- Product Name: TP-Link / P-linking technology TL-E ...
- Brand: TP-Link / Cape linking technology
- TP-Link Model: TL-ER6520G
- Color Category: dark gray
- Are Wireless: Wired
- Wired router speed: 1000Mbps
- Wired transfer rate: 10/100 / 1000Mbps
- Wireless transfer rate: None
- Network standards: 802.2
- Wireless network support frequency: Not supported
- Applicable objects: Broadband VPN Router Broadband Router cafes dedicated enterprise-class router network router security services routers carrier-class high-end router broadband router
- Number of USB interface: Does not support
- Whether to support VPN: Support
- Are built-in firewall: Yes
- Support WDS: not supported
- Whether to support WPS: does not support
- Are Detachable: None
- Service: Genius
- Condition: New
- Packing Volume: 440x227x44 (mm)
- Gross Weight: 3.6kg
TL-ER6520G is TP-LINK has introduced dual-core Gigabit enterprise VPN router products, mainly targeted at enterprises, institutions, parks, hotel chains and other need high-speed Internet access, Internet behavior management and remote network environment for secure communications. TL -ER6520G dual-core 64-bit network dedicated processor, single-core frequency up to 500MHz, with 256MB DDRII high-speed memory, with a strong network data forwarding capability, while supporting IPSec / PPTP / L2TP VPN, Internet behavior management, firewall, traffic control and feature-rich electronic bulletin, suitable for the formation of a safe, efficient and easy management of the whole enterprise gigabit network.
High speed and stable dual-core gigabit hardware platform
64-bit dual-core network processor, 256MB DDRII high-speed memory, packet processing capacity has been significantly improved to achieve gigabit-level data forwarding.
Flexible and practical interface configuration
Offers next five 10/100 / 1000M physical port equipment factory state 5 does not distinguish between physical port WAN, LAN roles, the user can according to actual needs network is divided into different sections (such as WAN segments, LAN segment, DMZ zone segment, etc.), and then the physical ports freely assigned to each zone, with very high flexibility while supporting a physical port to bind multiple virtual interfaces, such as eth interfaces, PPPoE interfaces, L2TP Interface, PPTP interfaces, greatly enhance flexibility physical port, adapt to the complex network requirements.
Secure IPSec / PPTP / L2TP VPN
Provides standard IPSec VPN, support for data integrity check, data origin authentication, anti-replay and data packet encryption (DES, 3DES, AES128, AES192, AES256 encryption algorithm, etc.); support for IKE and manual mode to establish a VPN connection and more for domestic users with dynamic IP, PPPoE dial-up access to network characteristics, etc., allows you to configure a VPN connection through its domain name; allows up to 200 IPSec VPN tunnels established to meet between corporate headquarters and branch offices, enterprises and need to establish a secure, remote communication between business partners / suppliers.
Support PPTP / L2TP server and client functionality, allowing up to build 100 PPTP VPN tunnels and 100 L2TP VPN tunnel users the flexibility to choose to use the server and client functions according to actual demand: When deployed in the corporate headquarters, the general use PPTP / L2TP server functionality to meet the traveling employees or affiliates remote secure access to corporate network requirements; required when the remote PPTP / L2TP server to establish a VPN connection, you need to use PPTP / L2TP client functionality.
Comprehensive and effective online behavior management
Providing for a variety of common applications of a key block, which can effectively control Internet applications, including IM software (QQ / Web QQ / MSN / Ali Want, etc.), P2P software (Thunder / Thunder look / eDonkey, etc.), financial software (great wisdom, analysts, flush, etc.), games (QQ games, the Thunder game, happy farm, QQ farm, etc.), proxy (http proxy, socks4 proxy, socks5 proxy), etc., up to a total of nearly 60 kinds, just configuration page by checking the appropriate option to control permissions used by employees. support user-based policy group configuration block can be assigned different permissions for different users to ensure that the key to the user's normal use.
Support site blacklist and whitelist filtering policy based on user groups and to limit employee access to various sites, to avoid access to potentially malicious websites harm caused.
Rich security policy
By configuring the basic access control rules to allow or prohibit employees to use a variety of network applications, including FTP downloads, e-mail, Web browsing, video and voice communications. At the same time support the user group based access control rules and time periods can be realized employee Internet refined rights management.
Provides IP and MAC addresses automatically scan and a key binding function, which can bind LAN port (network), WAN port (external network) Host IP and MAC address information, to effectively prevent internal / external network ARP spoofing to avoid network dropped the issue ARP spoofing caused; when subjected to ARP spoofing, can take the initiative to send the specified frequency ARP correct information in a timely manner to restore the network to normal state, effectively reduce the degree of harm.
Internal support / external network attack protection, can effectively prevent a variety of common DoS attacks, scanning attack, suspicious package aggressive behavior, such as: TCP Syn Flood, UDP Flood, ICMP Flood, WinNuke attacks, fragmented packet attacks, WAN mouth ping, TCP Scan (Stealth FIN / Xmas / Null), IP spoofing.
Support filtering based on MAC addresses, effectively blocking the access of invalid hosts.
Flexible Flow Control
It supports intelligent IP bandwidth control function, according to the actual bandwidth utilization and flexible to enable bandwidth control strategy can each host (IP) network for two-way bandwidth control, and effectively inhibit BT, Thunder and other P2P applications over bandwidth, avoid network game cards, the problem of slow Internet speed, network security always smooth.
IP-based connection limit function, the number of connections to limit the share of each computer, the rational use of limited NAT connection resources and prevent a few users take up a lot over the number of connections to ensure that games, Internet, chat, video, voice and other smooth get on.
Support intelligent balance, special application routing, ISP routing, policy routing, and other load balancing strategy, multi-pronged approach to effectively improve network quality of service, taking full advantage of the interface bandwidth and improve network experience, protect user investment.
Convenient and practical management and maintenance
All-Chinese style Web interface operation, all functions can be configured through a graphical interface, each of which are configured to provide the necessary information to help explain, user-friendly configuration of the router.
Provide a list of logs and log server function, detailed logging regulatory network operation, to help quickly identify network anomalies, locate the source of the problem in time to troubleshoot network problems; provide a graphical interface, real-time monitoring of CPU utilization and other key resources inside the router, to detect potential the dangers and attacks.
Support for local area network or the Internet router for remote management, and remote assistance to facilitate chain management; support Ping detection, routing tracking tool to detect a variety of fault detection, and can back up and import router configuration files to facilitate routine maintenance and management.