[Digital Electronics] - [Network equipment]

TP-LINK TL-ER6120G multi-WAN port | tplink Gigabit Enterprise Internet behavior management router

TP-LINK TL-ER6120G multi-WAN port | tplink Gigabit Enterprise Internet behavior management router
Product code: 38340300030
Unit price 268.69$
Sold quantity 238
Available stock 764

Product parameters:

  • Product Name: TP-Link / Punt Technology TL-E ...
  • Brand: TP-Link / Punt technology
  • TP-Link Model: TL-ER6120G
  • Color classification: BUCEROS / character color
  • Whether wireless: wired
  • Wired router speed: 1000Mbps
  • Wired transmission rate: 10/100 / 1000Mbps
  • Wireless transmission rate: none
  • Network standard: 802.11b 802.11g 802.11n
  • Wireless network support frequency: not supported
  • Applicable to: broadband VPN router Internet cafes dedicated broadband router Enterprise-class router Network security router Multi-service router Carrier-class high-end router Broadband router
  • USB interface number: not supported
  • Whether to support VPN: support
  • Whether built-in firewall: yes
  • Whether to support WDS: not supported
  • Whether to support WPS: not supported
  • Whether it is detachable: no
  • After - sales service: Genius
  • Condition: New
  • Packing volume: 528mm X 336mm X 100mm
  • Gross Weight: 3.68KG

Multi-WAN full Gigabit enterprise VPN router

  • 1 10/100 / 1000M WAN port, 1 10/100 / 1000M LAN port, 3 10/100 / 1000M WAN / LAN configurable ports
  • Traffic balance strategy and line backup to meet the needs of multi-line access
  • QQ / MSN / Thunder / financial software restrictions, URL filtering and access control list
  • Internal and external network ARP protection and common attack protection
  • Flexible IP Bandwidth Management and Connection Limit

The TL-ER6120G is a VPN router product developed by TP-LINK for enterprise applications. It has powerful data processing capabilities and supports a wealth of software features including VPN, IP / MAC address binding, common attack protection, access control list, QQ / MSN / Thunder / financial software restrictions, IP bandwidth control, restrictions on the number of connections and electronic bulletins and other functions, suitable for enterprises, communities, hotels and other security, efficient, easy to manage the network.

Powerful data processing capabilities

Using 64-bit network dedicated processor, 128MB DDRII high-speed memory, packet processing capacity has been greatly improved, LAN, WAN port data between the wire-speed forwarding.

Support a variety of VPN, to ensure remote access security

(DES, 3DES, AES128, AES192, AES256 and other encryption algorithms); support IKE and manual mode to establish VPN tunnels (data encryption), support for data integrity verification, data source authentication, anti-packet playback and data encryption , And support the domain name configuration through the VPN connection;

Provide PPTP / L2TP VPN function, support PPTP / L2TP VPN server mode, allowing employees or branch offices to remotely secure access to the company network.

A variety of means to control the behavior of employees online

By configuring basic access control rules, employees can use a variety of network applications, including FTP download, send and receive mail, Web browsing, video and voice communications, etc. Support for user groups and time-based access control rules can be achieved The staff of the Internet access to the fine management.

TL-ER6110 / TL-ER6120 provides a one-click blocking function for these three types of applications. It is only necessary to use the TL-ER6110 / TL-ER6120 for the three key applications of the three types of applications. (QQ / Web QQ / MSN), P2P software (Thunder) and financial software (great wisdom, analyst, flush). The series of routers support based on the user group Configure the blocking strategy, for different users can be assigned different permissions to ensure the normal use of key users.

Support for web-based whitelist lists and user group filtering strategies to restrict access to various types of sites and avoid the potential for access to malicious Web sites.

Comprehensive attack protection capability

It provides IP and MAC address auto-scanning and one-key binding function. It can bind the IP address and MAC address information of the LAN port and the WAN port at the same time. ARP spoofing caused by the problem of network dropped;

In the case of ARP spoofing, ARP can be sent according to the specified frequency to correct the information, in a timely manner to restore the normal state of the network, effectively reduce the degree of harm.

Support internal / external network attack protection function, can effectively prevent a variety of common DoS attacks, scanning attacks, suspicious package attacks, such as: TCP Syn Flood, UDP Flood, ICMP Flood, WinNuke attacks, fragmented packet attacks, WAN Ping, TCP Scan (Stealth FIN / Xmas / Null), IP spoofing, etc.

Supports MAC address-based filtering to effectively block access to illegal hosts.

The administrator name and the login password of the device administrator are transmitted after encryption, avoid the possibility of stealing the management account by others, and provide the timeout protection function to reduce the risk that the illegal user obtains the system control right. By restricting the administrator who manages the device at the same time Number, to avoid the number of administrators at the same time management of the router caused by the repeated configuration or configuration conflict, improve system stability.

Flexible bandwidth management strategy

Can be for each host (IP) in the network for two-way bandwidth control, effectively inhibit BT, Thunder and other P2P applications over-occupied bandwidth, to avoid the network game card, Internet speed problems, to ensure smooth network time.

Provide IP-based connection limit function, can limit the number of connections per computer, the rational use of limited number of NAT connection resources, to prevent a small number of users over-occupied a large number of connections to ensure that games, Internet, chat, video and other smooth get on.

Multi-WAN port load balancing and line backup

The TL-ER6120 provides a 10/100 / 1000M fixed WAN port, a 10/100 / 1000M fixed LAN port and three 10/100 / 1000M WAN / LAN configurable ports. The user can flexibly configure the WAN port according to the actual network requirements. Quantity, to meet the needs of a number of line access network;

Multi-WAN port mode to support a variety of load balancing strategies, including intelligent equalization, special application routing, ISP routing, strategy routing, multi-pronged, WAN port bandwidth can be fully utilized to protect user investment;

Support WAN port backup function, once the main line fails, the traffic will quickly switch to the backup line to ensure the normal operation of the network.At the same time can also configure the backup WAN port by time to enable, more flexible.

Easy management and maintenance

All Chinese Web interface operation style, all functions can be configured through the graphical interface, each configuration provides the necessary help information, user-friendly configuration of the router.

Provide log list and log server function, detailed log records to monitor the network operation, to help quickly find the network anomalies, locate the source of the problem in time to eliminate network failure; provide graphical interface, real-time monitoring CPU utilization and other key resources within the router, Of various dangers and attacks.

Support local management (local area network) or remote (through the Internet) to manage the router, to facilitate chain operations and remote assistance; support Ping detection, routing tracing detection and other fault detection tools, and can back up and import router configuration file for routine maintenance and management The

Provide log hierarchical mechanism, can achieve 8 levels of log services, user-friendly custom log information; at the same time support the log server function, user-friendly log information in a timely manner for export or further analysis.

Provide free software upgrades, keep abreast of the latest changes and needs of the network, allowing users to enjoy the latest software features and services

Network standard

IEEE 802.3, IEEE 802.3u, IEEE 802.3x


10/100 / 1000M RJ45 WAN ports

1~ 4

10/100 / 1000M RJ45 LAN port

1~ 4

10/100 / 1000M RJ45 DMZ port


Console port

1 (RJ45)


MIPS 64-bit network processor 500MHz





Indicator light

Per port

Link / Act, Speed

Per device

PWR, M1 / ​​M2

Use the environment

Working temperature: 0 ℃ ~ 40 ℃

Operating humidity: 10% to 90% RH non-condensing

Storage temperature: -40 ℃ ~ 70 ℃

Storage humidity: 5% to 90% RH non-condensing

Input power

100-240V ~, 50 / 60Hz

Cooling method

Thermal silica gel + natural heat dissipation


440x220x44 (mm)

Software specifications

Network protocol


basic skills

System mode

System mode

NAT mode, routing mode, full mode

WAN port features

Access method

Dynamic IP, static IP, PPPoE, L2TP, PPTP

LAN port feature

DHCP server

stand by

Client List

stand by

Static address allocation

stand by

MAC address modification

stand by

Switch settings

Port statistics

stand by

Port monitoring

stand by

Port traffic limit

stand by

Port Vlan

stand by

Transmission control

Forwarding rules

One-to-one NAT mapping

16 articles

virtual server

32 articles

Port trigger

16 articles

ALG service


IP bandwidth control


Number of connections


Traffic / connection monitoring

stand by

Maximum number of concurrent connections


Traffic balance

Intelligent balance, strategy routing, ISP routing, special application routing

Line backup

Support for backup group settings

Supports scheduled backup, fault backup mode

Routing settings

Static routing

stand by

RIP services

stand by

security strategy

ARP protection


stand by

IP MAC binding


ARP scan

stand by

ARP list

stand by

Attack protection

Anti-DoS class, scanning class, suspicious package three categories common attack behavior

MAC filtering

Support black and white list

Access strategy

URL filtering

Access control list

Application control

IM restrictions

QQ / Web QQ / MSN / Fetion / Ali Want / Skype

P2P restrictions

Thunder / Thunder Look / Bit Comet / eDonkey / QQLive / PPStream / PPTV

Financial software restrictions

Big wisdom / analyst / flush / Qianlong / compass / securities star / investment securities / GF Securities

Game restrictions

QQ Game / Thunder Game / Lianzhong World / Hao Fang Platform / Fantasy Westward Journey / World of Warcraft / KartRider / Happy Farm / QQ Farm

Basic application limits

Http submission / http / https / mms / rtsp

Proxy restrictions

Http proxy / socks4 proxy / socks5 proxy

Group management

User group management

stand by



64 tunnels


32 tunnels


32 tunnels

system service

PPPoE server

With the amount of 256

Electronic bulletin

stand by

Dynamic DNS

stand by

UPnP service

stand by

Management and maintenance

Equipment management

Management style

Chinese Web management, CLI management (serial / Telnet), remote management

Backup and import configuration

stand by

software upgrade

stand by

Traffic Statistics

Interface traffic statistics

stand by

IP traffic statistics

stand by

Diagnostic tools

Diagnostic tools

Ping, tracert

online test

stand by

System log

System log

stand by