TP-LINK Gigabit enterprise high-speed router TL-ER6110G | Internet behavior management Web authentication

TP-LINK Gigabit enterprise high-speed router TL-ER6110G | Internet behavior management Web authentication
 

Product description:

Product parameters:

  • Product name: TP-Link / TL-E ...
  • Brand: TP-Link / 普联 技术
  • TP-Link Model Number: TL-ER6110G
  • Color classification: dark gray
  • Wireless: Wired
  • Cable router speed: 1000Mbps
  • Cable transmission rate: 10/100 / 1000Mbps
  • Wireless transmission rate: None
  • Network standards: 802.11b 802.11g 802.11a 802.11n 802.3u 802.3 802.2
  • Wireless network support Frequency: Not supported
  • Applicable objects: broadband VPN router Internet cafes dedicated broadband router enterprise router router network security router multi-service router broadband router
  • USB interface quantity: Not supported
  • Whether to support VPN: support
  • Yes No Built-in firewall: Yes
  • WDS support: Not supported
  • WPS: Not supported
  • Removable: None
  • After-sales service: Genius
  • Condition: New


Gigabit enterprise VPN router

TL-ER6110G

  • 64-bit network-specific processor, clocked at 800MHz
  • 512MB DDR3 high-speed memory
  • 1 Gigabit WAN port, 4 Gigabit LAN port
  • IPSec / PPTP / L2TP VPN, remote communication more secure
  • Access authentication (Web authentication, micro-Wi-Fi)
  • Internet behavior management (application restriction / site filtering / web security)
  • Internal and external network ARP protection and common attack protection
  • Intelligent IP bandwidth management and connection limit

The new hardware architecture, high-speed data forwarding

Using a new hardware architecture, professional 64-bit network processor, 512MB DDR3 high-speed flash memory, packet processing capacity has been greatly enhanced.

A variety of VPN, secure remote communications

Support IPSec VPN, allowing up to 100 tunnels, encryption of corporate and branch confidential data to protect data security;
Support PPTP VPN and L2TP VPN server / client mode, allowing up to the establishment of 100 tunnels (shared), to facilitate staff travel, mobile office staff remote access to internal server, easy remote office.

Internet behavior management, standardize employee network use

Built-in 7 categories Dozens Internet application database, a key control QQ, Thunder, flush, games and other common applications;
Built-in more than a dozen categories of hundreds of Web site database, a key to limit the staff access to the corresponding Web site;
Support prohibit page submission, limit employee log on a variety of web-based forums, microblogging, mailbox and other information published to avoid leakage of sensitive corporate data;
Support for filtering file expansion type, can be easily embedded in the Web filter in a variety of small files, to avoid viruses, Trojan horses through these small files into the corporate network, endangering network security.

Web authentication

Does not need the customer end software to be possible to realize the authentication to enter the net, reduces the network maintenance work load;
Support local authentication, Radius authentication and a key to the Internet, to meet a variety of certification needs;
Can be customized certification Jump page, to achieve advertising push.

Micro Wi-Fi

Customers do not need to enter a complex password, through the WeChat client can achieve a key networking;
Support portal interface jump, to push the user to customize the picture wide;
Support the Internet length of time to set, flexible control user authentication cycle.

Efficient firewall to protect the internal and external network security

ARP dual protection
Supports IP and MAC address binding to effectively prevent ARP spoofing inside and outside the network. In the event of ARP spoofing, it can send ARP correction information according to the specified frequency and recover the normal network status in time.
Attack Protection
Support internal / external network attack protection, which can effectively prevent all kinds of common DoS attacks, scanning attacks, suspicious packet attack behavior.
MAC address filtering
Supports MAC address-based filtering to effectively block access to illegal hosts.
Access Policy
Can be assigned for a variety of network services through the router's permissions to protect internal and external network security, support for user groups and time-based access control rules to achieve more refined management.

Flexible bandwidth control, guarantee the reasonable use of bandwidth

Intelligent Bidirectional IP Bandwidth Control
Supports bandwidth policy based on bandwidth utilization. It can control bidirectional bandwidth for each host (IP) in the network. It can effectively suppress the over-occupied bandwidth of P2P applications such as BT and Thunder, and ensure the network is always smooth.
Connection limit
IP-based connections to limit the number of connections per computer share, to prevent a small number of users over-occupied a large number of connections to ensure that games, Internet, chat, video, voice and other smooth.

More useful features

Support for PPPoE, dynamic IP, static IP access technology;
Internal / external network two-way port monitoring to meet the needs of the ** sector data monitoring;
Support DDNS and virtual server functions, easy to build internal network server and private website;
Support UPnP and ALG services, to ensure the smooth penetration of special network applications NAT;
The new Chinese WEB management interface, management and maintenance more convenient, fast;
Provide log list function, detailed records of network health;
Supports Ping, Tracert and other fault detection tools to help quickly detect and troubleshoot network problems.