USD
- USD
- CNY
- HKD
- EUR
English
- العربية
- čeština
- dansk
- Deutsch
- Ελληνικά
- English
- Español
- Français
- ic
- Italiano
- Netherlands
- norsk Språk
- język polski
- pt
- Português
- 中文
Enterprise routers Price List
Model | Description | Leading | Price |
---|---|---|---|
The built-in AC function can be used to manage TP-LINK enterprise APs in a unified manner
The built-in AC function is both a router and a wireless controller, which can control up to 50 TP-LINK enterprise APs in a unified manner, making it easy to expand the enterprise wireless network.
It can automatically discover the TP-LINK AP in the network, configure and manage the AP in a unified manner, realize zero-configuration AP access, plug and play, and support AP status monitoring, AP upgrade, and scheduled restart, which is easy to maintain.
A variety of VPNs for secure communication over long distances
Support IPSec VPN to encrypt confidential data of enterprises and branches to ensure data security;
It supports PPTP VPN and L2TP VPN server/client modes, which is convenient for employees on business trips and mobile office workers to remotely access the internal server of the enterprise, and easily realize remote work.
Manage online behavior and standardize employees' use of the Internet
Built-in database of common Internet applications, which can control various desktop and mobile Internet applications with one click, including social software/video software/music software/shopping and leisure software/news and information software/P2P software/financial software/online games/app stores/basic applications, etc.;
Built-in database of hundreds of URLs in more than a dozen categories, which can restrict employees' access to the corresponding website with one click;
It supports the expansion type of filtering files, which can easily filter all kinds of small files embedded in web pages to prevent viruses and Trojan horses from invading the enterprise network and endangering network security through these small files.
It supports the behavior audit function, comprehensively records online behavior, and outputs audit results in reports.
A variety of authentication methods, control the Internet access, and realize advertising and marketing
Support web authentication, and push merchant advertising information through the authentication page;
Support SMS authentication, meet the requirements of real-name authentication, and can carry out secondary marketing based on mobile phone number;
It supports PPPoE servers, which can realize unified dial-up Internet access for intranet users.
Efficient firewall to ensure internal and external network security
Support IP and MAC address binding, effectively preventing intranet/extranet ARP spoofing; In the event of ARP spoofing, you can send ARP correction messages based on the specified frequency to restore the normal network status in a timely manner.
It supports intranet/extranet attack protection and can effectively prevent various common DoS attacks, scanning attacks, and suspicious packet attacks.
MAC address-based filtering is supported to effectively block the access of unauthorized hosts.
It can assign permissions through routers for various network services to ensure internal and external network security, and supports access control rules based on user groups and time periods to achieve more refined management.
Flexible bandwidth control to ensure reasonable bandwidth utilization
It supports elastic policies that enable bandwidth control based on bandwidth utilization, and can perform bidirectional bandwidth control for each host (IP) in the network, effectively preventing P2P applications such as BT and Thunderbolt from over-occupying bandwidth and ensuring smooth network at all times.
It provides an IP-based connection limit function, which can limit the number of connections occupied by each computer, prevent a small number of users from excessively occupying a large number of connections, and ensure the smooth operation of games, Internet surfing, chatting, video and voice, etc.
Multi-WAN ports, support traffic balancing, and realize bandwidth stacking
It provides one 10/100/1000M fixed WAN port and three 10/100/1000M WAN/LAN configurable ports, allowing users to flexibly configure the number of WAN ports according to actual network requirements to meet the networking requirements of multiple lines.
It supports rich traffic balancing functions such as intelligent traffic steering, special application traffic steering, and ISP traffic steering, which can realize bandwidth superposition, make full use of bandwidth resources, and protect user investment.
More useful features
Dynamic IP, static IP, and PPPoE access modes are supported.
Intra/external network two-way port monitoring to meet the data monitoring needs of public security departments;
Support DDNS and virtual server functions, easy to build intranet servers and private websites;
Support UPnP and ALG service functions to ensure that special network applications can smoothly penetrate NAT;
Brand new Chinese WEB management interface, management and maintenance are more convenient and fast;
Support automatic cleaning function, which can automatically clean up the device cache when the network is idle to improve the stability of the device;
Provide log list function to record network operation status in detail;
Multiple fault detection tools, such as Ping and Tracert, are supported to help you quickly find and troubleshoot network faults.
5 Gigabit Ethernet ports, 1WAN+3WAN/LAN+1LAN
THE BUILT-IN AC FUNCTION ENABLES UNIFIED MANAGEMENT OF TP-LINK ENTERPRISE APS
IPSec/PPTP/L2TP VPN makes long-distance communication more secure
Web authentication, SMS authentication, and PPPoE servers
Online behavior management (mobile app control/desktop application control/website filtering/behavior audit)
Intranet and intranet ARP protection and common attack protection
Load balancing, intelligent IP bandwidth management, and connection limits
|
In Stock
|
Subscribe
|
|
New hardware architecture, high-speed data forwarding
Adopting a new hardware architecture, a professional dual-core ARM processor, a single-core frequency of up to 1GHz, and 256MB DDRIII high-speed memory, the data packet processing capability has been greatly improved. The typical belt capacity is 300 units.
A variety of VPNs to ensure the security of long-distance communication
It supports IPSec VPN, allowing up to 50 tunnels to be established to encrypt the confidential data of enterprises and branches and ensure data security.
It supports PPTP VPN and L2TP VPN server/client modes, allowing up to 32 tunnels (shared) to be established, which is convenient for employees on business trips and mobile workers to remotely access internal servers and easily realize remote work.
Manage online behavior and standardize employees' use of the Internet
Built-in database of common Internet applications, which can control various desktop and mobile Internet applications with one click, including social software/video software/music software/shopping and leisure software/news and information software/P2P software/financial software/online games/app stores/basic applications, etc.;
Built-in database of hundreds of URLs in more than a dozen categories, which can restrict employees' access to the corresponding website with one click;
Support prohibiting web submission, restricting employees from logging in to various web-based forums, microblogs, mailboxes, etc. to publish information, and avoid the leakage of sensitive data of enterprises;
It supports the expansion type of filtering files, which can easily filter all kinds of small files embedded in web pages to prevent viruses and Trojan horses from invading the enterprise network and endangering network security through these small files.
It supports the behavior audit function, comprehensively records online behavior, and outputs audit results in reports.
VLAN (Multi-LAN)
With IEEE 802.1Q VLAN, enterprises can divide the intranet into different network segments that are isolated from each other as needed to reduce the impact of broadcast storms and viruses.
It supports VLAN Layer 3 interfaces, which can forward IP packets across VLANs, and set functions such as DHCP server, firewall rules, and access authentication policies based on VLANs.
A variety of authentication methods, control the Internet access, and realize advertising and marketing
Support web authentication, and push merchant advertising information through the authentication page;
Support SMS authentication, meet the requirements of real-name authentication, and can carry out secondary marketing based on mobile phone number;
It supports PPPoE servers, which can realize unified dial-up Internet access for intranet users.
The built-in AC function can be used to manage TP-LINK enterprise APs in a unified manner
The built-in AC function is both a router and a wireless controller, which can control up to 100 TP-LINK enterprise APs in a unified manner, and easily expand the enterprise wireless network.
It can automatically discover the TP-LINK AP in the network, and perform unified configuration and management of the AP, realize zero-configuration AP access, plug and play, and support AP status monitoring and upgrade, which is easy to maintain.
Efficient firewall to ensure internal and external network security
Support IP and MAC address binding, effectively preventing intranet/extranet ARP spoofing; In the event of ARP spoofing, the system can send ARP correction messages at specified frequencies to restore the normal state of the network in a timely manner.
It supports intranet/extranet attack protection and can effectively prevent various common DoS attacks, scanning attacks, and suspicious packet attacks.
It supports MAC address-based filtering to effectively block the access of unauthorized hosts.
It can assign permissions through routers for various network services to ensure internal and external network security, and supports access control rules based on user groups and time periods to achieve more refined management.
Flexible bandwidth control to ensure reasonable bandwidth utilization
It supports elastic policies that enable bandwidth control based on bandwidth utilization, and can perform bidirectional bandwidth control for each host (IP) in the network, effectively inhibiting P2P applications such as BT and Thunderbolt from over-occupying bandwidth and ensuring smooth network at all times.
It provides an IP-based connection limit function, which can limit the number of connections occupied by each computer, prevent a small number of users from excessively occupying a large number of connections, and ensure the smooth operation of games, Internet surfing, chatting, video and voice, etc.
Multi-WAN load balancing and line backup
It provides 1 fixed WAN port, 2 fixed LAN ports and 3 WAN/LAN configurable ports, allowing users to flexibly configure the number of WAN ports according to actual network requirements to meet the networking requirements of multiple lines.
It supports rich traffic balancing functions such as intelligent traffic steering, special application traffic steering, and ISP traffic steering, which can realize bandwidth superposition, make full use of bandwidth resources, and protect user investment.
It supports the WAN port backup function, and can automatically switch to the standby line when the main line fails, ensuring the normal operation of the network.
More useful features
Intra/extranet two-way port monitoring to meet the data monitoring needs of relevant departments;
Support DDNS and virtual server functions, easy to build intranet servers and private websites;
Support UPnP and ALG service functions to ensure that special network applications can smoothly penetrate NAT;
Brand new Chinese WEB management interface, management and maintenance are more convenient and fast;
Provide log list function to record network operation status in detail;
Multiple fault detection tools, such as Ping and Tracert, are supported to help you quickly find and troubleshoot network faults.
Dual-core CPU, 256MB DDRIII high-speed memory, powerful performance
5 Gigabit Ethernet ports and 1 Gigabit SFP port, 1WAN (SFP) + 3WAN/LAN + 2LAN or 1LAN (SFP) + 4WAN/LAN+1LAN
IPSec/PPTP/L2TP VPN makes long-distance communication more secure
Web authentication, SMS authentication, and PPPoE servers
Online behavior management (mobile app control/desktop application control/website filtering/behavior audit)
THE BUILT-IN AC FUNCTION ENABLES UNIFIED MANAGEMENT OF TP-LINK ENTERPRISE APS
Load balancing and line backup
Intranet and intranet ARP protection and common attack protection
Intelligent IP bandwidth management and limit the number of connections
|
In Stock
|
Subscribe
|
|
Quad-core CPU, 512MB DDRIII. high-speed memory, powerful performance
2 x 10 Gigabit SFP+ fiber expansion ports, 4 x 10/100/1000M RJ45 electrical ports, and the port type can be customized
IPSec/PPTP/L2TP VPN makes long-distance communication more secure
Web authentication, SMS authentication, and PPPoE servers
Online behavior management (app restrictions/website filtering/web security)
Load balancing and line backup
Intranet and intranet ARP protection and common attack protection
Intelligent IP bandwidth management and limit the number of connections
|
In Stock
|
Subscribe
|
|
New hardware architecture, high-speed data forwarding
Adopting a new hardware architecture, a professional dual-core 64-bit network-specific processor, a single-core frequency of up to 1GHz, with 256MB DDR3 high-speed memory, the data packet processing capability has been greatly improved. In the actual environment, the typical number of machines is about 300 units.
A variety of VPNs to ensure the security of long-distance communication
It supports IPSec VPN, allowing up to 50 tunnels to be established to encrypt the confidential data of enterprises and branches and ensure data security.
It supports PPTP VPN and L2TP VPN server/client modes, allowing up to 32 tunnels (shared) to be established, which is convenient for employees on business trips and mobile workers to remotely access internal servers and easily realize remote work.
Manage online behavior and standardize employees' use of the Internet
Built-in database of common Internet applications, which can control various desktop and mobile Internet applications with one click, including social software/video software/music software/shopping and leisure software/news and information software/P2P software/financial software/online games/app stores/basic applications, etc.;
Built-in database of hundreds of URLs in more than a dozen categories, which can restrict employees' access to the corresponding website with one click;
Support prohibiting web submission, restricting employees from logging in to various web-based forums, microblogs, mailboxes, etc. to publish information, and avoid the leakage of sensitive data of enterprises;
It supports the expansion type of filtering files, which can easily filter all kinds of small files embedded in web pages to prevent viruses and Trojan horses from invading the enterprise network and endangering network security through these small files.
It supports the behavior audit function, comprehensively records online behavior, and outputs audit results in reports.
VLAN (Multi-LAN)
With IEEE 802.1Q VLAN, enterprises can divide the intranet into different network segments that are isolated from each other as needed to reduce the impact of broadcast storms and viruses.
It supports VLAN Layer 3 interfaces, which can forward IP packets across VLANs, and set functions such as DHCP server, firewall rules, and access authentication policies based on VLANs.
A variety of authentication methods, control the Internet access, and realize advertising and marketing
Support web authentication, and push merchant advertising information through the authentication page;
Support SMS authentication, meet the requirements of real-name authentication, and can carry out secondary marketing based on mobile phone number;
It supports PPPoE servers, which can realize unified dial-up Internet access for intranet users.
The built-in AC function can be used to manage TP-LINK enterprise APs in a unified manner
The built-in AC function is both a router and a wireless controller, which can control up to 100 TP-LINK enterprise APs in a unified manner, and easily expand the enterprise wireless network.
It can automatically discover the TP-LINK AP in the network, and perform unified configuration and management of the AP, realize zero-configuration AP access, plug and play, and support AP status monitoring and upgrade, which is easy to maintain.
Efficient firewall to ensure internal and external network security
ARP dual protection
Support IP and MAC address binding, effectively preventing intranet/extranet ARP spoofing; In the event of ARP spoofing, you can send ARP correction messages based on the specified frequency to restore the normal network status in a timely manner.
Attack protection
It supports intranet/extranet attack protection and can effectively prevent various common DoS attacks, scanning attacks, and suspicious packet attacks.
MAC address filtering
MAC address-based filtering is supported to effectively block the access of unauthorized hosts.
Access policies
It can assign permissions through routers for various network services to ensure internal and external network security, and supports access control rules based on user groups and time periods to achieve more refined management.
Flexible bandwidth control to ensure reasonable bandwidth utilization
Intelligent bidirectional IP bandwidth control
It supports elastic policies that enable bandwidth control based on bandwidth utilization, and can perform bidirectional bandwidth control for each host (IP) in the network, effectively preventing P2P applications such as BT and Thunderbolt from over-occupying bandwidth and ensuring smooth network at all times.
Limit on the number of connections
It provides an IP-based connection limit function, which can limit the number of connections occupied by each computer, prevent a small number of users from excessively occupying a large number of connections, and ensure the smooth operation of games, Internet surfing, chatting, video and voice, etc.
More useful features
Intra/extranet two-way port monitoring to meet the data monitoring needs of relevant departments;
Support DDNS and virtual server functions, easy to build intranet servers and private websites;
Support UPnP and ALG service functions to ensure that special network applications can smoothly penetrate NAT;
Brand new Chinese WEB management interface, management and maintenance are more convenient and fast;
Provide log list function to record network operation status in detail;
Multiple fault detection tools, such as Ping and Tracert, are supported to help you quickly find and troubleshoot network faults.
Dual-core CPU, 256MB DDRIII high-speed memory, powerful performance
5 Gigabit Ethernet ports, 1WAN+4LAN
IPSec/PPTP/L2TP VPN makes long-distance communication more secure
Web authentication, SMS authentication, and PPPoE servers
Online behavior management (mobile app control/desktop application control/website filtering/behavior audit)
THE BUILT-IN AC FUNCTION ENABLES UNIFIED MANAGEMENT OF TP-LINK ENTERPRISE APS
Intranet and intranet ARP protection and common attack protection
Intelligent IP bandwidth management and limit the number of connections
|
In Stock
|
Subscribe
|
|
New hardware architecture, high-speed data forwarding
It adopts a new hardware architecture, a professional dual-core 64-bit network-specific processor, a single-core frequency of up to 1GHz, and 256MB DDRIII high-speed memory, which greatly improves the data processing capability. In the actual environment, the typical number of machines is about 300 units.
A variety of VPNs to ensure the security of long-distance communication
It supports IPSec VPN, allowing up to 50 tunnels to be established to encrypt the confidential data of enterprises and branches and ensure data security.
It supports PPTP VPN and L2TP VPN server/client modes, allowing up to 32 tunnels (shared) to be established, which is convenient for employees on business trips and mobile workers to remotely access internal servers and easily realize remote work.
Manage online behavior and standardize employees' use of the Internet
Built-in database of common Internet applications, which can control various desktop and mobile Internet applications with one click, including social software/video software/music software/shopping and leisure software/news and information software/P2P software/financial software/online games/app stores/basic applications, etc.;
Built-in database of hundreds of URLs in more than a dozen categories, which can restrict employees' access to the corresponding website with one click;
Support prohibiting web submission, restricting employees from logging in to various web-based forums, microblogs, mailboxes, etc. to publish information, and avoid the leakage of sensitive data of enterprises;
It supports the expansion type of filtering files, which can easily filter all kinds of small files embedded in web pages to prevent viruses and Trojan horses from invading the enterprise network and endangering network security through these small files.
It supports the behavior audit function, comprehensively records online behavior, and outputs audit results in reports.
VLAN (Multi-LAN)
With IEEE 802.1Q VLAN, enterprises can divide the intranet into different network segments that are isolated from each other as needed to reduce the impact of broadcast storms and viruses.
It supports VLAN Layer 3 interfaces, which can forward IP packets across VLANs, and set functions such as DHCP server, firewall rules, and access authentication policies based on VLANs.
A variety of authentication methods, control the Internet access, and realize advertising and marketing
Support web authentication, and push merchant advertising information through the authentication page;
Support SMS authentication, meet the requirements of real-name authentication, and can carry out secondary marketing based on mobile phone number;
It supports PPPoE servers, which can realize unified dial-up Internet access for intranet users.
The built-in AC function can be used to manage TP-LINK enterprise APs in a unified manner
The built-in AC function is both a router and a wireless controller, which can control up to 100 TP-LINK enterprise APs in a unified manner, and easily expand the enterprise wireless network.
It can automatically discover the TP-LINK AP in the network, and perform unified configuration and management of the AP, realize zero-configuration AP access, plug and play, and support AP status monitoring and upgrade, which is easy to maintain.
Efficient firewall to ensure internal and external network security
Support IP and MAC address binding, effectively preventing intranet/extranet ARP spoofing; In the event of ARP spoofing, the system can send ARP correction messages at specified frequencies to restore the normal state of the network in a timely manner.
It supports intranet/extranet attack protection and can effectively prevent various common DoS attacks, scanning attacks, and suspicious packet attacks.
It supports MAC address-based filtering to effectively block the access of unauthorized hosts.
It can assign permissions through routers for various network services to ensure internal and external network security, and supports access control rules based on user groups and time periods to achieve more refined management.
Flexible bandwidth control to ensure reasonable bandwidth utilization
It supports elastic policies that enable bandwidth control based on bandwidth utilization, and can perform bidirectional bandwidth control for each host (IP) in the network, effectively inhibiting P2P applications such as BT and Thunderbolt from over-occupying bandwidth and ensuring smooth network at all times.
It provides an IP-based connection limit function, which can limit the number of connections occupied by each computer, prevent a small number of users from excessively occupying a large number of connections, and ensure the smooth operation of games, Internet surfing, chatting, video and voice, etc.
Multi-WAN load balancing and line backup
It provides one 10/100/1000M fixed WAN port, one 10/100/1000M fixed LAN port and three 10/100/1000M WAN/LAN configurable ports.
It supports rich traffic balancing functions such as intelligent traffic steering, special application traffic steering, and ISP traffic steering, which can realize bandwidth superposition, make full use of bandwidth resources, and protect user investment.
It supports the WAN port backup function, and can automatically switch to the standby line when the main line fails, ensuring the normal operation of the network.
More useful features
Intra/extranet two-way port monitoring to meet the data monitoring needs of relevant departments;
Support DDNS and virtual server functions, easy to build intranet servers and private websites;
Support UPnP and ALG service functions to ensure that special network applications can smoothly penetrate NAT;
Brand new Chinese WEB management interface, management and maintenance are more convenient and fast;
Provide log list function to record network operation status in detail;
Multiple fault detection tools, such as Ping and Tracert, are supported to help you quickly find and troubleshoot network faults.
Dual-core CPU, 256MB DDRIII high-speed memory, powerful performance
5 Gigabit Ethernet ports, 1WAN+3WAN/LAN+1LAN
IPSec/PPTP/L2TP VPN makes long-distance communication more secure
Web authentication, SMS authentication, and PPPoE servers
Online behavior management (mobile app control/desktop application control/website filtering/behavior audit)
THE BUILT-IN AC FUNCTION ENABLES UNIFIED MANAGEMENT OF TP-LINK ENTERPRISE APS
Load balancing and line backup
Intranet and intranet ARP protection and common attack protection
Intelligent IP bandwidth management and limit the number of connections
|
In Stock
|
Subscribe
|
|
Quad-core CPU, 256MB DDRIII. high-speed memory, strong performance
2 x 10 Gigabit SFP+ fiber expansion ports, 4 x 10/100/1000M RJ45 electrical ports, and the port type can be customized
IPSec/PPTP/L2TP VPN makes long-distance communication more secure
Web authentication, SMS authentication, and PPPoE servers
Online behavior management (app restrictions/website filtering/web security)
Load balancing and line backup
Intranet and intranet ARP protection and common attack protection
Intelligent IP bandwidth management and limit the number of connections
|
In Stock
|
Subscribe
|
|
New hardware architecture, high-speed data forwarding
It adopts a new hardware architecture, a professional dual-core 64-bit network-specific processor, a single-core frequency of up to 1GHz, and 256MB DDRIII high-speed memory, which greatly improves the data processing capability. In the actual environment, the typical number of machines is about 300 units.
A variety of VPNs to ensure the security of long-distance communication
It supports IPSec VPN, allowing up to 50 tunnels to be established to encrypt the confidential data of enterprises and branches and ensure data security.
It supports PPTP VPN and L2TP VPN server/client modes, allowing up to 32 tunnels (shared) to be established, which is convenient for employees on business trips and mobile workers to remotely access internal servers and easily realize remote work.
Manage online behavior and standardize employees' use of the Internet
Built-in database of common Internet applications, which can control various desktop and mobile Internet applications with one click, including social software/video software/music software/shopping and leisure software/news and information software/P2P software/financial software/online games/app stores/basic applications, etc.;
Built-in database of hundreds of URLs in more than a dozen categories, which can restrict employees' access to the corresponding website with one click;
Support prohibiting web submission, restricting employees from logging in to various web-based forums, microblogs, mailboxes, etc. to publish information, and avoid the leakage of sensitive data of enterprises;
It supports the expansion type of filtering files, which can easily filter all kinds of small files embedded in web pages to prevent viruses and Trojan horses from invading the enterprise network and endangering network security through these small files.
It supports the behavior audit function, comprehensively records online behavior, and outputs audit results in reports.
VLAN (Multi-LAN)
With IEEE 802.1Q VLAN, enterprises can divide the intranet into different network segments that are isolated from each other as needed to reduce the impact of broadcast storms and viruses.
It supports VLAN Layer 3 interfaces, which can forward IP packets across VLANs, and set functions such as DHCP server, firewall rules, and access authentication policies based on VLANs.
A variety of authentication methods, control the Internet access, and realize advertising and marketing
Support web authentication, and push merchant advertising information through the authentication page;
Support SMS authentication, meet the requirements of real-name authentication, and can carry out secondary marketing based on mobile phone number;
It supports PPPoE servers, which can realize unified dial-up Internet access for intranet users.
The built-in AC function can be used to manage TP-LINK enterprise APs in a unified manner
The built-in AC function is both a router and a wireless controller, which can control up to 100 TP-LINK enterprise APs in a unified manner, and easily expand the enterprise wireless network.
It can automatically discover the TP-LINK AP in the network, and perform unified configuration and management of the AP, realize zero-configuration AP access, plug and play, and support AP status monitoring and upgrade, which is easy to maintain.
Efficient firewall to ensure internal and external network security
Support IP and MAC address binding, effectively preventing intranet/extranet ARP spoofing; In the event of ARP spoofing, the system can send ARP correction messages at specified frequencies to restore the normal state of the network in a timely manner.
It supports intranet/extranet attack protection and can effectively prevent various common DoS attacks, scanning attacks, and suspicious packet attacks.
It supports MAC address-based filtering to effectively block the access of unauthorized hosts.
It can assign permissions through routers for various network services to ensure internal and external network security, and supports access control rules based on user groups and time periods to achieve more refined management.
Flexible bandwidth control to ensure reasonable bandwidth utilization
It supports elastic policies that enable bandwidth control based on bandwidth utilization, and can perform bidirectional bandwidth control for each host (IP) in the network, effectively inhibiting P2P applications such as BT and Thunderbolt from over-occupying bandwidth and ensuring smooth network at all times.
It provides an IP-based connection limit function, which can limit the number of connections occupied by each computer, prevent a small number of users from excessively occupying a large number of connections, and ensure the smooth operation of games, Internet surfing, chatting, video and voice, etc.
Multi-WAN load balancing and line backup
It provides one 10/100/1000M fixed WAN port, five 10/100/1000M fixed LAN ports and three 10/100/1000M WAN/LAN configurable ports.
It supports rich traffic balancing functions such as intelligent traffic steering, special application traffic steering, and ISP traffic steering, which can realize bandwidth superposition, make full use of bandwidth resources, and protect user investment.
It supports the WAN port backup function, and can automatically switch to the standby line when the main line fails, ensuring the normal operation of the network.
More useful features
Intra/extranet two-way port monitoring to meet the data monitoring needs of relevant departments;
Support DDNS and virtual server functions, easy to build intranet servers and private websites;
Support UPnP and ALG service functions to ensure that special network applications can smoothly penetrate NAT;
Brand new Chinese WEB management interface, management and maintenance are more convenient and fast;
Provide log list function to record network operation status in detail;
Multiple fault detection tools, such as Ping and Tracert, are supported to help you quickly find and troubleshoot network faults.
Dual-core CPU, 256MB DDRIII high-speed memory, powerful performance
9 Gigabit Ethernet ports, 1WAN+3WAN/LAN+5LAN
IPSec/PPTP/L2TP VPN makes long-distance communication more secure
Web authentication, SMS authentication, and PPPoE servers
Online behavior management (mobile app control/desktop application control/website filtering/behavior audit)
THE BUILT-IN AC FUNCTION ENABLES UNIFIED MANAGEMENT OF TP-LINK ENTERPRISE APS
Load balancing and line backup
Intranet and intranet ARP protection and common attack protection
Intelligent IP bandwidth management and limit the number of connections
|
In Stock
|
Subscribe
|
|
Quad-core CPU, 256MB DDRIII. high-speed memory, strong performance
1 10 Gigabit SFP+ fiber expansion port, 9 10/100/1000M RJ45 electrical ports, divided into customizable ports and fixed LAN ports
IPSec/PPTP/L2TP VPN makes long-distance communication more secure
Web authentication, SMS authentication, and PPPoE servers
Online behavior management (app restrictions/website filtering/web security)
Load balancing and line backup
Intranet and intranet ARP protection and common attack protection
Intelligent IP bandwidth management and limit the number of connections
|
In Stock
|
Subscribe
|
|
New hardware architecture, high-speed data forwarding
Adopting a new hardware architecture, a professional dual-core 64-bit network-specific processor, with a frequency of 1GHz, and 256MB DDRIII high-speed flash memory, the data packet processing capability has been greatly improved. In the actual environment, the typical number of machines is about 500 units.
VLAN (Multi-LAN)
With IEEE 802.1Q VLAN, enterprises can divide the intranet into different network segments that are isolated from each other as needed to reduce the impact of broadcast storms and viruses.
It supports VLAN Layer 3 interfaces, which can forward IP packets across VLANs, and set functions such as DHCP server, firewall rules, and access authentication policies based on VLANs.
A variety of authentication methods, control the Internet access, and realize advertising and marketing
Support web authentication, and push merchant advertising information through the authentication page;
Support SMS authentication, meet the requirements of real-name authentication, and can carry out secondary marketing based on mobile phone number;
It supports PPPoE servers, which can realize unified dial-up Internet access for intranet users.
The built-in AC function can be used to manage TP-LINK enterprise APs in a unified manner
The built-in AC function is both a router and a wireless controller, which can control up to 100 TP-LINK enterprise APs in a unified manner, and easily expand the enterprise wireless network.
It can automatically discover the TP-LINK AP in the network, and perform unified configuration and management of the AP, realize zero-configuration AP access, plug and play, and support AP status monitoring and upgrade, which is easy to maintain.
Efficient firewall to ensure internal and external network security
Support IP and MAC address binding, effectively preventing intranet/extranet ARP spoofing; In the event of ARP spoofing, you can send ARP correction messages based on the specified frequency to restore the normal network status in a timely manner.
It supports intranet/extranet attack protection and can effectively prevent various common DoS attacks, scanning attacks, and suspicious packet attacks.
MAC address-based filtering is supported to effectively block the access of unauthorized hosts.
It can assign permissions through routers for various network services to ensure internal and external network security, and supports access control rules based on user groups and time periods to achieve more refined management.
Flexible bandwidth control to ensure reasonable bandwidth utilization
It supports elastic policies that enable bandwidth control based on bandwidth utilization, and can perform bidirectional bandwidth control for each host (IP) in the network, effectively preventing P2P applications such as BT and Thunderbolt from over-occupying bandwidth and ensuring smooth network at all times.
It provides an IP-based connection limit function, which can limit the number of connections occupied by each computer, prevent a small number of users from excessively occupying a large number of connections, and ensure the smooth operation of games, Internet surfing, chatting, video and voice, etc.
More useful features
Dynamic IP, static IP, and PPPoE access modes are supported.
Intra/extranet two-way port monitoring to meet the data monitoring needs of relevant departments;
Support DDNS and virtual server functions, easy to build intranet servers and private websites;
Support UPnP and ALG service functions to ensure that special network applications can smoothly penetrate NAT;
Brand new Chinese WEB management interface, management and maintenance are more convenient and fast;
Provide log list function to record network operation status in detail;
Multiple fault detection tools, such as Ping and Tracert, are supported to help you quickly find and troubleshoot network faults.
Dual-core 64-bit network-specific processor, 256MB DDRIII high-speed memory, powerful performance
5 Gigabit Ethernet ports, 1WAN+4LAN
Web authentication, SMS authentication, and PPPoE servers
THE BUILT-IN AC FUNCTION ENABLES UNIFIED MANAGEMENT OF TP-LINK ENTERPRISE APS
Intranet and intranet ARP protection and common attack protection
Intelligent IP bandwidth management and limit the number of connections
|
In Stock
|
Subscribe
|
|
New hardware architecture, high-speed data forwarding
Adopting a new hardware architecture, a professional dual-core 64-bit network-specific processor, with a frequency of 1GHz, and 256MB DDRIII high-speed flash memory, the data packet processing capability has been greatly improved. In the actual environment, the typical number of machines is about 500 units.
VLAN (Multi-LAN)
With IEEE 802.1Q VLAN, enterprises can divide the intranet into different network segments that are isolated from each other as needed to reduce the impact of broadcast storms and viruses.
It supports VLAN Layer 3 interfaces, which can forward IP packets across VLANs, and set functions such as DHCP server, firewall rules, and access authentication policies based on VLANs.
A variety of authentication methods, control the Internet access, and realize advertising and marketing
Support web authentication, and push merchant advertising information through the authentication page;
Support SMS authentication, meet the requirements of real-name authentication, and can carry out secondary marketing based on mobile phone number;
It supports PPPoE servers, which can realize unified dial-up Internet access for intranet users.
The built-in AC function can be used to manage TP-LINK enterprise APs in a unified manner
The built-in AC function is both a router and a wireless controller, which can control up to 100 TP-LINK enterprise APs in a unified manner, and easily expand the enterprise wireless network.
It can automatically discover the TP-LINK AP in the network, and perform unified configuration and management of the AP, realize zero-configuration AP access, plug and play, and support AP status monitoring and upgrade, which is easy to maintain.
Efficient firewall to ensure internal and external network security
Support IP and MAC address binding, effectively preventing intranet/extranet ARP spoofing; If you are spoofed by ARP, you can send ARP correction messages based on the specified frequency to restore the normal state of the network in a timely manner.
It supports intranet/extranet attack protection and can effectively prevent various common DoS attacks, scanning attacks, and suspicious packet attacks.
MAC address-based filtering is supported to effectively block the access of unauthorized hosts.
It can assign permissions through routers for various network services to ensure internal and external network security, and supports access control rules based on user groups and time periods to achieve more refined management.
Flexible bandwidth control to ensure reasonable bandwidth utilization
It supports elastic policies that enable bandwidth control based on bandwidth utilization, and can perform bidirectional bandwidth control for each host (IP) in the network, effectively preventing P2P applications such as BT and Thunderbolt from over-occupying bandwidth and ensuring smooth network at all times.
It provides an IP-based connection limit function, which can limit the number of connections occupied by each computer, prevent a small number of users from excessively occupying a large number of connections, and ensure the smooth operation of games, Internet surfing, chatting, video and voice, etc.
Multi-WAN load balancing and line backup
It provides one 10/100/1000M fixed WAN port, one 10/100/1000M fixed LAN port and three 10/100/1000M WAN/LAN configurable ports.
It supports rich traffic balancing functions such as intelligent traffic steering, special application traffic steering, and ISP traffic steering, which can realize bandwidth superposition, make full use of bandwidth resources, and protect user investment.
It supports the WAN port backup function, and can automatically switch to the standby line when the main line fails, ensuring the normal operation of the network.
More useful features
Intra/extranet two-way port monitoring to meet the data monitoring needs of relevant departments;
Support DDNS and virtual server functions, easy to build intranet servers and private websites;
Support UPnP and ALG service functions to ensure that special network applications can smoothly penetrate NAT;
Brand new Chinese WEB management interface, management and maintenance are more convenient and fast;
Provide log list function to record network operation status in detail;
Multiple fault detection tools, such as Ping and Tracert, are supported to help you quickly find and troubleshoot network faults.
Dual-core 64-bit network-specific processor, 256MB DDRIII high-speed memory, powerful performance
5 Gigabit Ethernet ports, 1WAN+3WAN/LAN+1LAN
Web authentication, SMS authentication, and PPPoE servers
THE BUILT-IN AC FUNCTION ENABLES UNIFIED MANAGEMENT OF TP-LINK ENTERPRISE APS
Load balancing and line backup
Intranet and intranet ARP protection and common attack protection
Intelligent IP bandwidth management and limit the number of connections
|
In Stock
|
Subscribe
|
|
Quad-core CPU, 512MB DDRIII. high-speed memory, powerful performance
2 x 10 Gigabit SFP+ fiber expansion ports, 4 x 10/100/1000M RJ45 electrical ports, and the port type can be customized
IPSec/PPTP/L2TP VPN makes long-distance communication more secure
Web authentication, SMS authentication, and PPPoE servers
Online behavior management (app restrictions/website filtering/web security)
Load balancing and line backup
Intranet and intranet ARP protection and common attack protection
Intelligent IP bandwidth management and limit the number of connections
|
In Stock
|
Subscribe
|
|
The hardware has been upgraded for more powerful performance
The newly upgraded hardware architecture adopts a professional quad-core 64-bit network-specific processor, with a single-core frequency of up to 1.2GHz, and 1GB DDRIII large-capacity high-speed memory, which greatly improves the data packet processing capability. In the actual environment, the typical number of machines is about 2000 units.
The built-in AC function can be used to manage TP-LINK enterprise APs in a unified manner
The built-in AC function is both a router and a wireless controller, and can control up to 250 TP-LINK enterprise APs in a unified manner, making it easy to expand the enterprise wireless network.
It can automatically discover the TP-LINK AP in the network, and perform unified configuration and management of the AP, realize zero-configuration AP access, plug and play, and support AP status monitoring and upgrade, which is easy to maintain.
VLAN (Multi-LAN)
With IEEE 802.1Q VLAN, enterprises can divide the intranet into different network segments that are isolated from each other as needed to reduce the impact of broadcast storms and viruses.
It supports VLAN Layer 3 interfaces, which can forward IP packets across VLANs, and set functions such as DHCP server, firewall rules, and access authentication policies based on VLANs.
A variety of authentication methods, control the Internet access, and realize advertising and marketing
Support web authentication, and push merchant advertising information through the authentication page;
Support SMS authentication, meet the requirements of real-name authentication, and can carry out secondary marketing based on mobile phone number;
It supports PPPoE servers, which can realize unified dial-up Internet access for intranet users.
Efficient firewall to ensure internal and external network security
ARP dual protection
Support IP and MAC address binding, effectively preventing intranet/extranet ARP spoofing; If you are spoofed by ARP, you can send ARP correction messages based on the specified frequency to restore the normal state of the network in a timely manner.
Attack protection
It supports intranet/extranet attack protection and can effectively prevent various common DoS attacks, scanning attacks, and suspicious packet attacks.
MAC address filtering
MAC address-based filtering is supported to effectively block the access of unauthorized hosts.
Access policies
It can assign permissions through routers for various network services to ensure internal and external network security, and supports access control rules based on user groups and time periods to achieve more refined management.
Flexible bandwidth control to ensure reasonable bandwidth utilization
Intelligent bidirectional IP bandwidth control
It supports elastic policies that enable bandwidth control based on bandwidth utilization, and can perform bidirectional bandwidth control for each host (IP) in the network, effectively preventing P2P applications such as BT and Thunderbolt from over-occupying bandwidth and ensuring smooth network at all times.
Limit on the number of connections
It provides an IP-based connection limit function, which can limit the number of connections occupied by each computer, prevent a small number of users from excessively occupying a large number of connections, and ensure the smooth operation of games, Internet surfing, chatting, video and voice, etc.
Multi-WAN load balancing and line backup
It provides one 10/100/1000M fixed WAN port, one 10/100/1000M fixed LAN port and three 10/100/1000M WAN/LAN configurable ports.
It supports rich traffic balancing functions such as intelligent traffic steering, special application traffic steering, and ISP traffic steering, which can realize bandwidth superposition, make full use of bandwidth resources, and protect user investment.
It supports the WAN port backup function, and can automatically switch to the standby line when the main line fails, ensuring the normal operation of the network.
More useful features
Intra/extranet two-way port monitoring to meet the data monitoring needs of relevant departments;
Support DDNS and virtual server functions, easy to build intranet servers and private websites;
Support UPnP and ALG service functions to ensure that special network applications can smoothly penetrate NAT;
Brand new Chinese WEB management interface, management and maintenance are more convenient and fast;
Provide log list function to record network operation status in detail;
Multiple fault detection tools, such as Ping and Tracert, are supported to help you quickly find and troubleshoot network faults.
Quad-core CPU, 1GB DDRIII high-speed memory, powerful performance
5 Gigabit Ethernet ports, 1WAN+3WAN/LAN+1LAN
Web authentication, SMS authentication, and PPPoE servers
THE BUILT-IN AC FUNCTION ENABLES UNIFIED MANAGEMENT OF TP-LINK ENTERPRISE APS
Load balancing and line backup
Intranet and intranet ARP protection and common attack protection
Intelligent IP bandwidth management and limit the number of connections
|
In Stock
|
Subscribe
|
|
New hardware architecture, high-speed data forwarding
It adopts a new hardware architecture, a professional dual-core 64-bit network-specific processor, with a frequency of 1GHz, and 512MB DDRIII high-speed flash memory, which greatly improves the data packet processing capability. In the actual environment, the typical number of machines is about 500 units.
A variety of VPNs to ensure the security of long-distance communication
Support IPSec VPN, allowing up to 100 tunnels to be established to encrypt the confidential data of enterprises and branches to ensure data security.
It supports PPTP VPN and L2TP VPN server/client modes, allowing up to 100 tunnels (shared) to be established, which is convenient for employees on business trips and mobile workers to remotely access internal servers and easily realize remote work.
Manage online behavior and standardize employees' use of the Internet
Built-in database of common Internet applications, which can control various desktop and mobile Internet applications with one click, including social software/video software/music software/shopping and leisure software/news and information software/P2P software/financial software/online games/app stores/basic applications, etc.;
Built-in database of hundreds of URLs in more than a dozen categories, which can restrict employees' access to the corresponding website with one click;
Support prohibiting web submission, restricting employees from logging in to various web-based forums, microblogs, mailboxes, etc. to publish information, and avoid the leakage of sensitive data of enterprises;
It supports the expansion type of filtering files, which can easily filter all kinds of small files embedded in web pages to prevent viruses and Trojan horses from invading the enterprise network and endangering network security through these small files.
It supports the behavior audit function, comprehensively records online behavior, and outputs audit results in reports.
VLAN (Multi-LAN)
With IEEE 802.1Q VLAN, enterprises can divide the intranet into different network segments that are isolated from each other as needed to reduce the impact of broadcast storms and viruses.
It supports VLAN Layer 3 interfaces, which can forward IP packets across VLANs, and set functions such as DHCP server, firewall rules, and access authentication policies based on VLANs.
A variety of authentication methods, control the Internet access, and realize advertising and marketing
Support web authentication, and push merchant advertising information through the authentication page;
Support SMS authentication, meet the requirements of real-name authentication, and can carry out secondary marketing based on mobile phone number;
It supports PPPoE servers, which can realize unified dial-up Internet access for intranet users.
The built-in AC function can be used to manage TP-LINK enterprise APs in a unified manner
The built-in AC function is both a router and a wireless controller, which can control up to 100 TP-LINK enterprise APs in a unified manner, and easily expand the enterprise wireless network.
It can automatically discover the TP-LINK AP in the network, and perform unified configuration and management of the AP, realize zero-configuration AP access, plug and play, and support AP status monitoring and upgrade, which is easy to maintain.
Efficient firewall to ensure internal and external network security
Support IP and MAC address binding, effectively preventing intranet/extranet ARP spoofing; If you are spoofed by ARP, you can send ARP correction messages based on the specified frequency to restore the normal state of the network in a timely manner.
It supports intranet/extranet attack protection and can effectively prevent various common DoS attacks, scanning attacks, and suspicious packet attacks.
MAC address-based filtering is supported to effectively block the access of unauthorized hosts.
It can assign permissions through routers for various network services to ensure internal and external network security, and supports access control rules based on user groups and time periods to achieve more refined management.
Flexible bandwidth control to ensure reasonable bandwidth utilization
It supports elastic policies that enable bandwidth control based on bandwidth utilization, and can perform bidirectional bandwidth control for each host (IP) in the network, effectively preventing P2P applications such as BT and Thunderbolt from over-occupying bandwidth and ensuring smooth network at all times.
It provides an IP-based connection limit function, which can limit the number of connections occupied by each computer, prevent a small number of users from excessively occupying a large number of connections, and ensure the smooth operation of games, Internet surfing, chatting, video and voice, etc.
More useful features
Intra/extranet two-way port monitoring to meet the data monitoring needs of relevant departments;
Support DDNS and virtual server functions, easy to build intranet servers and private websites;
Support UPnP and ALG service functions to ensure that special network applications can smoothly penetrate NAT;
Brand new Chinese WEB management interface, management and maintenance are more convenient and fast;
Provide log list function to record network operation status in detail;
Multiple fault detection tools, such as Ping and Tracert, are supported to help you quickly find and troubleshoot network faults.
Dual-core 64-bit network-specific processor, 512MB DDRIII high-speed memory, powerful performance
5 Gigabit Ethernet ports, 1WAN+4LAN
IPSec/PPTP/L2TP VPN makes long-distance communication more secure
Web authentication, SMS authentication, and PPPoE servers
Online behavior management (mobile app control/desktop application control/website filtering/behavior audit)
THE BUILT-IN AC FUNCTION ENABLES UNIFIED MANAGEMENT OF TP-LINK ENTERPRISE APS
Intranet and intranet ARP protection and common attack protection
Intelligent IP bandwidth management and limit the number of connections
|
In Stock
|
Subscribe
|
|
New hardware architecture, high-speed data forwarding
It adopts a new hardware architecture, a professional dual-core 64-bit network-specific processor, with a frequency of 1GHz, and 512MB DDRIII high-speed flash memory, which greatly improves the data packet processing capability. In the actual environment, the typical number of machines is about 500 units.
A variety of VPNs to ensure the security of long-distance communication
Support IPSec VPN, allowing up to 100 tunnels to be established to encrypt the confidential data of enterprises and branches to ensure data security.
It supports PPTP VPN and L2TP VPN server/client modes, allowing up to 100 tunnels (shared) to be established, which is convenient for employees on business trips and mobile workers to remotely access internal servers and easily realize remote work.
Manage online behavior and standardize employees' use of the Internet
Built-in database of common Internet applications, which can control various desktop and mobile Internet applications with one click, including social software/video software/music software/shopping and leisure software/news and information software/P2P software/financial software/online games/app stores/basic applications, etc.;
Built-in database of hundreds of URLs in more than a dozen categories, which can restrict employees' access to the corresponding website with one click;
Support prohibiting web submission, restricting employees from logging in to various web-based forums, microblogs, mailboxes, etc. to publish information, and avoid the leakage of sensitive data of enterprises;
It supports the expansion type of filtering files, which can easily filter all kinds of small files embedded in web pages to prevent viruses and Trojan horses from invading the enterprise network and endangering network security through these small files.
It supports the behavior audit function, comprehensively records online behavior, and outputs audit results in reports.
VLAN (Multi-LAN)
With IEEE 802.1Q VLAN, enterprises can divide the intranet into different network segments that are isolated from each other as needed to reduce the impact of broadcast storms and viruses.
It supports VLAN Layer 3 interfaces, which can forward IP packets across VLANs, and set functions such as DHCP server, firewall rules, and access authentication policies based on VLANs.
A variety of authentication methods, control the Internet access, and realize advertising and marketing
Support web authentication, and push merchant advertising information through the authentication page;
Support SMS authentication, meet the requirements of real-name authentication, and can carry out secondary marketing based on mobile phone number;
It supports PPPoE servers, which can realize unified dial-up Internet access for intranet users.
The built-in AC function can be used to manage TP-LINK enterprise APs in a unified manner
The built-in AC function is both a router and a wireless controller, which can control up to 100 TP-LINK enterprise APs in a unified manner, and easily expand the enterprise wireless network.
It can automatically discover the TP-LINK AP in the network, and perform unified configuration and management of the AP, realize zero-configuration AP access, plug and play, and support AP status monitoring and upgrade, which is easy to maintain.
Efficient firewall to ensure internal and external network security
Support IP and MAC address binding, effectively preventing intranet/extranet ARP spoofing; If you are spoofed by ARP, you can send ARP correction messages based on the specified frequency to restore the normal state of the network in a timely manner.
It supports intranet/extranet attack protection and can effectively prevent various common DoS attacks, scanning attacks, and suspicious packet attacks.
MAC address-based filtering is supported to effectively block the access of unauthorized hosts.
It can assign permissions through routers for various network services to ensure internal and external network security, and supports access control rules based on user groups and time periods to achieve more refined management.
Flexible bandwidth control to ensure reasonable bandwidth utilization
It supports elastic policies that enable bandwidth control based on bandwidth utilization, and can perform bidirectional bandwidth control for each host (IP) in the network, effectively preventing P2P applications such as BT and Thunderbolt from over-occupying bandwidth and ensuring smooth network at all times.
It provides an IP-based connection limit function, which can limit the number of connections occupied by each computer, prevent a small number of users from excessively occupying a large number of connections, and ensure the smooth operation of games, Internet surfing, chatting, video and voice, etc.
Multi-WAN load balancing and line backup
It provides one 10/100/1000M fixed WAN port, one 10/100/1000M fixed LAN port and three 10/100/1000M WAN/LAN configurable ports.
It supports rich traffic balancing functions such as intelligent traffic steering, special application traffic steering, and ISP traffic steering, which can realize bandwidth superposition, make full use of bandwidth resources, and protect user investment.
It supports the WAN port backup function, and can automatically switch to the standby line when the main line fails, ensuring the normal operation of the network.
More useful features
Intra/extranet two-way port monitoring to meet the data monitoring needs of relevant departments;
Support DDNS and virtual server functions, easy to build intranet servers and private websites;
Support UPnP and ALG service functions to ensure that special network applications can smoothly penetrate NAT;
Brand new Chinese WEB management interface, management and maintenance are more convenient and fast;
Provide log list function to record network operation status in detail;
Multiple fault detection tools, such as Ping and Tracert, are supported to help you quickly find and troubleshoot network faults.
Dual-core 64-bit network-specific processor, 512MB DDRIII high-speed memory, powerful performance
5 Gigabit Ethernet ports, 1WAN+3WAN/LAN+1LAN
IPSec/PPTP/L2TP VPN makes long-distance communication more secure
Web authentication, SMS authentication, and PPPoE servers
Online behavior management (mobile app control/desktop application control/website filtering/behavior audit)
THE BUILT-IN AC FUNCTION ENABLES UNIFIED MANAGEMENT OF TP-LINK ENTERPRISE APS
Load balancing, attack protection, and bandwidth management
|
In Stock
|
Subscribe
|
|
TL-ER6120T is a high-performance enterprise-class router product developed by TP-LINK for large and medium-sized enterprises, campuses, hotels, wireless coverage and other environments, using 64-bit quad-core ARM processor, large-capacity high-speed DDRIV memory, supporting IPSec/PPTP/L2TP VPN, online behavior management, AP management, web authentication, PPPoE server, IP/MAC binding, attack protection and bandwidth management and other rich functional features. The built-in AC (wireless controller) can manage TP-LINK AP products in a unified manner, which is suitable for enterprises, campuses, hotels, and other enterprises to build secure, efficient, and easy-to-manage networks.
Quad-core CPU, 512MB DDRIV high-speed memory, powerful performance
2 x 10 Gigabit SFP+ fiber expansion ports, 4 x 10/100/1000M RJ45 electrical ports, and the port type can be customized
IPSec/PPTP/L2TP VPN makes long-distance communication more secure
Web authentication, SMS authentication, and PPPoE servers
Online behavior management (app restrictions/website filtering/web security)
Load balancing and line backup
Intranet and intranet ARP protection and common attack protection
Intelligent IP bandwidth management and limit the number of connections
New hardware architecture, high-speed data forwarding
It adopts a new hardware architecture, a professional quad-core 64-bit ARM processor, a single-core frequency of up to 1.4GHz, and a 512MB DDRIV high-speed memory, which greatly improves the data processing capability. In the actual environment, the typical number of machines is about 500 units.
A variety of VPNs to ensure the security of long-distance communication
It supports IPSec VPN, allowing up to 200 tunnels to be established to encrypt the confidential data of enterprises and branches to ensure data security.
It supports PPTP VPN and L2TP VPN server/client modes, allowing up to 200 tunnels (shared) to be established, which is convenient for employees on business trips and mobile workers to remotely access internal servers and easily realize remote work.
Manage online behavior and standardize employees' use of the Internet
Built-in database of common Internet applications, which can control various desktop and mobile Internet applications with one click, including social software/video software/music software/shopping and leisure software/news and information software/P2P software/financial software/online games/app stores/basic applications, etc.;
Built-in database of hundreds of URLs in more than a dozen categories, which can restrict employees' access to the corresponding website with one click;
Support prohibiting web submission, restricting employees from logging in to various web-based forums, microblogs, mailboxes, etc. to publish information, and avoid the leakage of sensitive data of enterprises;
It supports the expansion type of filtering files, which can easily filter all kinds of small files embedded in web pages to prevent viruses and Trojan horses from invading the enterprise network and endangering network security through these small files.
It supports the behavior audit function, comprehensively records online behavior, and outputs audit results in reports.
VLAN (Multi-LAN)
With IEEE 802.1Q VLAN, enterprises can divide the intranet into different network segments that are isolated from each other as needed to reduce the impact of broadcast storms and viruses.
It supports VLAN Layer 3 interfaces, which can forward IP packets across VLANs, and set functions such as DHCP server, firewall rules, and access authentication policies based on VLANs.
A variety of authentication methods, control the Internet access, and realize advertising and marketing
Support web authentication, and push merchant advertising information through the authentication page;
Support SMS authentication, meet the requirements of real-name authentication, and can carry out secondary marketing based on mobile phone number;
It supports PPPoE servers, which can realize unified dial-up Internet access for intranet users.
Wired and wireless application integration
Built-in AC function: AC wireless control, which is both a router and a wireless controller, can manage 100 TP-LINK AP products in a unified manner to form an enterprise-level wireless network.It can automatically discover the TP-LINK AP in the network, and uniformly configure and manage the AP, so as to realize zero-configuration AP access and plug-and-play. At the same time, it supports AP status monitoring and upgrade, and is easy to maintain.Support optical fiber access: support gigabit and 10 gigabit optical interfaces, and flexibly match network access.Copper cable access is supported.
Efficient firewall to ensure internal and external network security
Support IP and MAC address binding, effectively preventing intranet/extranet ARP spoofing; In the event of ARP spoofing, the system can send ARP correction messages at specified frequencies to restore the normal state of the network in a timely manner.
It supports intranet/extranet attack protection and can effectively prevent various common DoS attacks, scanning attacks, and suspicious packet attacks.
It supports MAC address-based filtering to effectively block the access of unauthorized hosts.
It can assign permissions through routers for various network services to ensure internal and external network security, and supports access control rules based on user groups and time periods to achieve more refined management.
Flexible bandwidth control to ensure reasonable bandwidth utilization
It supports the intelligent IP bandwidth control function, flexibly enables the bandwidth control policy according to the actual bandwidth utilization, and can carry out two-way bandwidth control for each host (IP) in the network, effectively inhibiting the excessive bandwidth occupation of P2P applications such as BT and Thunderbolt, avoiding the problem of online game cards and slow Internet speed, and ensuring that the network is smooth at all times.It provides an IP-based connection restriction function, which can limit the number of connections occupied by each computer, make reasonable use of the limited NAT connection resources, prevent a small number of users from excessively occupying a large number of connections, and ensure the smooth operation of games, Internet access, chat, video and voice, etc.It supports multiple load balancing strategies, such as intelligent balancing, special application traffic selection, and ISP traffic selection, to effectively improve network service quality, make full use of interface bandwidth, improve network experience, and protect user investment.
More useful features
Intra/extranet two-way port monitoring to meet the data monitoring needs of relevant departments;
Support DDNS and virtual server functions, easy to build intranet servers and private websites;
Support UPnP and ALG service functions to ensure that special network applications can smoothly penetrate NAT;
Brand new Chinese WEB management interface, management and maintenance are more convenient and fast;
Provide log list function to record network operation status in detail;
Multiple fault detection tools, such as Ping and Tracert, are supported to help you quickly find and troubleshoot network faults.
|
In Stock
|
Subscribe
|
|
TL-ER6160T is a high-performance enterprise-level router product developed by TP-LINK for large and medium-sized enterprises, campuses, hotels, wireless coverage and other environments, using 64-bit quad-core ARM processor, large-capacity high-speed DDRIV memory, supporting IPSec/PPTP/L2TP VPN, online behavior management, AP management, web authentication, PPPoE server, IP/MAC binding, attack protection and bandwidth management and other rich functional features. The built-in AC (wireless controller) can manage TP-LINK AP products in a unified manner, which is suitable for enterprises, campuses, hotels, and other enterprises to build secure, efficient, and easy-to-manage networks.
Quad-core CPU, 512MB DDRIV high-speed memory, powerful performance
2 x 10 Gigabit SFP+ fiber expansion ports, 4 x 10/100/1000M RJ45 electrical ports, and the port type can be customized
IPSec/PPTP/L2TP VPN makes long-distance communication more secure
Web authentication, SMS authentication, and PPPoE servers
Online behavior management (app restrictions/website filtering/web security)
Load balancing and line backup
Intranet and intranet ARP protection and common attack protection
Intelligent IP bandwidth management and limit the number of connections
New hardware architecture, high-speed data forwarding
It adopts a new hardware architecture, a professional quad-core 64-bit ARM processor, a single-core frequency of up to 1.0GHz, and a 512MB DDRIV high-speed memory, which greatly improves the packet processing capability. In the actual environment, the typical number of machines is about 2000 units.
A variety of VPNs to ensure the security of long-distance communication
It supports IPSec VPN, allowing up to 200 tunnels to be established to encrypt the confidential data of enterprises and branches to ensure data security.
It supports PPTP VPN and L2TP VPN server/client modes, allowing up to 200 tunnels (shared) to be established, which is convenient for employees on business trips and mobile workers to remotely access internal servers and easily realize remote work.
Manage online behavior and standardize employees' use of the Internet
Built-in database of common Internet applications, which can control various desktop and mobile Internet applications with one click, including social software/video software/music software/shopping and leisure software/news and information software/P2P software/financial software/online games/app stores/basic applications, etc.;
Built-in database of hundreds of URLs in more than a dozen categories, which can restrict employees' access to the corresponding website with one click;
Support prohibiting web submission, restricting employees from logging in to various web-based forums, microblogs, mailboxes, etc. to publish information, and avoid the leakage of sensitive data of enterprises;
It supports the expansion type of filtering files, which can easily filter all kinds of small files embedded in web pages to prevent viruses and Trojan horses from invading the enterprise network and endangering network security through these small files.
It supports the behavior audit function, comprehensively records online behavior, and outputs audit results in reports.
VLAN (Multi-LAN)
With IEEE 802.1Q VLAN, enterprises can divide the intranet into different network segments that are isolated from each other as needed to reduce the impact of broadcast storms and viruses.
It supports VLAN Layer 3 interfaces, which can forward IP packets across VLANs, and set functions such as DHCP server, firewall rules, and access authentication policies based on VLANs.
A variety of authentication methods, control the Internet access, and realize advertising and marketing
Support web authentication, and push merchant advertising information through the authentication page;
Support SMS authentication, meet the requirements of real-name authentication, and can carry out secondary marketing based on mobile phone number;
It supports PPPoE servers, which can realize unified dial-up Internet access for intranet users.
Wired and wireless application integration
Built-in AC function: AC wireless control, which is both a router and a wireless controller, can manage 500 TP-LINK AP products in a unified manner to form an enterprise-level wireless network.It can automatically discover the TP-LINK AP in the network, and uniformly configure and manage the AP, so as to realize zero-configuration AP access and plug-and-play. At the same time, it supports AP status monitoring and upgrade, and is easy to maintain.Support optical fiber access: support gigabit and 10 gigabit optical interfaces, and flexibly match network access.Copper cable access is supported.
Efficient firewall to ensure internal and external network security
Support IP and MAC address binding, effectively preventing intranet/extranet ARP spoofing; In the event of ARP spoofing, the system can send ARP correction messages at specified frequencies to restore the normal state of the network in a timely manner.
It supports intranet/extranet attack protection and can effectively prevent various common DoS attacks, scanning attacks, and suspicious packet attacks.
It supports MAC address-based filtering to effectively block the access of unauthorized hosts.
It can assign permissions through routers for various network services to ensure internal and external network security, and supports access control rules based on user groups and time periods to achieve more refined management.
Flexible bandwidth control to ensure reasonable bandwidth utilization
It supports the intelligent IP bandwidth control function, flexibly enables the bandwidth control policy according to the actual bandwidth utilization, and can carry out two-way bandwidth control for each host (IP) in the network, effectively inhibiting the excessive bandwidth occupation of P2P applications such as BT and Thunderbolt, avoiding the problem of online game cards and slow Internet speed, and ensuring that the network is smooth at all times.It provides an IP-based connection restriction function, which can limit the number of connections occupied by each computer, make reasonable use of the limited NAT connection resources, prevent a small number of users from excessively occupying a large number of connections, and ensure the smooth operation of games, Internet access, chat, video and voice, etc.It supports multiple load balancing strategies, such as intelligent balancing, special application traffic selection, and ISP traffic selection, to effectively improve network service quality, make full use of interface bandwidth, improve network experience, and protect user investment.
More useful features
Intra/extranet two-way port monitoring to meet the data monitoring needs of relevant departments;
Support DDNS and virtual server functions, easy to build intranet servers and private websites;
Support UPnP and ALG service functions to ensure that special network applications can smoothly penetrate NAT;
Brand new Chinese WEB management interface, management and maintenance are more convenient and fast;
Provide log list function to record network operation status in detail;
Multiple fault detection tools, such as Ping and Tracert, are supported to help you quickly find and troubleshoot network faults.
|
In Stock
|
Subscribe
|
|
New hardware architecture, high-speed data forwarding
Adopting a new hardware architecture, a professional dual-core 64-bit network-specific processor, a single-core frequency of up to 1GHz, with 1GB DDR3 high-speed memory, the data packet processing capability has been greatly improved. In the actual environment, the typical number of machines is about 1,000 units.
A variety of VPNs to ensure the security of long-distance communication
It supports IPSec VPN, allowing up to 200 tunnels to be established to encrypt the confidential data of enterprises and branches to ensure data security.
It supports PPTP VPN and L2TP VPN server/client modes, allowing up to 200 tunnels (shared) to be established, which is convenient for employees on business trips and mobile workers to remotely access internal servers and easily realize remote work.
Manage online behavior and standardize employees' use of the Internet
Built-in database of common Internet applications, which can control various desktop and mobile Internet applications with one click, including social software/video software/music software/shopping and leisure software/news and information software/P2P software/financial software/online games/app stores/basic applications, etc.;
Built-in database of hundreds of URLs in more than a dozen categories, which can restrict employees' access to the corresponding website with one click;
Support prohibiting web submission, restricting employees from logging in to various web-based forums, microblogs, mailboxes, etc. to publish information, and avoid the leakage of sensitive data of enterprises;
It supports the expansion type of filtering files, which can easily filter all kinds of small files embedded in web pages to prevent viruses and Trojan horses from invading the enterprise network and endangering network security through these small files.
It supports the behavior audit function, comprehensively records online behavior, and outputs audit results in reports.
VLAN (Multi-LAN)
With IEEE 802.1Q VLAN, enterprises can divide the intranet into different network segments that are isolated from each other as needed to reduce the impact of broadcast storms and viruses.
It supports VLAN Layer 3 interfaces, which can forward IP packets across VLANs, and set functions such as DHCP server, firewall rules, and access authentication policies based on VLANs.
A variety of authentication methods, control the Internet access, and realize advertising and marketing
Support web authentication, and push merchant advertising information through the authentication page;
Support SMS authentication, meet the requirements of real-name authentication, and can carry out secondary marketing based on mobile phone number;
It supports PPPoE servers, which can realize unified dial-up Internet access for intranet users.
The built-in AC function can be used to manage TP-LINK enterprise APs in a unified manner
The built-in AC function is both a router and a wireless controller, which can control up to 150 TP-LINK enterprise APs in a unified manner, making it easy to expand the enterprise wireless network.
It can automatically discover the TP-LINK AP in the network, and perform unified configuration and management of the AP, realize zero-configuration AP access, plug and play, and support AP status monitoring and upgrade, which is easy to maintain.
Efficient firewall to ensure internal and external network security
ARP dual protection
Support IP and MAC address binding, effectively preventing intranet/extranet ARP spoofing; In the event of ARP spoofing, you can send ARP correction messages based on the specified frequency to restore the normal network status in a timely manner.
Attack protection
It supports intranet/extranet attack protection and can effectively prevent various common DoS attacks, scanning attacks, and suspicious packet attacks.
MAC address filtering
MAC address-based filtering is supported to effectively block the access of unauthorized hosts.
Access policies
It can assign permissions through routers for various network services to ensure internal and external network security, and supports access control rules based on user groups and time periods to achieve more refined management.
Flexible bandwidth control to ensure reasonable bandwidth utilization
Intelligent bidirectional IP bandwidth control
It supports elastic policies that enable bandwidth control based on bandwidth utilization, and can perform bidirectional bandwidth control for each host (IP) in the network, effectively preventing P2P applications such as BT and Thunderbolt from over-occupying bandwidth and ensuring smooth network at all times.
Limit on the number of connections
It provides an IP-based connection limit function, which can limit the number of connections occupied by each computer, prevent a small number of users from excessively occupying a large number of connections, and ensure the smooth operation of games, Internet surfing, chatting, video and voice, etc.
More useful features
Intra/extranet two-way port monitoring to meet the data monitoring needs of relevant departments;
Support DDNS and virtual server functions, easy to build intranet servers and private websites;
Support UPnP and ALG service functions to ensure that special network applications can smoothly penetrate NAT;
Brand new Chinese WEB management interface, management and maintenance are more convenient and fast;
Provide log list function to record network operation status in detail;
Multiple fault detection tools, such as Ping and Tracert, are supported to help you quickly find and troubleshoot network faults.
Dual-core CPU, 1GB DDRIII high-speed memory, strong performance
5 Gigabit Ethernet ports, 1WAN+4LAN
IPSec/PPTP/L2TP VPN makes long-distance communication more secure
Web authentication, SMS authentication, and PPPoE servers
Online behavior management (mobile APP control/desktop application control/website filtering/behavior audit).
THE BUILT-IN AC FUNCTION ENABLES UNIFIED MANAGEMENT OF TP-LINK ENTERPRISE APS
Intranet and intranet ARP protection and common attack protection
Intelligent IP bandwidth management and limit the number of connections
|
In Stock
|
Subscribe
|
|
New hardware architecture, high-speed data forwarding
Adopting a new hardware architecture, a professional dual-core 64-bit network-specific processor, a single-core frequency of up to 1GHz, with 1GB DDRIII high-speed memory, the data packet processing capability has been greatly improved. In the actual environment, the typical number of machines is about 1,000 units.
A variety of VPNs to ensure the security of long-distance communication
It supports IPSec VPN, allowing up to 200 tunnels to be established to encrypt the confidential data of enterprises and branches to ensure data security.
It supports PPTP VPN and L2TP VPN server/client modes, allowing up to 200 tunnels (shared) to be established, which is convenient for employees on business trips and mobile workers to remotely access internal servers and easily realize remote work.
Manage online behavior and standardize employees' use of the Internet
Built-in database of common Internet applications, which can control various desktop and mobile Internet applications with one click, including social software/video software/music software/shopping and leisure software/news and information software/P2P software/financial software/online games/app stores/basic applications, etc.;
Built-in database of hundreds of URLs in more than a dozen categories, which can restrict employees' access to the corresponding website with one click;
Support prohibiting web submission, restricting employees from logging in to various web-based forums, microblogs, mailboxes, etc. to publish information, and avoid the leakage of sensitive data of enterprises;
It supports the expansion type of filtering files, which can easily filter all kinds of small files embedded in web pages to prevent viruses and Trojan horses from invading the enterprise network and endangering network security through these small files.
It supports the behavior audit function, comprehensively records online behavior, and outputs audit results in reports.
VLAN (Multi-LAN)
With IEEE 802.1Q VLAN, enterprises can divide the intranet into different network segments that are isolated from each other as needed to reduce the impact of broadcast storms and viruses.
It supports VLAN Layer 3 interfaces, which can forward IP packets across VLANs, and set functions such as DHCP server, firewall rules, and access authentication policies based on VLANs.
A variety of authentication methods, control the Internet access, and realize advertising and marketing
Support web authentication, and push merchant advertising information through the authentication page;
Support SMS authentication, meet the requirements of real-name authentication, and can carry out secondary marketing based on mobile phone number;
It supports PPPoE servers, which can realize unified dial-up Internet access for intranet users.
The built-in AC function can be used to manage TP-LINK enterprise APs in a unified manner
The built-in AC function is both a router and a wireless controller, which can control up to 150 TP-LINK enterprise APs in a unified manner, making it easy to expand the enterprise wireless network.
It can automatically discover the TP-LINK AP in the network, and perform unified configuration and management of the AP, realize zero-configuration AP access, plug and play, and support AP status monitoring and upgrade, which is easy to maintain.
Efficient firewall to ensure internal and external network security
Support IP and MAC address binding, effectively preventing intranet/extranet ARP spoofing; In the event of ARP spoofing, the system can send ARP correction messages at specified frequencies to restore the normal state of the network in a timely manner.
It supports intranet/extranet attack protection and can effectively prevent various common DoS attacks, scanning attacks, and suspicious packet attacks.
It supports MAC address-based filtering to effectively block the access of unauthorized hosts.
It can assign permissions through routers for various network services to ensure internal and external network security, and supports access control rules based on user groups and time periods to achieve more refined management.
Flexible bandwidth control to ensure reasonable bandwidth utilization
It supports elastic policies that enable bandwidth control based on bandwidth utilization, and can perform bidirectional bandwidth control for each host (IP) in the network, effectively inhibiting P2P applications such as BT and Thunderbolt from over-occupying bandwidth and ensuring smooth network at all times.
It provides an IP-based connection limit function, which can limit the number of connections occupied by each computer, prevent a small number of users from excessively occupying a large number of connections, and ensure the smooth operation of games, Internet surfing, chatting, video and voice, etc.
Multi-WAN load balancing and line backup
It provides one 10/100/1000M fixed WAN port, one 10/100/1000M fixed LAN port and three 10/100/1000M WAN/LAN configurable ports.
It supports rich traffic balancing functions such as intelligent traffic steering, special application traffic steering, and ISP traffic steering, which can realize bandwidth superposition, make full use of bandwidth resources, and protect user investment.
It supports the WAN port backup function, and can automatically switch to the standby line when the main line fails, ensuring the normal operation of the network.
More useful features
Intra/extranet two-way port monitoring to meet the data monitoring needs of relevant departments;
Support DDNS and virtual server functions, easy to build intranet servers and private websites;
Support UPnP and ALG service functions to ensure that special network applications can smoothly penetrate NAT;
Brand new Chinese WEB management interface, management and maintenance are more convenient and fast;
Provide log list function to record network operation status in detail;
Multiple fault detection tools, such as Ping and Tracert, are supported to help you quickly find and troubleshoot network faults.
Dual-core CPU, 1GB DDRIII high-speed memory, strong performance
5 Gigabit Ethernet ports, 1WAN+3WAN/LAN+1LAN
IPSec/PPTP/L2TP VPN makes long-distance communication more secure
Web authentication, SMS authentication, and PPPoE servers
Online behavior management (mobile app control/desktop application control/website filtering/behavior audit)
THE BUILT-IN AC FUNCTION ENABLES UNIFIED MANAGEMENT OF TP-LINK ENTERPRISE APS
Load balancing and line backup
Intranet and intranet ARP protection and common attack protection
Intelligent IP bandwidth management and limit the number of connections
|
In Stock
|
Subscribe
|
|
TL-ER6220T is a high-performance enterprise-class router product developed by TP-LINK for large and medium-sized enterprises, campuses, hotels, wireless coverage and other environments, using 64-bit quad-core ARM processor, large-capacity high-speed DDRIV memory, supporting IPSec/PPTP/L2TP VPN, online behavior management, AP management, web authentication, PPPoE server, IP/MAC binding, attack protection and bandwidth management and other rich functional features. The built-in AC (wireless controller) can manage TP-LINK AP products in a unified manner, which is suitable for enterprises, campuses, hotels, and other enterprises to build secure, efficient, and easy-to-manage networks.
Quad-core CPU, 1GB DDRIV high-speed memory, strong performance
2 x 10 Gigabit SFP+ fiber expansion ports, 4 x 10/100/1000M RJ45 electrical ports, and the port type can be customized
IPSec/PPTP/L2TP VPN makes long-distance communication more secure
Web authentication, SMS authentication, and PPPoE servers
Online behavior management (app restrictions/website filtering/web security)
Load balancing and line backup
Intranet and intranet ARP protection and common attack protection
Intelligent IP bandwidth management and limit the number of connections
New hardware architecture, high-speed data forwarding
Using a new hardware architecture, a professional quad-core 64-bit ARM processor, a single-core frequency of up to 1.4GHz, with 1GB DDRIV high-speed memory, the data packet processing capability has been greatly improved. In the actual environment, the typical number of machines is about 1,000 units.
A variety of VPNs to ensure the security of long-distance communication
It supports IPSec VPN, allowing up to 200 tunnels to be established to encrypt the confidential data of enterprises and branches to ensure data security.
It supports PPTP VPN and L2TP VPN server/client modes, allowing up to 200 tunnels (shared) to be established, which is convenient for employees on business trips and mobile workers to remotely access internal servers and easily realize remote work.
Manage online behavior and standardize employees' use of the Internet
Built-in database of common Internet applications, which can control various desktop and mobile Internet applications with one click, including social software/video software/music software/shopping and leisure software/news and information software/P2P software/financial software/online games/app stores/basic applications, etc.;
Built-in database of hundreds of URLs in more than a dozen categories, which can restrict employees' access to the corresponding website with one click;
Support prohibiting web submission, restricting employees from logging in to various web-based forums, microblogs, mailboxes, etc. to publish information, and avoid the leakage of sensitive data of enterprises;
It supports the expansion type of filtering files, which can easily filter all kinds of small files embedded in web pages to prevent viruses and Trojan horses from invading the enterprise network and endangering network security through these small files.
It supports the behavior audit function, comprehensively records online behavior, and outputs audit results in reports.
VLAN (Multi-LAN)
With IEEE 802.1Q VLAN, enterprises can divide the intranet into different network segments that are isolated from each other as needed to reduce the impact of broadcast storms and viruses.
It supports VLAN Layer 3 interfaces, which can forward IP packets across VLANs, and set functions such as DHCP server, firewall rules, and access authentication policies based on VLANs.
A variety of authentication methods, control the Internet access, and realize advertising and marketing
Support web authentication, and push merchant advertising information through the authentication page;
Support SMS authentication, meet the requirements of real-name authentication, and can carry out secondary marketing based on mobile phone number;
It supports PPPoE servers, which can realize unified dial-up Internet access for intranet users.
Wired and wireless application integration
Built-in AC function: AC wireless control, which is both a router and a wireless controller, can manage 150 TP-LINK AP products in a unified manner, and build an enterprise-level wireless network.It can automatically discover the TP-LINK AP in the network, and uniformly configure and manage the AP, so as to realize zero-configuration AP access and plug-and-play. At the same time, it supports AP status monitoring and upgrade, and is easy to maintain.Support optical fiber access: support gigabit and 10 gigabit optical interfaces, and flexibly match network access.Copper cable access is supported.
Efficient firewall to ensure internal and external network security
Support IP and MAC address binding, effectively preventing intranet/extranet ARP spoofing; In the event of ARP spoofing, the system can send ARP correction messages at specified frequencies to restore the normal state of the network in a timely manner.
It supports intranet/extranet attack protection and can effectively prevent various common DoS attacks, scanning attacks, and suspicious packet attacks.
It supports MAC address-based filtering to effectively block the access of unauthorized hosts.
It can assign permissions through routers for various network services to ensure internal and external network security, and supports access control rules based on user groups and time periods to achieve more refined management.
Flexible bandwidth control to ensure reasonable bandwidth utilization
It supports the intelligent IP bandwidth control function, flexibly enables the bandwidth control policy according to the actual bandwidth utilization, and can carry out two-way bandwidth control for each host (IP) in the network, effectively inhibiting the excessive bandwidth occupation of P2P applications such as BT and Thunderbolt, avoiding the problem of online game cards and slow Internet speed, and ensuring that the network is smooth at all times.It provides an IP-based connection restriction function, which can limit the number of connections occupied by each computer, make reasonable use of the limited NAT connection resources, prevent a small number of users from excessively occupying a large number of connections, and ensure the smooth operation of games, Internet access, chat, video and voice, etc.It supports multiple load balancing strategies, such as intelligent balancing, special application traffic selection, and ISP traffic selection, to effectively improve network service quality, make full use of interface bandwidth, improve network experience, and protect user investment.
More useful features
Intra/extranet two-way port monitoring to meet the data monitoring needs of relevant departments;
Support DDNS and virtual server functions, easy to build intranet servers and private websites;
Support UPnP and ALG service functions to ensure that special network applications can smoothly penetrate NAT;
Brand new Chinese WEB management interface, management and maintenance are more convenient and fast;
Provide log list function to record network operation status in detail;
Multiple fault detection tools, such as Ping and Tracert, are supported to help you quickly find and troubleshoot network faults.
|
In Stock
|
Subscribe
|
|
The hardware has been upgraded for more powerful performance
The newly upgraded hardware architecture uses a professional quad-core 64-bit network-specific processor, with a single-core frequency of up to 1.2GHz, and 1GB DDRIII high-speed memory, which greatly improves the data packet processing capability. In the actual environment, the typical number of machines is about 2000 units.
The built-in AC function can be used to manage TP-LINK enterprise APs in a unified manner
The built-in AC function is both a router and a wireless controller, and can control up to 250 TP-LINK enterprise APs in a unified manner, making it easy to expand the enterprise wireless network.
It can automatically discover the TP-LINK AP in the network, and perform unified configuration and management of the AP, realize zero-configuration AP access, plug and play, and support AP status monitoring and upgrade, which is easy to maintain.
A variety of VPNs to ensure the security of long-distance communication
It supports IPSec VPN, allowing up to 200 tunnels to be established to encrypt the confidential data of enterprises and branches to ensure data security.
It supports PPTP VPN and L2TP VPN server/client modes, allowing up to 200 tunnels (shared) to be established, which is convenient for employees on business trips and mobile workers to remotely access internal servers and easily realize remote work.
Manage online behavior and standardize employees' use of the Internet
Built-in database of common Internet applications, which can control various desktop and mobile Internet applications with one click, including social software/video software/music software/shopping and leisure software/news and information software/P2P software/financial software/online games/app stores/basic applications, etc.;
Built-in database of hundreds of URLs in more than a dozen categories, which can restrict employees' access to the corresponding website with one click;
Support prohibiting web submission, restricting employees from logging in to various web-based forums, microblogs, mailboxes, etc. to publish information, and avoid the leakage of sensitive data of enterprises;
It supports the expansion type of filtering files, which can easily filter all kinds of small files embedded in web pages to prevent viruses and Trojan horses from invading the enterprise network and endangering network security through these small files.
It supports the behavior audit function, comprehensively records online behavior, and outputs audit results in reports.
VLAN (Multi-LAN)
With IEEE 802.1Q VLAN, enterprises can divide the intranet into different network segments that are isolated from each other as needed to reduce the impact of broadcast storms and viruses.
It supports VLAN Layer 3 interfaces, which can forward IP packets across VLANs, and set functions such as DHCP server, firewall rules, and access authentication policies based on VLANs.
A variety of authentication methods, control the Internet access, and realize advertising and marketing
Support web authentication, and push merchant advertising information through the authentication page;
Support SMS authentication, meet the requirements of real-name authentication, and can carry out secondary marketing based on mobile phone number;
It supports PPPoE servers, which can realize unified dial-up Internet access for intranet users.
Efficient firewall to ensure internal and external network security
Support IP and MAC address binding, effectively preventing intranet/extranet ARP spoofing; In the event of ARP spoofing, the system can send ARP correction messages at specified frequencies to restore the normal state of the network in a timely manner.
It supports intranet/extranet attack protection and can effectively prevent various common DoS attacks, scanning attacks, and suspicious packet attacks.
It supports MAC address-based filtering to effectively block the access of unauthorized hosts.
It can assign permissions through routers for various network services to ensure internal and external network security, and supports access control rules based on user groups and time periods to achieve more refined management.
Flexible bandwidth control to ensure reasonable bandwidth utilization
It supports elastic policies that enable bandwidth control based on bandwidth utilization, and can perform bidirectional bandwidth control for each host (IP) in the network, effectively inhibiting P2P applications such as BT and Thunderbolt from over-occupying bandwidth and ensuring smooth network at all times.
It provides an IP-based connection limit function, which can limit the number of connections occupied by each computer, prevent a small number of users from excessively occupying a large number of connections, and ensure the smooth operation of games, Internet surfing, chatting, video and voice, etc.
Multi-WAN load balancing and line backup
It provides one 10/100/1000M fixed WAN port, one 10/100/1000M fixed LAN port and three 10/100/1000M WAN/LAN configurable ports.
It supports rich traffic balancing functions such as intelligent traffic steering, special application traffic steering, and ISP traffic steering, which can realize bandwidth superposition, make full use of bandwidth resources, and protect user investment.
It supports the WAN port backup function, and can automatically switch to the standby line when the main line fails, ensuring the normal operation of the network.
More useful features
Intra/extranet two-way port monitoring to meet the data monitoring needs of relevant departments;
Support DDNS and virtual server functions, easy to build intranet servers and private websites;
Support UPnP and ALG service functions to ensure that special network applications can smoothly penetrate NAT;
Brand new Chinese WEB management interface, management and maintenance are more convenient and fast;
Provide log list function to record network operation status in detail;
Multiple fault detection tools, such as Ping and Tracert, are supported to help you quickly find and troubleshoot network faults.
Quad-core CPU, 1GB DDRIII high-speed memory, powerful performance
5 Gigabit Ethernet ports, 1WAN+3WAN/LAN+1LAN
IPSec/PPTP/L2TP VPN makes long-distance communication more secure
Web authentication, SMS authentication, and PPPoE servers
Online behavior management (mobile APP control/desktop application control/website filtering/behavior audit).
THE BUILT-IN AC FUNCTION ENABLES UNIFIED MANAGEMENT OF TP-LINK ENTERPRISE APS
Load balancing and line backup
Intranet and intranet ARP protection and common attack protection
Intelligent IP bandwidth management and limit the number of connections
|
In Stock
|
Subscribe
|
|
TL-ER7520G is a new generation of high-performance all-gigabit enterprise router products launched by TP-LINK, which is mainly positioned in enterprises, government agencies, parks, chain hotels and other network environments that require high-speed Internet access, authenticated Internet access, VPN remote secure communication and Internet behavior management.
TL-ER7520G uses a quad-core 64-bit network-specific processor, with a single-core frequency of up to 1.2GHz, with 2GB DDRIII high-speed memory, with powerful network data forwarding capabilities, and supports Web authentication, IPSec/PPTP/L2TP VPN, Internet behavior management, firewall, traffic control and other rich functional features, suitable for building a secure, efficient and easy-to-manage full gigabit enterprise network.
Quad-core 64-bit network-specific processor, single-core frequency 1.2GHz
2GB DDRIII high-speed memory
5 x 10/100/1000M RJ45 ports, customizable port type
Access Authentication (Web Authentication, SMS Authentication, PPPoE Server)
Multiple VPNs (IPSec/PPTP/L2TP VPN)
Online behavior management (app restrictions/website filtering/web security)
Intranet and intranet ARP protection and common attack protection
Intelligent IP bandwidth management and limit the number of connections
New hardware architecture, high-speed data forwarding
Adopting a new hardware architecture, a professional quad-core 64-bit network-specific processor, 2GB DDRIII high-speed memory, and greatly improved data packet processing capabilities, it can realize gigabit wire-speed forwarding, effectively meeting the data forwarding requirements in high-bandwidth environments. In the actual environment, the typical number of units is about 3,000 units.
It provides 5 10/100/1000M RJ45 ports, which can be freely customized according to needs, and can be bound to a variety of logical interfaces to adapt to more complex networking environments.
The built-in AC function can be used to manage TP-LINK enterprise APs in a unified manner
The built-in AC function is both a router and a wireless controller, and up to 300 TP-LINK enterprise APs can be controlled in a unified manner, making it easy to expand the enterprise wireless network.
It can automatically discover the TP-LINK AP in the network, and perform unified configuration and management of the AP, realize zero-configuration AP access, plug and play, and support AP status monitoring and upgrade, which is easy to maintain.
A variety of authentication methods, control the Internet access, and realize advertising and marketing
Support web authentication, and push merchant advertising information through the authentication page;
Support SMS authentication, meet the requirements of real-name authentication, and can carry out secondary marketing based on mobile phone number;
It supports PPPoE servers, which can realize unified dial-up Internet access for intranet users.
Secure and reliable IPSec/PPTP/L2TP VPN
It provides standard IPSec VPN functions, supporting data integrity verification, data source authentication, anti-packet replay, and data encryption functions (DES, 3DES, AES128, AES192, AES256 and other encryption algorithms). It supports IKE and manual mode to establish VPN connections, and allows domestic users to access the network by dynamic IP, PPPoE dial-up, etc., and allows VPN connections to be configured through domain names. A maximum of 200 IPSec VPN tunnels can be established to meet the needs of remote and secure communication between the enterprise headquarters and branches, and between the enterprise and business partners/suppliers.
PPTP/L2TP server and client functions are supported, and up to 200 PPTP/L2TP VPN tunnels can be established. Users can flexibly choose to use server and client functions according to actual needs: when deployed in the enterprise headquarters, the PPTP/L2TP server function is generally used to meet the needs of employees on business trips or branches to remotely and securely access the company's network; If you want to establish a VPN connection with a remote PPTP/L2TP server, you need to use the PPTP/L2TP client function.
Comprehensive and effective online behavior management
Built-in database of common Internet applications, which can control various desktop and mobile Internet applications with one click, including social software/video software/music software/shopping and leisure software/news and information software/P2P software/financial software/online games/app stores/basic applications, etc.;
Built-in database of hundreds of URLs in more than a dozen categories, which can restrict employees' access to the corresponding website with one click;
Support prohibiting web submission, restricting employees from logging in to various web-based forums, microblogs, mailboxes, etc. to publish information, and avoid the leakage of sensitive data of enterprises;
It supports the expansion type of filtering files, which can easily filter all kinds of small files embedded in web pages to prevent viruses and Trojan horses from invading the enterprise network and endangering network security through these small files.
It supports the behavior audit function, comprehensively records online behavior, and outputs audit results in reports.
Rich security policies
Support access control policies, and set firewall rules based on network protocol type, port number, source/destination IP address, and time period to control internal and external network communication security;
It provides automatic scanning of IP and MAC addresses and one-click binding functions, which can bind the IP and MAC address information of LAN port (intranet) and WAN port (extranet) hosts at the same time, effectively preventing intranet/extranet ARP spoofing and avoiding network disconnection caused by ARP spoofing. In the event of ARP spoofing, you can send ARP correction messages at a specified frequency to restore the normal state of the network in a timely manner and effectively reduce the degree of harm.
Supports intranet/extranet attack protection and can effectively prevent various common DoS attacks, scanning attacks, and suspicious packet attacks, such as TCP syn floods, UDP floods, ICMP floods, WinNuke attacks, fragment packet attacks, WAN port pings, TCP scan (stealth FIN/Xmas/Null), and IP spoofing.
MAC address-based filtering is supported to effectively block the access of unauthorized hosts.
Flexible flow control
It supports the intelligent IP bandwidth control function, flexibly enables the bandwidth control policy according to the actual bandwidth utilization, and can carry out two-way bandwidth control for each host (IP) in the network, effectively inhibiting the excessive bandwidth occupation of P2P applications such as BT and Thunderbolt, avoiding the problem of online game cards and slow Internet speed, and ensuring that the network is smooth at all times.
It provides an IP-based connection restriction function, which can limit the number of connections occupied by each computer, make reasonable use of the limited NAT connection resources, prevent a small number of users from excessively occupying a large number of connections, and ensure the smooth operation of games, Internet access, chat, video and voice, etc.
It supports multiple load balancing strategies, such as intelligent balancing, special application traffic selection, and ISP traffic selection, to effectively improve network service quality, make full use of interface bandwidth, improve network experience, and protect user investment.
Convenient and practical management and maintenance
Adopting the full Chinese web interface operation style, all functions can be configured through the graphical interface, and each configuration provides necessary help and explanation information to facilitate the user to configure the router.
Provide log list and log server functions, detailed log records to supervise network operation, help quickly find network anomalies, locate the source of problems, and eliminate network faults in time. Provides a graphical interface to monitor key router resources such as CPU utilization in real time, and detect potential dangers and attacks in a timely manner.
Support local LAN or Internet remote management router, convenient chain operation and remote assistance; It supports a variety of fault detection tools such as ping detection and traceroute detection, and can back up and import router configuration files for daily maintenance and management.
|
In Stock
|
Subscribe
|
|
TL-ER7520T is a high-performance enterprise-class router product developed by TP-LINK for large and medium-sized enterprises, campuses, hotels, wireless coverage and other environments, using 64-bit quad-core ARM processor, large-capacity high-speed DDRIV memory, supporting IPSec/PPTP/L2TP VPN, online behavior management, AP management, web authentication, PPPoE server, IP/MAC binding, attack protection and bandwidth management. The built-in AC (wireless controller) can manage TP-LINK AP products in a unified manner, which is suitable for enterprises, campuses, hotels, and other enterprises to build secure, efficient, and easy-to-manage networks.
Quad-core CPU, 2GB DDRIV memory
8 x GE electrical ports + 2 x 10G SFP+ optical ports, and the port type can be customized
The built-in AC function allows you to manage 300 APs in a unified manner
Support IPSec/PPTP/L2TP VPN, remote communication is more secure
Web authentication, SMS authentication, and PPPoE servers are supported
The built-in firewall supports ARP protection and common attack protection on internal and external networks
Supports online behavior management (application restrictions, website filtering, web security) and online auditing
Support WEB, TUMS, business cloud platform, APP and other management
Product size: 440×227×44mm
Typical machine capacity: 3000 units
New hardware architecture, high-speed data forwarding
It adopts a new hardware architecture, a professional quad-core 64-bit ARM processor, a single-core frequency of up to 1.0GHz, and 1GB DDRIV high-speed memory, which greatly improves the packet processing capability. In the actual environment, the typical number of units is about 3,000 units.
A variety of VPNs to ensure the security of long-distance communication
It supports IPSec VPN, allowing up to 200 tunnels to be established to encrypt the confidential data of enterprises and branches to ensure data security.
It supports PPTP VPN and L2TP VPN server/client modes, allowing up to 200 tunnels (shared) to be established, which is convenient for employees on business trips and mobile workers to remotely access internal servers and easily realize remote work.
Manage online behavior and standardize employees' use of the Internet
Built-in database of common Internet applications, which can control various desktop and mobile Internet applications with one click, including social software/video software/music software/shopping and leisure software/news and information software/P2P software/financial software/online games/app stores/basic applications, etc.;
Built-in database of hundreds of URLs in more than a dozen categories, which can restrict employees' access to the corresponding website with one click;
Support prohibiting web submission, restricting employees from logging in to various web-based forums, microblogs, mailboxes, etc. to publish information, and avoid the leakage of sensitive data of enterprises;
It supports the expansion type of filtering files, which can easily filter all kinds of small files embedded in web pages to prevent viruses and Trojan horses from invading the enterprise network and endangering network security through these small files.
It supports the behavior audit function, comprehensively records online behavior, and outputs audit results in reports.
VLAN (Multi-LAN)
With IEEE 802.1Q VLAN, enterprises can divide the intranet into different network segments that are isolated from each other as needed to reduce the impact of broadcast storms and viruses.
It supports VLAN Layer 3 interfaces, which can forward IP packets across VLANs, and set functions such as DHCP server, firewall rules, and access authentication policies based on VLANs.
A variety of authentication methods, control the Internet access, and realize advertising and marketing
Support web authentication, and push merchant advertising information through the authentication page;
Support SMS authentication, meet the requirements of real-name authentication, and can carry out secondary marketing based on mobile phone number;
It supports PPPoE servers, which can realize unified dial-up Internet access for intranet users.
Wired and wireless application integration
Built-in AC function: AC wireless control, both router and wireless controller, can manage 300 TP-LINK AP products in a unified manner, and build an enterprise-level wireless network.It can automatically discover the TP-LINK AP in the network, and uniformly configure and manage the AP, so as to realize zero-configuration AP access and plug-and-play. At the same time, it supports AP status monitoring and upgrade, and is easy to maintain.Support optical fiber access: support gigabit and 10 gigabit optical interfaces, and flexibly match network access.Copper cable access is supported.
Efficient firewall to ensure internal and external network security
Support IP and MAC address binding, effectively preventing intranet/extranet ARP spoofing; In the event of ARP spoofing, the system can send ARP correction messages at specified frequencies to restore the normal state of the network in a timely manner.
It supports intranet/extranet attack protection and can effectively prevent various common DoS attacks, scanning attacks, and suspicious packet attacks.
It supports MAC address-based filtering to effectively block the access of unauthorized hosts.
It can assign permissions through routers for various network services to ensure internal and external network security, and supports access control rules based on user groups and time periods to achieve more refined management.
Flexible bandwidth control to ensure reasonable bandwidth utilization
It supports the intelligent IP bandwidth control function, flexibly enables the bandwidth control policy according to the actual bandwidth utilization, and can carry out two-way bandwidth control for each host (IP) in the network, effectively inhibiting the excessive bandwidth occupation of P2P applications such as BT and Thunderbolt, avoiding the problem of online game cards and slow Internet speed, and ensuring that the network is smooth at all times.It provides an IP-based connection restriction function, which can limit the number of connections occupied by each computer, make reasonable use of the limited NAT connection resources, prevent a small number of users from excessively occupying a large number of connections, and ensure the smooth operation of games, Internet access, chat, video and voice, etc.It supports multiple load balancing strategies, such as intelligent balancing, special application traffic selection, and ISP traffic selection, to effectively improve network service quality, make full use of interface bandwidth, improve network experience, and protect user investment.
More useful features
Intra/extranet two-way port monitoring to meet the data monitoring needs of relevant departments;
Support DDNS and virtual server functions, easy to build intranet servers and private websites;
Support UPnP and ALG service functions to ensure that special network applications can smoothly penetrate NAT;
Brand new Chinese WEB management interface, management and maintenance are more convenient and fast;
Provide log list function to record network operation status in detail;
Multiple fault detection tools, such as Ping and Tracert, are supported to help you quickly find and troubleshoot network faults.
|
In Stock
|
Subscribe
|
|
TL-ER8820T is a new generation of high-performance 10 Gigabit enterprise router products launched by TP-LINK, which is mainly positioned in enterprises, government agencies, parks, chain hotels and other network environments that require high-speed Internet access, authenticated Internet access, VPN remote secure communication and Internet behavior management.
TL-ER8820T uses an octa-core 64-bit network-specific processor, with a single-core frequency of up to 1.2GHz, with 2GB DDRIV high-speed memory, with powerful network data forwarding capabilities, and supports Web authentication, IPSec/PPTP/L2TP VPN, Internet behavior management, firewall, traffic control and other rich functional features, suitable for building a secure, efficient and easy-to-manage full gigabit enterprise network.
Octa-core 64-bit network-specific processor, single-core frequency 1.2GHz
2GB DDRIV high-speed memory
2 10 Gigabit SFP+ fiber expansion ports, 8 10/100/1000M RJ45 electrical ports, and the port type can be customized
Access Authentication (Web Authentication, SMS Authentication, PPPoE Server)
Multiple VPNs (IPSec/PPTP/L2TP VPN)
Online behavior management (app restrictions/website filtering/web security)
Intranet and intranet ARP protection and common attack protection
Intelligent IP bandwidth management and limit the number of connections
New hardware architecture, high-speed data forwarding
Using a new hardware architecture, a professional octa-core 64-bit network-specific processor, 2GB DDRIV high-speed memory, and a greatly improved packet processing capacity, it can effectively meet the data forwarding requirements in high-bandwidth environments. In the actual environment, the maximum number of units is about 4,000 units.
It provides 2 10 Gigabit SFP+ fiber module expansion ports and 8 10/100/1000M RJ45 ports, which can freely customize the port type according to needs, and can be bound to a variety of logical interfaces to adapt to more complex networking environments.
The built-in AC function can be used to manage TP-LINK enterprise APs in a unified manner
The built-in AC function is both a router and a wireless controller, and up to 500 TP-LINK enterprise APs can be managed and controlled in a unified manner, making it easy to expand the enterprise wireless network.
It can automatically discover the TP-LINK AP in the network, and perform unified configuration and management of the AP, realize zero-configuration AP access, plug and play, and support AP status monitoring and upgrade, which is easy to maintain.
A variety of authentication methods, control the Internet access, and realize advertising and marketing
Support web authentication, and push merchant advertising information through the authentication page;
Support SMS authentication, meet the requirements of real-name authentication, and can carry out secondary marketing based on mobile phone number;
It supports PPPoE servers, which can realize unified dial-up Internet access for intranet users.
Secure and reliable IPSec/PPTP/L2TP VPN
It provides standard IPSec VPN functions, supporting data integrity verification, data source authentication, anti-packet replay, and data encryption functions (DES, 3DES, AES128, AES192, AES256 and other encryption algorithms). It supports IKE and manual mode to establish VPN connections, and allows domestic users to access the network by dynamic IP, PPPoE dial-up, etc., and allows VPN connections to be configured through domain names. A maximum of 200 IPSec VPN tunnels can be established to meet the needs of remote and secure communication between the enterprise headquarters and branches, and between the enterprise and business partners/suppliers.
PPTP/L2TP server and client functions are supported, and up to 200 PPTP/L2TP VPN tunnels can be established. Users can flexibly choose to use server and client functions according to actual needs: when deployed in the enterprise headquarters, the PPTP/L2TP server function is generally used to meet the needs of employees on business trips or branches to remotely and securely access the company's network; If you want to establish a VPN connection with a remote PPTP/L2TP server, you need to use the PPTP/L2TP client function.
Comprehensive and effective online behavior management
Built-in database of common Internet applications, which can control various desktop and mobile Internet applications with one click, including social software/video software/music software/shopping and leisure software/news and information software/P2P software/financial software/online games/app stores/basic applications, etc.;
Built-in database of hundreds of URLs in more than a dozen categories, which can restrict employees' access to the corresponding website with one click;
Support prohibiting web submission, restricting employees from logging in to various web-based forums, microblogs, mailboxes, etc. to publish information, and avoid the leakage of sensitive data of enterprises;
It supports the expansion type of filtering files, which can easily filter all kinds of small files embedded in web pages to prevent viruses and Trojan horses from invading the enterprise network and endangering network security through these small files.
It supports the behavior audit function, comprehensively records online behavior, and outputs audit results in reports.
Rich security policies
Support access control policies, and set firewall rules based on network protocol type, port number, source/destination IP address, and time period to control internal and external network communication security;
It provides automatic scanning of IP and MAC addresses and one-click binding functions, which can bind the IP and MAC address information of LAN port (intranet) and WAN port (extranet) hosts at the same time, effectively preventing intranet/extranet ARP spoofing and avoiding network disconnection caused by ARP spoofing. In the event of ARP spoofing, you can send ARP correction messages at a specified frequency to restore the normal state of the network in a timely manner and effectively reduce the degree of harm.
Supports intranet/extranet attack protection and can effectively prevent various common DoS attacks, scanning attacks, and suspicious packet attacks, such as TCP syn floods, UDP floods, ICMP floods, WinNuke attacks, fragment packet attacks, WAN port pings, TCP scan (stealth FIN/Xmas/Null), and IP spoofing.
MAC address-based filtering is supported to effectively block the access of unauthorized hosts.
Flexible flow control
It supports the intelligent IP bandwidth control function, flexibly enables the bandwidth control policy according to the actual bandwidth utilization, and can carry out two-way bandwidth control for each host (IP) in the network, effectively inhibiting the excessive bandwidth occupation of P2P applications such as BT and Thunderbolt, avoiding the problem of online game cards and slow Internet speed, and ensuring that the network is smooth at all times.
It provides an IP-based connection restriction function, which can limit the number of connections occupied by each computer, make reasonable use of the limited NAT connection resources, prevent a small number of users from excessively occupying a large number of connections, and ensure the smooth operation of games, Internet access, chat, video and voice, etc.
It supports multiple load balancing strategies, such as intelligent balancing, special application traffic selection, and ISP traffic selection, to effectively improve network service quality, make full use of interface bandwidth, improve network experience, and protect user investment.
Convenient and practical management and maintenance
Adopting the full Chinese web interface operation style, all functions can be configured through the graphical interface, and each configuration provides necessary help and explanation information to facilitate the user to configure the router.
Provide log list and log server functions, detailed log records to supervise network operation, help quickly find network anomalies, locate the source of problems, and eliminate network faults in time. Provides a graphical interface to monitor key router resources such as CPU utilization in real time, and detect potential dangers and attacks in a timely manner.
Support local LAN or Internet remote management router, convenient chain operation and remote assistance; It supports a variety of fault detection tools such as ping detection and traceroute detection, and can back up and import router configuration files for daily maintenance and management.
|
In Stock
|
Subscribe
|
|
TL-FW5300-4G is an enhanced 4G firewall product launched by TP-LINK, which supports four characteristic libraries such as anti-virus, intrusion prevention, malicious domain name, and application identification, and integrates firewall policy, attack protection, DPI in-depth security, security audit, bandwidth management, VPN and other functions in one, effectively resisting network risks, achieving comprehensive protection, simplifying operation and maintenance, ensuring the continuous and stable operation of enterprise core applications and services, and is suitable for chain store operationsScenarios such as enterprise distributed office.
5 x 10/100/1000M RJ45 ports, 2 SIM card slots for redundant backup, 1 x USB 3.0
2 external detachable 4G antennas, support 4G/wired simultaneous connection, support dual-connection intelligent load balancing/redundant backup
It is suitable for chain stores and distributed office networking
You can configure security policies, audit policies, bandwidth policies, and ALG policies
It supports a variety of security protection functions to defend against ARP spoofing, ARP attacks, DDoS attacks, network scanning, and suspicious packet attacks
Expandable all-in-one DPI security (intrusion prevention, anti-virus, file filtering, malicious domain name remote query, application behavior control)
Rich support for policy objects (security zones, addresses, users, services, websites, security profiles, intrusion prevention, audit profiles, etc.)
Supports rich network functions, such as static routing, policy-based routing, intelligent balancing, VPN (IPSec/PPTP/L2TP VPN), DDNS, etc
Supports first-pack application identification to improve application recognition performance
Ports are abundant
It provides 5 10/100/1000M RJ45 service ports, 1 management port and 1 USB 3.0 storage port, and 2 SIM card slots, which is convenient for users to manage and maintain the system while meeting the high-speed and stable forwarding of data.
4G/wired dual redundancy
2 external detachable 4G antennas, 2 SIM card slots, support 4G/wired connection dual redundancy, and the networking mode is more flexible and stable
First-pack application identification
It supports TP-LINK's unique application identification of the first packet, which can identify the application in the first packet, realize application traffic selection, and improve the application recognition performance
Comprehensive security strategy
Adopting the principle of minimum security, it supports security policies based on security zones, source IP addresses, destination IP addresses, source ports, destination ports, service groups, application groups, user groups, time periods, blacklists and whitelists, websites, anti-viruses, URL filtering, file filtering, application behavior control, email content filtering, intrusion prevention, audit profiles and other objects.
All-round attack protection
It supports a variety of intranet/extranet attack protection functions, and can effectively prevent various DoS attacks, scanning attacks, and suspicious packet attacks, such as TCP Syn Flood, UDP Flood, ICMP Flood, IP Scanning, Port Scanning, WinNuke Attacks, Fragment Packet Attacks, WAN Port Ping, TCP Scan (Stealth FIN/Xmas/Null), IP Spoofing, TearDrop, etc.
ARP protection, such as ARP spoofing and ARP attacks, is supported to avoid service interruption and frequent network disconnection.
Support IP and MAC binding, which can bind the IP and MAC address information of the LAN port (intranet) and WAN port (extranet) hosts at the same time to prevent ARP spoofing.
MAC address filtering is supported to block access to unauthorized hosts.
Expandable integrated DPI for in-depth security
Support intrusion prevention, get the latest threat information in the first time, and accurately detect and defend against attacks against vulnerabilities;
Support anti-virus, can quickly and accurately detect and kill viruses and other malicious programs in network traffic, and protect more than 1 million viruses and Trojans;
It supports filtering file expansion types, which can easily filter all kinds of small files embedded in web pages to prevent viruses and Trojan horses from invading the enterprise network through small files and endangering network security.
Support URL filtering, remote query of malicious domain names, effectively intercept phishing websites, Trojan attacks, hacker intrusions and network fraud through local + cloud methods;
It supports application recognition, and the accuracy reaches the level of application behavior. The combination of application identification and intrusion detection, anti-virus, URL filtering, and filtering file expansion types greatly improves the detection performance and accuracy.
Provide a comprehensive and timely security signature database, keep up with the latest developments in the field of network security, and ensure timely and accurate updates of the feature database.
Refined identification and control of online behaviors
It has a large-scale application identification feature database, and can control more than 500 common desktop and mobile Internet applications in China with one click, including video, social networking, shopping, finance and other applications;
Accurately identify popular application behaviors such as WeChat, Weibo, and QQ, such as text communication, voice and video, file transfer, music playback, etc., and finely control these behaviors, and intercept or restrict them in a purposeful and targeted manner;
Built-in database of more than 10 types of domestic URLs, which can restrict employees' access to the corresponding websites with one click;
Support prohibiting web submission, restricting employees from logging in to various web-based forums, microblogs, mailboxes, etc. to publish information, filtering email content, and effectively avoiding the leakage of sensitive enterprise data;
*The database of applications and URLs will be updated and added continuously.
Complete security audit strategy
Detailed and comprehensive logging: System logs, operation logs, policy hit logs, traffic logs, audit logs, threat logs, content logs, URL logs, and email filtering logs are supported to record firewall-related traffic and operation history in detail, helping administrators understand network status and quickly locate network problems.
Graphical traffic statistics: Traffic statistics can be performed in three dimensions: interface, IP, and security policy, and the traffic data of security policies can be displayed graphically in real time, which is clear at a glance. The traffic analysis report can be output in the form of PDF report to help the administrator analyze the historical traffic distribution.
Internet behavior audit: Support HTTP behavior audit, FTP behavior audit, email audit, IM audit, through audit logs, you can understand the Internet behavior of employees during work, including web access, APP application, etc., so that bad Internet behavior can be traced;
TP-LINK security audit system: It can be used with the TP-LINK security audit system to store logs for a long time and in large capacity, and output more detailed analysis reports.
Simple O&M and security management
Full Chinese web interface, detailed and clear configuration guidance;
Graphical interface display, real-time monitoring of key resources such as CPU utilization, clear and intuitive;
Support local/remote management, convenient chain operation, remote assistance;
Support password authentication/identity recognition to ensure authorization security;
Support multi-administrator roles and refined permission management;
Support license management and feature database upgrade;
Support active/standby switchover and on-line detection to ensure high-reliability operation of the equipment;
A separate console management port is provided to debug the device through the command line with the assistance of technical support personnel.
Flexible bandwidth management policies
Provides flexible bandwidth management policies to control the bandwidth used by each IP address in the network to ensure the network experience of key services and users. The management and control methods include bidirectional bandwidth control, connection limit, and connection monitoring.
Abundant routing features
Static routing, policy-based routing, intelligent balancing, VPN (IPSec/PPTP/L2TP VPN), dynamic DNS (Peanutshell, Kemai, 3322) and other functions are supported.
Enterprise-grade quality with selected devices
Built-in industrial-grade high-quality power supply, adaptable to 100V-240V wide voltage input range, effectively resisting voltage fluctuations;
The steel shell design provides better heat dissipation performance and shielding performance, and has stronger anti-interference ability to ensure that the equipment works stably in various environments.
Supports multiple deployment modes
Layer 3 routing gateway mode
As a Layer 3 routing gateway, the TL-FW5300-4G replaces the original router in the network, and the data communication between the internal network and the external network is NAT converted through the firewall.
Layer 2 transparent bridge mode
The TL-FW5300-4G supports setting up some or all interfaces as bridges, which work in a Layer 2 network, and the network can be protected by firewalls as long as data passes through the bridge interfaces. In this mode, firewall deployment does not need to change the original topology, which is more convenient and faster.
Route + Bridge mode
During actual network deployment, some interfaces of the firewall can be set as bridge interfaces and part of the firewall interfaces as routing interfaces according to on-site requirements, so that the two methods can be flexibly combined to achieve more cost-effective network protection.
|
In Stock
|
Subscribe
|
|
TL-NR600-4C-2T4G is a high-performance enterprise-class router product developed by TP-LINK for large and medium-sized enterprises, campuses, hotels, wireless coverage and other environments, using 64-bit quad-core ARM processor, large-capacity high-speed DDRIV memory, supporting IPSec/PPTP/L2TP VPN, online behavior management, AP management, Web authentication, PPPoE server, IP/MAC binding, attack protection and bandwidth management. The built-in AC (wireless controller) can manage TP-LINK AP products in a unified manner, which is suitable for enterprises, campuses, hotels, and other enterprises to build secure, efficient, and easy-to-manage networks.
Quad-core CPU, 512MB DDRIV high-speed memory, powerful performance
2 x 10 Gigabit SFP+ fiber expansion ports, 4 x 10/100/1000M RJ45 electrical ports, and the port type can be customized
IPSec/PPTP/L2TP VPN makes long-distance communication more secure
Web authentication, SMS authentication, and PPPoE servers
Online behavior management (app restrictions/website filtering/web security)
Load balancing and line backup
Intranet and intranet ARP protection and common attack protection
Intelligent IP bandwidth management and limit the number of connections
New hardware architecture, high-speed data forwarding
It adopts a new hardware architecture, a professional quad-core 64-bit ARM processor, a single-core frequency of up to 1.4GHz, and a 512MB DDRIV high-speed memory, which greatly improves the data processing capability. In the actual environment, the typical number of machines is about 2000 units.
A variety of VPNs to ensure the security of long-distance communication
It supports IPSec VPN, allowing up to 200 tunnels to be established to encrypt the confidential data of enterprises and branches to ensure data security.
It supports PPTP VPN and L2TP VPN server/client modes, allowing up to 100 tunnels (shared) to be established, which is convenient for employees on business trips and mobile workers to remotely access internal servers and easily realize remote work.
Manage online behavior and standardize employees' use of the Internet
Built-in database of common Internet applications, which can control various desktop and mobile Internet applications with one click, including social software/video software/music software/shopping and leisure software/news and information software/P2P software/financial software/online games/app stores/basic applications, etc.;
Built-in database of hundreds of URLs in more than a dozen categories, which can restrict employees' access to the corresponding website with one click;
Support prohibiting web submission, restricting employees from logging in to various web-based forums, microblogs, mailboxes, etc. to publish information, and avoid the leakage of sensitive data of enterprises;
It supports the expansion type of filtering files, which can easily filter all kinds of small files embedded in web pages to prevent viruses and Trojan horses from invading the enterprise network and endangering network security through these small files.
It supports the behavior audit function, comprehensively records online behavior, and outputs audit results in reports.
VLAN (Multi-LAN)
With IEEE 802.1Q VLAN, enterprises can divide the intranet into different network segments that are isolated from each other as needed to reduce the impact of broadcast storms and viruses.
It supports VLAN Layer 3 interfaces, which can forward IP packets across VLANs, and set functions such as DHCP server, firewall rules, and access authentication policies based on VLANs.
A variety of authentication methods, control the Internet access, and realize advertising and marketing
Support web authentication, and push merchant advertising information through the authentication page;
Support SMS authentication, meet the requirements of real-name authentication, and can carry out secondary marketing based on mobile phone number;
It supports PPPoE servers, which can realize unified dial-up Internet access for intranet users.
Wired and wireless application integration
Built-in AC function: AC wireless control, both router and wireless controller, can manage 300 TP-LINK AP products in a unified manner, and build an enterprise-level wireless network.It can automatically discover the TP-LINK AP in the network, and uniformly configure and manage the AP, so as to realize zero-configuration AP access and plug-and-play. At the same time, it supports AP status monitoring and upgrade, and is easy to maintain.Support optical fiber access: support gigabit and 10 gigabit optical interfaces, and flexibly match network access.Copper cable access is supported.
Efficient firewall to ensure internal and external network security
Support IP and MAC address binding, effectively preventing intranet/extranet ARP spoofing; In the event of ARP spoofing, the system can send ARP correction messages at specified frequencies to restore the normal state of the network in a timely manner.
It supports intranet/extranet attack protection and can effectively prevent various common DoS attacks, scanning attacks, and suspicious packet attacks.
It supports MAC address-based filtering to effectively block the access of unauthorized hosts.
It can assign permissions through routers for various network services to ensure internal and external network security, and supports access control rules based on user groups and time periods to achieve more refined management.
Flexible bandwidth control to ensure reasonable bandwidth utilization
It supports the intelligent IP bandwidth control function, flexibly enables the bandwidth control policy according to the actual bandwidth utilization, and can carry out two-way bandwidth control for each host (IP) in the network, effectively inhibiting the excessive bandwidth occupation of P2P applications such as BT and Thunderbolt, avoiding the problem of online game cards and slow Internet speed, and ensuring that the network is smooth at all times.It provides an IP-based connection restriction function, which can limit the number of connections occupied by each computer, make reasonable use of the limited NAT connection resources, prevent a small number of users from excessively occupying a large number of connections, and ensure the smooth operation of games, Internet access, chat, video and voice, etc.It supports multiple load balancing strategies, such as intelligent balancing, special application traffic selection, and ISP traffic selection, to effectively improve network service quality, make full use of interface bandwidth, improve network experience, and protect user investment.
More useful features
Intra/extranet two-way port monitoring to meet the data monitoring needs of relevant departments;
Support DDNS and virtual server functions, easy to build intranet servers and private websites;
Support UPnP and ALG service functions to ensure that special network applications can smoothly penetrate NAT;
Brand new Chinese WEB management interface, management and maintenance are more convenient and fast;
Provide log list function to record network operation status in detail;
Multiple fault detection tools, such as Ping and Tracert, are supported to help you quickly find and troubleshoot network faults.
|
In Stock
|
Subscribe
|
|
TL-R470-4G is a new remote networking 4G router launched by TP-LINK. The built-in "Cloud Exhibition" remote networking service can be launched with zero deployment, quickly build a virtual LAN, and simplify the complexity of remote networking.
1 x 10/100M WAN port, 3 x 10/100M LAN port, 1 SIM port
It supports side-attached remote networking, and cooperates with the "Cloud Exhibition" service of the commercial cloud to build a virtual LAN
Support 4G/broadband simultaneous connection, redundant backup of each other
AP management, IPSec VPN, L2TP VPN, PPTP VPN are supported
Support online behavior management (application restrictions, URL filtering, web security, behavior auditing, access control)
ARP protection, attack protection, MAC address filtering, bandwidth limit, and connection limit are supported
Support TP-LINK business cloud APP remote viewing/management
Support remote networkingSupport "Cloud Exhibition" remote networking service, based on SD-WAN technology to achieve automatic VPN network connection, to achieve cross-regional interconnection.Support side-hung mode, no need to change the original network architectureUsers do not need to change the original network topology, do not need to find professionals for multiple debugging and configuration, by hanging routers next to the branch intranet, you can form two different LANs into the same LAN for data transmission and access. Implement interconnection of resources on the cloud. Optimize network deployment costs and reduce the threshold for remote networking.Support SIM card and ordinary broadband connection Internet Support4G/broadband dual connection, redundant backup for each other, when 4G or broadband single failure, due to redundant backup, you can always keep the network smooth and avoid network paralysis.Support cloud management routerYou can log in to the commercial cloud platform or TP-LINK business cloud APP anytime and anywhere to manage routing devices in the remote cloud.Widely applicable tomultiple scenarios Remote networking4G routers can break through traditional geographical, broadband, and environmental restrictions, and are suitable for scenarios that require remote networking, such as chain stores, small and medium-sized branch enterprises, outdoor vending machines, and outdoor express cabinets.
|
In Stock
|
Subscribe
|
|
TL-R470-B is a new remote networking side-attached router launched by TP-LINK. The built-in "Cloud Exhibition" remote networking service can be launched with zero deployment, quickly build a virtual LAN, and simplify the complexity of remote networking.
Provide 1 x 10/100M WAN port, 3 x 10/100M LAN port, and 1 x USB 2.0 port
The size is 100mm*98mm*25mm, which can be easily carried around
It supports side-attached remote networking, and cooperates with the "Cloud Exhibition" service of the commercial cloud to build a virtual LAN
Support external USB flash drives, mobile hard disks, and build private file sharing servers
Side-attached remote networking is supported
It supports the "Cloud Exhibition" remote networking service, and automatically connects the VPN network based on SD-WAN technology to achieve cross-regional interconnection.
At the same time, it supports side-linked access, which does not need to change the original network architecture and quickly realizes remote networking.
Connect an external storage device to build a private file sharing server
It provides a USB 2.0 interface, supports external storage devices such as USB flash drives, mobile hard disks, etc., and quickly builds a private file sharing server to meet the needs of mobile office remote file sharing.
Mini body, mobile office tool
Fully considering the remote networking needs of individual users, the miniaturized body design, one-hand control, and the remote office tool to carry around.
|
In Stock
|
Subscribe
|
|
TL-R470E-4G-SD IS A NEW REMOTE NETWORKING 4G ROUTER LAUNCHED BY TP-LINK. The built-in "Cloud Exhibition" remote networking service can be launched with zero deployment, quickly build a virtual LAN, and simplify the complexity of remote networking.
1 Gigabit WAN port, 2 Gigabit WAN/LAN variable ports, and 1 Gigabit LAN port
It supports side-attached remote networking, and cooperates with the "Cloud Exhibition" service of the commercial cloud to build a virtual LAN
Support 4G/broadband simultaneous connection, redundant backup of each other
AP management, IPSec VPN, L2TP VPN, PPTP VPN are supported
Support online behavior management (application restrictions, URL filtering, web security, behavior auditing, access control)
ARP protection, attack protection, MAC address filtering, bandwidth limit, and connection limit are supported
Support TP-LINK business cloud APP remote viewing/management
Support remote networkingSupport "Cloud Exhibition" remote networking service, based on SD-WAN technology to achieve automatic VPN network connection, to achieve cross-regional interconnection.Users do not need to change the original network topology,do not need to find professionals for multiple debugging and configuration, and can form two different LANs into the same LAN by hanging a router next to the branch intranet for data transmission and access, and realize the interconnection of cloud resources. Optimize network deployment costs and reduce the threshold for remote networking.Support SIM card and ordinary broadband connection Internet Support4G/broadband dual connection, redundant backup for each other, when 4G or broadband single failure, due to redundant backup, you can always keep the network smooth and avoid network paralysis.Support cloud management routerYou can log in to the commercial cloud platform or TP-LINK business cloud APP anytime and anywhere to manage routing devices in the remote cloud.Widely applicable tomultiple scenarios Remote networking4G routers can break through traditional geographical, broadband, and environmental restrictions, and are suitable for scenarios that require remote networking, such as chain stores, small and medium-sized branch enterprises, outdoor vending machines, and outdoor express cabinets.
|
In Stock
|
Subscribe
|
|
TL-R470E-SD is a new remote networking router launched by TP-LINK. The built-in "Cloud Exhibition" remote networking service can be launched with zero deployment, quickly build a virtual LAN, and simplify the complexity of remote networking.
5 Gigabit Ethernet ports, 1WAN+3WAN/LAN+1LAN
It supports side-attached remote networking, and cooperates with the "Cloud Exhibition" service of the commercial cloud to build a virtual LAN
AP management, IPSec VPN, L2TP VPN, PPTP VPN are supported
Support online behavior management (application restrictions, URL filtering, web security, behavior auditing, access control)
ARP protection, attack protection, MAC address filtering, bandwidth limit, and connection limit are supported
Support TP-LINK business cloud APP remote viewing/management
Support remote networkingSupport "Cloud Exhibition" remote networking service, based on SD-WAN technology to achieve automatic VPN network connection, to achieve cross-regional interconnectionUsers do not need to change the original network topology, do not need to find professionals for multiple debugging and configuration, and can form two different LANs into the same LAN by hanging a router next to the branch intranet for data transmission and access, and realize the interconnection of cloud resources. Optimize network deployment costs and reduce the threshold for remote networking.Support cloud management routerYou can log in to the commercial cloud platform or TP-LINK business cloud APP anytime and anywhere to manage routing devices in the remote cloud.Widely applicable in multiple scenariosRemote networking routers can break through the traditional regional, broadband, and environmental restrictions, and are suitable for scenarios that require remote networking, such as chain stores and small and medium-sized branch enterprises.
|
In Stock
|
Subscribe
|
|
The built-in AC function can be used to manage TP-LINK enterprise APs in a unified manner
The built-in AC function is both a router and a wireless controller, and up to 10 TP-LINK enterprise APs can be controlled in a unified manner, making it easy to expand the enterprise wireless network.
It can automatically discover the TP-LINK AP in the network, configure and manage the AP in a unified manner, realize zero-configuration AP access, plug and play, and support AP status monitoring, AP upgrade, and scheduled restart, which is easy to maintain.
A variety of VPNs for secure communication over long distances
Support IPSec VPN to encrypt confidential data of enterprises and branches to ensure data security;
It supports PPTP VPN and L2TP VPN server/client modes, which is convenient for employees on business trips and mobile office workers to remotely access the internal server of the enterprise, and easily realize remote work.
Manage online behavior and standardize employees' use of the Internet
Built-in database of common Internet applications, which can control various desktop and mobile Internet applications with one click, including social software/video software/music software/shopping and leisure software/news and information software/P2P software/financial software/online games/app stores/basic applications, etc.;
Built-in database of hundreds of URLs in more than a dozen categories, which can restrict employees' access to the corresponding website with one click;
It supports the expansion type of filtering files, which can easily filter all kinds of small files embedded in web pages to prevent viruses and Trojan horses from invading the enterprise network and endangering network security through these small files.
It supports the behavior audit function, comprehensively records online behavior, and outputs audit results in reports.
Web authentication
No client software is required to achieve authentication and network access, reducing the workload of network maintenance.
Local authentication, Radius authentication, and one-click Internet access are supported to meet various authentication requirements.
You can customize the authentication jump page to achieve advertising push.
PPPoE server, intranet access authentication is easy and reliable
Intranet users can be assigned Internet access accounts, and only users with legitimate accounts and authenticated Internet access can be allowed.
It supports rich functions such as idle disconnection, expiration disconnection, manual disconnection, address binding, and exception IP address.
It meets the needs of intranet users for access authentication in bandwidth-sharing network environments such as rental houses, residential quarters, hotels, and primary and secondary school campuses.
Efficient firewall to ensure internal and external network security
Support IP and MAC address binding, effectively preventing intranet/extranet ARP spoofing; In the event of ARP spoofing, you can send ARP correction messages based on the specified frequency to restore the normal network status in a timely manner.
It supports intranet/extranet attack protection and can effectively prevent various common DoS attacks, scanning attacks, and suspicious packet attacks.
MAC address-based filtering is supported to effectively block the access of unauthorized hosts.
It can assign permissions through routers for various network services to ensure internal and external network security, and supports access control rules based on user groups and time periods to achieve more refined management.
Flexible bandwidth control to ensure reasonable bandwidth utilization
It supports elastic policies that enable bandwidth control based on bandwidth utilization, and can perform bidirectional bandwidth control for each host (IP) in the network, effectively preventing P2P applications such as BT and Thunderbolt from over-occupying bandwidth and ensuring smooth network at all times.
It provides an IP-based connection limit function, which can limit the number of connections occupied by each computer, prevent a small number of users from excessively occupying a large number of connections, and ensure the smooth operation of games, Internet surfing, chatting, video and voice, etc.
More useful features
Dynamic IP, static IP, and PPPoE access modes are supported.
Support DDNS and virtual server functions, easy to build intranet servers and private websites;
Support UPnP and ALG service functions to ensure that special network applications can smoothly penetrate NAT;
Brand new Chinese WEB management interface, management and maintenance are more convenient and fast;
Support automatic cleaning function, which can automatically clean up the device cache when the network is idle to improve the stability of the device;
Provide log list function to record network operation status in detail;
Multiple fault detection tools, such as Ping and Tracert, are supported to help you quickly find and troubleshoot network faults.
5 100 Gigabit Ethernet ports, 1WAN+4LAN
The built-in AC function can be used to manage TP-LINK enterprise APs in a unified manner
IPSec/PPTP/L2TP VPN makes long-distance communication more secure
Web authentication, PPPoE server
Online behavior management (mobile app control/desktop application control/website filtering/behavior audit)
Intranet and intranet ARP protection and common attack protection
Intelligent IP bandwidth management and limit the number of connections
|
In Stock
|
Subscribe
|
Unsubscribe
Subscribe