- Product name: TP-Link / TL-E ...
- Brand: TP-Link / 普联 技术
- TP-Link Model Number: TL-ER6120G
- Color classification: BUCEROS / character
- Wireless: Wired
- Cable router speed: 1000Mbps
- Cable transmission rate: 10/100 / 1000Mbps
- Wireless transmission rate: None
- Network standards: 802.11b 802.11g 802.11n
- Wireless network support Frequency: Not supported
- Applicable objects: Broadband VPN router Internet cafes dedicated broadband router Enterprise Routers Network Security Routers Multiservice Routers Carrier-class high-end routers Broadband Router
- USB interface quantity: Not supported
- Whether to support VPN: support
- Yes No Built-in firewall: Yes
- WDS support: Not supported
- WPS: Not supported
- Removable: None
- After-sales service: Genius
- Condition: New
- Packing volume: 528mm X 336mm X 100mm
- Gross weight: 3.68KG
Multi-WAN port Gigabit enterprise VPN router
64-bit network-specific processor, clocked at 800MHz
512MB DDR3 high-speed memory
1 Gigabit WAN port, 1 Gigabit LAN port, 3 Gigabit WAN / LAN configurable ports
IPSec / PPTP / L2TP VPN, remote communication more secure
Access authentication (Web authentication, micro-Wi-Fi)
Internet behavior management (application restriction / site filtering / web security)
Load balancing and line backup
Internal and external network ARP protection and common attack protection
Intelligent IP bandwidth management and connection limit new hardware architecture, high-speed data forwarding
Using the new hardware architecture, professional 64-bit network processor, 512MB DDR3 high-speed flash memory, packet processing capacity has been greatly enhanced.
A variety of VPN, secure remote communications
Support IPSec VPN, allowing the establishment of 100 tunnels, encryption of corporate and branch of confidential data to protect data security;
Support PPTP VPN and L2TP VPN server / client mode, allowing the establishment of 100 tunnels (shared), to facilitate staff travel, mobile office staff remote access to internal server, easy remote office.
Internet behavior management, standardize employee network use
Built-in seven categories of dozens of Internet application database, a key control QQ, Thunder, flush, games and other common applications;
Built-in more than a dozen categories of hundreds of Web site database, a key to limit the staff access to the corresponding Web site;
Support prohibit page submission, limit employee log on a variety of web-based forums, microblogging, e-mail and other information published to avoid leakage of sensitive corporate data;
Support for filtering file expansion type, can be easily embedded in a variety of web pages in a small file, to avoid viruses, Trojan horses through these small files into the corporate network, endangering network security.
Does not need the customer end software to be possible to realize the authentication to enter the net, reduces the network maintenance work load;
Support local authentication, Radius authentication and a key to the Internet, to meet a variety of certification needs;
Can be customized certification Jump page, to achieve advertising push.
Customers do not need to enter a complex password, through the WeChat client can achieve a key networking;
Support portal interface jump, to push the user to customize the picture wide;
Support the Internet length of time to set, flexible control user authentication cycle.
Efficient firewall to protect the internal and external network security
ARP dual protection
Supports IP and MAC address binding to effectively prevent ARP spoofing inside and outside the network. In the event of ARP spoofing, it can send ARP correction information according to the specified frequency and recover the normal network status in time.
Support internal / external network attack protection, which can effectively prevent all kinds of common DoS attacks, scanning attacks, suspicious packet attack behavior.
MAC address filtering
Supports MAC address-based filtering to effectively block access to illegal hosts.
Can be assigned for a variety of network services through the router's permissions to protect internal and external network security, support for user groups and time-based access control rules to achieve more refined management.
Flexible bandwidth control, guarantee the reasonable use of bandwidth
Intelligent Bidirectional IP Bandwidth Control
Supports bandwidth policy based on bandwidth utilization. It can control bidirectional bandwidth for each host (IP) in the network. It can effectively suppress the over-occupied bandwidth of P2P applications such as BT and Thunder, and ensure the network is always smooth.
IP-based connections to limit the number of connections per computer share, to prevent a small number of users over-occupied a large number of connections to ensure that games, Internet, chat, video, voice and other smooth.
Multi-WAN port load balancing and line backup
It provides one 10/100 / 1000M fixed WAN port, one 10/100 / 1000M fixed LAN port and three 10/100 / 1000M WAN / LAN configurable ports. You can flexibly configure the number of WAN ports according to the actual network requirements. Network requirements for multiple line access.
Support intelligent routing, special application routing, ISP routing and other rich traffic balance function, make full use of bandwidth resources to protect user investment.
Support WAN port backup function, in the main line fault can automatically switch to the backup line, to ensure the normal operation of the network.
More useful features
Support for PPPoE, dynamic IP, static IP access technology;
Internal / external network two-way port monitoring to meet the relevant departments of the data monitoring needs;
Support DDNS and virtual server functions, easy to build internal network server and private website;
Support UPnP and ALG services, to ensure the smooth penetration of special network applications NAT;
New Chinese WEB management interface, management and maintenance more convenient, fast;
Provide log list function, detailed records of network health;
Supports Ping, Tracert and other fault detection tools to help quickly detect and troubleshoot network problems.
At present, the following models of enterprise-class wired router support or upgrade the software to support PPPoE authentication server function, intranet access certification easily and reliably.
Can be assigned to the Internet user account, only allowed to have a legitimate account and authenticated users access to the Internet access;
Support for free break, expired disconnection, manual disconnection, address binding, exception IP and other rich features;
Meet the rental, residential quarters, hotels, primary and secondary schools and other bandwidth sharing network environment for internal network users access authentication needs.
TL-R473, TL-R473P-AC, TL-R473G
TL-R478, TL-R478 +, TL-R478G, TL-R478G +
TL-R488, TL-R4239G, TL-R4299G
: One 10/100 / 1000M RJ45 WAN port
: Three 10/100 / 1000M RJ45 WAN / LAN configurable ports
: One 10/100 / 1000M RJ45 LAN port
: One console port
Processor: 64-bit MIPS network-specific processor, clocked at 800MHz
Memory: DDR3 512MB
: Per port: WAN / LAN, Speed
: Per device: PWR, SYS
Dimensions: 440 (w) x227 (D) x44 (H) mm
Input power: 100 ~ 240V AC, 50 / 60Hz
Cooling: Natural cooling
Use of the environment
: Operating temperature: 0 ℃ ~ 40 ℃, operating humidity: 10% ~ 90% RH non-condensing
: Storage temperature: -40 ℃ ~ 70 ℃, storage humidity: 5% ~ 90% RH non-condensing
: TCP / IP, DHCP, ICMP, NAT, PPPoE, SNTP, HTTP, DNS, H.323, SIP, DDNS
: Interface settings
: The DHCP server
: MAC address setting
: Switch settings
Access: Dynamic IP, static IP, PPPoE
: One-to-One NAT, NAPT, Virtual Server, ALG, NAT-DMZ
: IP bandwidth control, connection number control, traffic / connection monitoring
: A large number of concurrent connections: 150000
: Intelligent equalization, ISP routing, special application routing, on-line detection, line backup
: Policy-based routing, static routing
: Supports ARP scanning, ARP list, GARP
: Supports IP MAC binding
Attack protection: anti-DoS class, scan class, suspicious package and other common attacks
: Support setting MAC address filtering black and white list
: Access Control List
: Chat software / P2P download software / financial software / online games / video software / music software / basic applications, dozens of common application restrictions
: QQ black and white list
: URL packet filtering, URL filtering
: Web security (prohibit web submission, filtering a variety of file types in the page)
: Apply signature updates
: IPSec VPN (100 tunnels)
: PPTP / L2TP VPN (100 tunnels)
: Web authentication, local authentication, Radius authentication, one-click Internet access, multiple authentication requirements
: WeChat Wi-Fi, WeChat business to help easily smoke powder
: You can customize the authentication page, easy to push text, image ads, to carry out marketing
: The authentication-free policy
: Dynamic DNS (Peanut Shell, Comet, 3322)
: UPnP service
Management and maintenance
: Chinese Web management, remote management
: Configure backup and import configurations
: System software upgrade
: Interface traffic statistics, IP traffic statistics
: Ping, tracert Diagnostic tool
: System log
* The data presented above is theoretically the data throughput and performance of the specific model in a specific experimental environment, the actual environment based on the actual site may be different, referred to the technical comparison are scientific principles, does not involve other purposes .