TP-Link TL-ER6120G multi-WAN port Gigabit enterprise-class wired router Web authentication business VPN

TP-Link TL-ER6120G multi-WAN port Gigabit enterprise-class wired router Web authentication business VPN
 

Product description:

Product parameters:

  • Product name: TP-Link / TL-E ...
  • Brand: TP-Link / 普联 技术
  • TP-Link Model Number: TL-ER6120G
  • Color classification: BUCEROS / character
  • Wireless: Wired
  • Cable router speed: 1000Mbps
  • Cable transmission rate: 10/100 / 1000Mbps
  • Wireless transmission rate: None
  • Network standards: 802.11b 802.11g 802.11n
  • Wireless network support Frequency: Not supported
  • Applicable objects: Broadband VPN router Internet cafes dedicated broadband router Enterprise Routers Network Security Routers Multiservice Routers Carrier-class high-end routers Broadband Router
  • USB interface quantity: Not supported
  • Whether to support VPN: support
  • Yes No Built-in firewall: Yes
  • WDS support: Not supported
  • WPS: Not supported
  • Removable: None
  • After-sales service: Genius
  • Condition: New
  • Packing volume: 528mm X 336mm X 100mm
  • Gross weight: 3.68KG




Multi-WAN port Gigabit enterprise VPN router

TL-ER6120G



64-bit network-specific processor, clocked at 800MHz

512MB DDR3 high-speed memory

1 Gigabit WAN port, 1 Gigabit LAN port, 3 Gigabit WAN / LAN configurable ports

IPSec / PPTP / L2TP VPN, remote communication more secure

Access authentication (Web authentication, micro-Wi-Fi)

Internet behavior management (application restriction / site filtering / web security)

Load balancing and line backup

Internal and external network ARP protection and common attack protection



Intelligent IP bandwidth management and connection limit new hardware architecture, high-speed data forwarding

Using the new hardware architecture, professional 64-bit network processor, 512MB DDR3 high-speed flash memory, packet processing capacity has been greatly enhanced.



A variety of VPN, secure remote communications

Support IPSec VPN, allowing the establishment of 100 tunnels, encryption of corporate and branch of confidential data to protect data security;

Support PPTP VPN and L2TP VPN server / client mode, allowing the establishment of 100 tunnels (shared), to facilitate staff travel, mobile office staff remote access to internal server, easy remote office.



Internet behavior management, standardize employee network use

Built-in seven categories of dozens of Internet application database, a key control QQ, Thunder, flush, games and other common applications;

Built-in more than a dozen categories of hundreds of Web site database, a key to limit the staff access to the corresponding Web site;

Support prohibit page submission, limit employee log on a variety of web-based forums, microblogging, e-mail and other information published to avoid leakage of sensitive corporate data;

Support for filtering file expansion type, can be easily embedded in a variety of web pages in a small file, to avoid viruses, Trojan horses through these small files into the corporate network, endangering network security.



Web authentication

Does not need the customer end software to be possible to realize the authentication to enter the net, reduces the network maintenance work load;

Support local authentication, Radius authentication and a key to the Internet, to meet a variety of certification needs;

Can be customized certification Jump page, to achieve advertising push.



Micro Wi-Fi

Customers do not need to enter a complex password, through the WeChat client can achieve a key networking;

Support portal interface jump, to push the user to customize the picture wide;

Support the Internet length of time to set, flexible control user authentication cycle.



Efficient firewall to protect the internal and external network security

ARP dual protection

Supports IP and MAC address binding to effectively prevent ARP spoofing inside and outside the network. In the event of ARP spoofing, it can send ARP correction information according to the specified frequency and recover the normal network status in time.

Attack Protection

Support internal / external network attack protection, which can effectively prevent all kinds of common DoS attacks, scanning attacks, suspicious packet attack behavior.

MAC address filtering

Supports MAC address-based filtering to effectively block access to illegal hosts.

Access Policy

Can be assigned for a variety of network services through the router's permissions to protect internal and external network security, support for user groups and time-based access control rules to achieve more refined management.



Flexible bandwidth control, guarantee the reasonable use of bandwidth

Intelligent Bidirectional IP Bandwidth Control

Supports bandwidth policy based on bandwidth utilization. It can control bidirectional bandwidth for each host (IP) in the network. It can effectively suppress the over-occupied bandwidth of P2P applications such as BT and Thunder, and ensure the network is always smooth.

Connection limit

IP-based connections to limit the number of connections per computer share, to prevent a small number of users over-occupied a large number of connections to ensure that games, Internet, chat, video, voice and other smooth.



Multi-WAN port load balancing and line backup

It provides one 10/100 / 1000M fixed WAN port, one 10/100 / 1000M fixed LAN port and three 10/100 / 1000M WAN / LAN configurable ports. You can flexibly configure the number of WAN ports according to the actual network requirements. Network requirements for multiple line access.

Support intelligent routing, special application routing, ISP routing and other rich traffic balance function, make full use of bandwidth resources to protect user investment.

Support WAN port backup function, in the main line fault can automatically switch to the backup line, to ensure the normal operation of the network.



More useful features

Support for PPPoE, dynamic IP, static IP access technology;

Internal / external network two-way port monitoring to meet the relevant departments of the data monitoring needs;

Support DDNS and virtual server functions, easy to build internal network server and private website;

Support UPnP and ALG services, to ensure the smooth penetration of special network applications NAT;

New Chinese WEB management interface, management and maintenance more convenient, fast;

Provide log list function, detailed records of network health;

Supports Ping, Tracert and other fault detection tools to help quickly detect and troubleshoot network problems.

At present, the following models of enterprise-class wired router support or upgrade the software to support PPPoE authentication server function, intranet access certification easily and reliably.

Can be assigned to the Internet user account, only allowed to have a legitimate account and authenticated users access to the Internet access;

Support for free break, expired disconnection, manual disconnection, address binding, exception IP and other rich features;

Meet the rental, residential quarters, hotels, primary and secondary schools and other bandwidth sharing network environment for internal network users access authentication needs.



TL-R473, TL-R473P-AC, TL-R473G

TL-R483, TL-R483G

TL-R478, TL-R478 +, TL-R478G, TL-R478G +

TL-R488, TL-R4239G, TL-R4299G

TL-ER5110G, TL-ER5120G

TL-ER6110G, TL-ER6120G



Hardware specifications



port

: One 10/100 / 1000M RJ45 WAN port

: Three 10/100 / 1000M RJ45 WAN / LAN configurable ports

: One 10/100 / 1000M RJ45 LAN port

: One console port



Processor: 64-bit MIPS network-specific processor, clocked at 800MHz

Memory: DDR3 512MB

FLASH: 32MB



Indicator light

: Per port: WAN / LAN, Speed

: Per device: PWR, SYS



Dimensions: 440 (w) x227 (D) x44 (H) mm

Input power: 100 ~ 240V AC, 50 / 60Hz



Cooling: Natural cooling



Use of the environment

: Operating temperature: 0 ℃ ~ 40 ℃, operating humidity: 10% ~ 90% RH non-condensing

: Storage temperature: -40 ℃ ~ 70 ℃, storage humidity: 5% ~ 90% RH non-condensing



Software features



Network protocol

: TCP / IP, DHCP, ICMP, NAT, PPPoE, SNTP, HTTP, DNS, H.323, SIP, DDNS



basic settings

: Interface settings

: The DHCP server

: MAC address setting

: Switch settings



Access: Dynamic IP, static IP, PPPoE



Transmission control

: One-to-One NAT, NAPT, Virtual Server, ALG, NAT-DMZ

: IP bandwidth control, connection number control, traffic / connection monitoring

: A large number of concurrent connections: 150000

: Intelligent equalization, ISP routing, special application routing, on-line detection, line backup

: Policy-based routing, static routing



ARP protection

: Supports ARP scanning, ARP list, GARP

: Supports IP MAC binding



Attack protection: anti-DoS class, scan class, suspicious package and other common attacks



Access control

: Support setting MAC address filtering black and white list

: Access Control List



Behavior control

: Chat software / P2P download software / financial software / online games / video software / music software / basic applications, dozens of common application restrictions

: QQ black and white list

: URL packet filtering, URL filtering

: Web security (prohibit web submission, filtering a variety of file types in the page)

: Apply signature updates



VPN

: IPSec VPN (100 tunnels)

: PPTP / L2TP VPN (100 tunnels)



Access authentication

: Web authentication, local authentication, Radius authentication, one-click Internet access, multiple authentication requirements

: WeChat Wi-Fi, WeChat business to help easily smoke powder

: You can customize the authentication page, easy to push text, image ads, to carry out marketing

: The authentication-free policy



system service

: Dynamic DNS (Peanut Shell, Comet, 3322)

: UPnP service



Management and maintenance

: Chinese Web management, remote management

: Configure backup and import configurations

: System software upgrade

: Interface traffic statistics, IP traffic statistics

: Ping, tracert Diagnostic tool

:time setting

: System log

* The data presented above is theoretically the data throughput and performance of the specific model in a specific experimental environment, the actual environment based on the actual site may be different, referred to the technical comparison are scientific principles, does not involve other purposes .