, etc., multi-pronged approach, we can take full advantage of the bandwidth WAN port, protect user investment;

WAN port supports backup, once the main line fails, traffic will quickly switch to the backup line to ensure the normal operation of the network, while also configuring a backup WAN port is enabled by time period, more flexibility.

Management and maintenance convenience

All-Chinese style Web interface operation, all functions can be configured through a graphical interface, each of which are configured to provide the necessary information to help explain, user-friendly configuration of the router.

Provide a list of logs and log server function, detailed logging regulatory network operation, to help quickly identify network anomalies, locate the source of the problem in time to troubleshoot network problems; provide a graphical interface, real-time monitoring of CPU utilization and other key resources inside the router, to detect potential the dangers and attacks.

Support local (LAN) or remotely (via the Internet) router management, convenience chain management and remote assistance; support Ping detection, routing tracking tool to detect a variety of fault detection, and can back up and import router configuration files to facilitate routine maintenance and management .

It provides log classification mechanism to achieve eight levels of logging service user the freedom to customize the log information; also supports the log server function, user log information in a timely manner exported for backup or further analysis.

It provides free software upgrades, and always pay attention to the latest changes in network demand, allowing users to enjoy lasting latest software features and services

Networking standards

IEEE 802.3, IEEE 802.3u, IEEE 802.3x


10/100 / 1000M RJ45 WAN port

1~ 4

10/100 / 1000M RJ45 LAN port

1~ 4

10/100 / 1000M RJ45 DMZ port


Console port

1 (RJ45)


MIPS 64-bit network processor 500MHz






Per port

Link / Act, Speed

Per Device

PWR, M1 / ​​M2


Operating temperature: 0 ℃ ~ 40 ℃

Humidity: 10% ~ 90% RH non-condensing

Storage temperature: -40 ℃ ~ 70 ℃

Storage humidity: 5% ~ 90% RH non-condensing

Input Power

100-240V ~, 50 / 60Hz


Natural cooling thermal silica +


440x220x44 (mm)

Software Specifications

Network protocol


Basic functions

System Mode

System Mode

NAT mode, routing mode, full mode

WAN port characteristics


Dynamic IP, static IP, PPPoE, L2TP, PPTP

LAN Port Features

DHCP server

stand by

Client List

stand by

Static address assignment

stand by

MAC address modification

stand by

Switch settings

Port Statistics

stand by

Port Monitor

stand by

Port Traffic restrictions

stand by

Port Vlan

stand by

Transmission control

Forwarding rules

One NAT mapping


virtual server


Port Triggering




IP bandwidth control


Connection Limit


Traffic / Connections Monitor

stand by

The maximum number of concurrent connections


Flow balance

Intelligent balanced policy routing, ISP routing, application specific routing

Line backup

Support backup group settings

Support scheduled backup, backup mode failure

Routing Settings

Static Routing

stand by

RIP Service

stand by

security strategy

ARP Protection


stand by

IP MAC binding


ARP Scan

stand by

ARP list

stand by

Attack Protection

Anti-DoS category, scan type, suspicious package three categories common aggressive behavior

MAC filtering

Black and white list support

Access Policy

URL Filtering

Access Control Lists

Application Control

IM limit

QQ / Web QQ / MSN / Fetion / Ali Want / Skype

P2P restrictions

Thunder / Thunder look / BitComet / eDonkey / QQLive / PPStream / PPTV

Financial Software Restriction

Great wisdom / analyst / Flush / Longsheng / compass / Securities Star / China Merchants Securities / GF Securities

Game Restriction

QQ Games / Games Thunder / Lianzhong World / Holdfast platform / Fantasy Westward Journey / World of Warcraft / Kart / Happy Farm / QQ Farm

Basic application restrictions

Submit http / http / https / mms / rtsp

Agent Limitations

http proxy / socks4 proxy / socks5 proxy

Group Management

User group management

stand by



64 tunnels


32 tunnels


32 tunnels

system service

PPPoE server

With a machine capacity 256

Electronic bulletin

stand by

Dynamic DNS

stand by

UPnP service

stand by

Management and maintenance

Device Management


Chinese Web interface, CLI management (serial / Telnet), remote management

Backup and Import Configuration

stand by

software upgrade

stand by

Traffic Statistics

Interface traffic statistics

stand by

IP traffic statistics

stand by

Diagnostic tools

Diagnostic tools

ping, tracert

Line detection

stand by

System Log

System Log

stand by