Warning: Undefined array key "lang_code" in /www/wwwroot/yinliu/index.php on line 84
Enterprise routers Price List
Enterprise routers TL-ER6520G

TL-ER6520G

Subscribe to get prices

Model: TL-ER6520G

Order No:

SKU: 1718417965617244999

Size: 440.00 mm,227.00 mm,44.00 mm

Weight: 0.00kg

In Stock

Brief Introduction

TL-ER6520G

The hardware has been upgraded for more powerful performance The newly upgraded hardware architecture uses a professional quad-core 64-bit network-specific processor, with a single-core frequency of up to 1.2GHz, and 1GB DDRIII high-speed memory, which greatly improves the data packet processing capability. In the actual environment, the typical number of machines is about 2000 units. The built-in AC function can be used to manage TP-LINK enterprise APs in a unified manner The built-in AC function is both a router and a wireless controller, and can control up to 250 TP-LINK enterprise APs in a unified manner, making it easy to expand the enterprise wireless network. It can automatically discover the TP-LINK AP in the network, and perform unified configuration and management of the AP, realize zero-configuration AP access, plug and play, and support AP status monitoring and upgrade, which is easy to maintain. A variety of VPNs to ensure the security of long-distance communication It supports IPSec VPN, allowing up to 200 tunnels to be established to encrypt the confidential data of enterprises and branches to ensure data security. It supports PPTP VPN and L2TP VPN server/client modes, allowing up to 200 tunnels (shared) to be established, which is convenient for employees on business trips and mobile workers to remotely access internal servers and easily realize remote work. Manage online behavior and standardize employees' use of the Internet Built-in database of common Internet applications, which can control various desktop and mobile Internet applications with one click, including social software/video software/music software/shopping and leisure software/news and information software/P2P software/financial software/online games/app stores/basic applications, etc.; Built-in database of hundreds of URLs in more than a dozen categories, which can restrict employees' access to the corresponding website with one click; Support prohibiting web submission, restricting employees from logging in to various web-based forums, microblogs, mailboxes, etc. to publish information, and avoid the leakage of sensitive data of enterprises; It supports the expansion type of filtering files, which can easily filter all kinds of small files embedded in web pages to prevent viruses and Trojan horses from invading the enterprise network and endangering network security through these small files. It supports the behavior audit function, comprehensively records online behavior, and outputs audit results in reports. VLAN (Multi-LAN) With IEEE 802.1Q VLAN, enterprises can divide the intranet into different network segments that are isolated from each other as needed to reduce the impact of broadcast storms and viruses. It supports VLAN Layer 3 interfaces, which can forward IP packets across VLANs, and set functions such as DHCP server, firewall rules, and access authentication policies based on VLANs. A variety of authentication methods, control the Internet access, and realize advertising and marketing Support web authentication, and push merchant advertising information through the authentication page; Support SMS authentication, meet the requirements of real-name authentication, and can carry out secondary marketing based on mobile phone number; It supports PPPoE servers, which can realize unified dial-up Internet access for intranet users. Efficient firewall to ensure internal and external network security Support IP and MAC address binding, effectively preventing intranet/extranet ARP spoofing; In the event of ARP spoofing, the system can send ARP correction messages at specified frequencies to restore the normal state of the network in a timely manner. It supports intranet/extranet attack protection and can effectively prevent various common DoS attacks, scanning attacks, and suspicious packet attacks. It supports MAC address-based filtering to effectively block the access of unauthorized hosts. It can assign permissions through routers for various network services to ensure internal and external network security, and supports access control rules based on user groups and time periods to achieve more refined management. Flexible bandwidth control to ensure reasonable bandwidth utilization It supports elastic policies that enable bandwidth control based on bandwidth utilization, and can perform bidirectional bandwidth control for each host (IP) in the network, effectively inhibiting P2P applications such as BT and Thunderbolt from over-occupying bandwidth and ensuring smooth network at all times. It provides an IP-based connection limit function, which can limit the number of connections occupied by each computer, prevent a small number of users from excessively occupying a large number of connections, and ensure the smooth operation of games, Internet surfing, chatting, video and voice, etc. Multi-WAN load balancing and line backup It provides one 10/100/1000M fixed WAN port, one 10/100/1000M fixed LAN port and three 10/100/1000M WAN/LAN configurable ports. It supports rich traffic balancing functions such as intelligent traffic steering, special application traffic steering, and ISP traffic steering, which can realize bandwidth superposition, make full use of bandwidth resources, and protect user investment. It supports the WAN port backup function, and can automatically switch to the standby line when the main line fails, ensuring the normal operation of the network. More useful features Intra/extranet two-way port monitoring to meet the data monitoring needs of relevant departments; Support DDNS and virtual server functions, easy to build intranet servers and private websites; Support UPnP and ALG service functions to ensure that special network applications can smoothly penetrate NAT; Brand new Chinese WEB management interface, management and maintenance are more convenient and fast; Provide log list function to record network operation status in detail; Multiple fault detection tools, such as Ping and Tracert, are supported to help you quickly find and troubleshoot network faults. Quad-core CPU, 1GB DDRIII high-speed memory, powerful performance 5 Gigabit Ethernet ports, 1WAN+3WAN/LAN+1LAN IPSec/PPTP/L2TP VPN makes long-distance communication more secure Web authentication, SMS authentication, and PPPoE servers Online behavior management (mobile APP control/desktop application control/website filtering/behavior audit). THE BUILT-IN AC FUNCTION ENABLES UNIFIED MANAGEMENT OF TP-LINK ENTERPRISE APS Load balancing and line backup Intranet and intranet ARP protection and common attack protection Intelligent IP bandwidth management and limit the number of connections

Description

The hardware has been upgraded for more powerful performance

The newly upgraded hardware architecture uses a professional quad-core 64-bit network-specific processor, with a single-core frequency of up to 1.2GHz, and 1GB DDRIII high-speed memory, which greatly improves the data packet processing capability. In the actual environment, the typical number of machines is about 2000 units.

The built-in AC function can be used to manage TP-LINK enterprise APs in a unified manner

The built-in AC function is both a router and a wireless controller, and can control up to 250 TP-LINK enterprise APs in a unified manner, making it easy to expand the enterprise wireless network.

It can automatically discover the TP-LINK AP in the network, and perform unified configuration and management of the AP, realize zero-configuration AP access, plug and play, and support AP status monitoring and upgrade, which is easy to maintain.

A variety of VPNs to ensure the security of long-distance communication

It supports IPSec VPN, allowing up to 200 tunnels to be established to encrypt the confidential data of enterprises and branches to ensure data security.

It supports PPTP VPN and L2TP VPN server/client modes, allowing up to 200 tunnels (shared) to be established, which is convenient for employees on business trips and mobile workers to remotely access internal servers and easily realize remote work.

Manage online behavior and standardize employees' use of the Internet

Built-in database of common Internet applications, which can control various desktop and mobile Internet applications with one click, including social software/video software/music software/shopping and leisure software/news and information software/P2P software/financial software/online games/app stores/basic applications, etc.;

Built-in database of hundreds of URLs in more than a dozen categories, which can restrict employees' access to the corresponding website with one click;

Support prohibiting web submission, restricting employees from logging in to various web-based forums, microblogs, mailboxes, etc. to publish information, and avoid the leakage of sensitive data of enterprises;

It supports the expansion type of filtering files, which can easily filter all kinds of small files embedded in web pages to prevent viruses and Trojan horses from invading the enterprise network and endangering network security through these small files.

It supports the behavior audit function, comprehensively records online behavior, and outputs audit results in reports.

VLAN (Multi-LAN)

With IEEE 802.1Q VLAN, enterprises can divide the intranet into different network segments that are isolated from each other as needed to reduce the impact of broadcast storms and viruses.

It supports VLAN Layer 3 interfaces, which can forward IP packets across VLANs, and set functions such as DHCP server, firewall rules, and access authentication policies based on VLANs.

A variety of authentication methods, control the Internet access, and realize advertising and marketing

Support web authentication, and push merchant advertising information through the authentication page;

Support SMS authentication, meet the requirements of real-name authentication, and can carry out secondary marketing based on mobile phone number;

It supports PPPoE servers, which can realize unified dial-up Internet access for intranet users.

Efficient firewall to ensure internal and external network security

Support IP and MAC address binding, effectively preventing intranet/extranet ARP spoofing; In the event of ARP spoofing, the system can send ARP correction messages at specified frequencies to restore the normal state of the network in a timely manner.

It supports intranet/extranet attack protection and can effectively prevent various common DoS attacks, scanning attacks, and suspicious packet attacks.

It supports MAC address-based filtering to effectively block the access of unauthorized hosts.

It can assign permissions through routers for various network services to ensure internal and external network security, and supports access control rules based on user groups and time periods to achieve more refined management.

Flexible bandwidth control to ensure reasonable bandwidth utilization

It supports elastic policies that enable bandwidth control based on bandwidth utilization, and can perform bidirectional bandwidth control for each host (IP) in the network, effectively inhibiting P2P applications such as BT and Thunderbolt from over-occupying bandwidth and ensuring smooth network at all times.

It provides an IP-based connection limit function, which can limit the number of connections occupied by each computer, prevent a small number of users from excessively occupying a large number of connections, and ensure the smooth operation of games, Internet surfing, chatting, video and voice, etc.

Multi-WAN load balancing and line backup

It provides one 10/100/1000M fixed WAN port, one 10/100/1000M fixed LAN port and three 10/100/1000M WAN/LAN configurable ports.

It supports rich traffic balancing functions such as intelligent traffic steering, special application traffic steering, and ISP traffic steering, which can realize bandwidth superposition, make full use of bandwidth resources, and protect user investment.

It supports the WAN port backup function, and can automatically switch to the standby line when the main line fails, ensuring the normal operation of the network.

More useful features

Intra/extranet two-way port monitoring to meet the data monitoring needs of relevant departments;

Support DDNS and virtual server functions, easy to build intranet servers and private websites;

Support UPnP and ALG service functions to ensure that special network applications can smoothly penetrate NAT;

Brand new Chinese WEB management interface, management and maintenance are more convenient and fast;

Provide log list function to record network operation status in detail;

Multiple fault detection tools, such as Ping and Tracert, are supported to help you quickly find and troubleshoot network faults.

  • Quad-core CPU, 1GB DDRIII high-speed memory, powerful performance
  • 5 Gigabit Ethernet ports, 1WAN+3WAN/LAN+1LAN
  • IPSec/PPTP/L2TP VPN makes long-distance communication more secure
  • Web authentication, SMS authentication, and PPPoE servers
  • Online behavior management (mobile APP control/desktop application control/website filtering/behavior audit).
  • THE BUILT-IN AC FUNCTION ENABLES UNIFIED MANAGEMENT OF TP-LINK ENTERPRISE APS
  • Load balancing and line backup
  • Intranet and intranet ARP protection and common attack protection
  • Intelligent IP bandwidth management and limit the number of connections
Unsubscribe

Discount Code

Subscribe
: 0.024648904800415