





TP-LINK TL-ER7520G high-performance all-gigabit Router 5 ports with machine capacity 3000 manage 300 APs
Quad-core 64-bit network dedicated processor, single-core main frequency 1.2GHz 2GB DDRIII high-speed memory 5 10/100/1000M RJ45 ports, customizable port types Access authentication (Web authentication, SMS authentication, PPPoE server) Multiple VPNs (IPSec / PPTP / L2TP VPN) Online behavior management (application restriction / website filtering / web security) Internal and external network ARP protection and common attack protection Intelligent IP bandwidth management and connection limit TL-ER7520G is a new generation of high-performance all-gigabit enterprise router products launched by TP-LINK. It is mainly targeted at enterprises, institutions, parks, chain hotels, etc. that require high-speed Internet access, authenticated Internet access, VPN remote secure communications and
Product Features
TL-ER7520G is a new generation of high-performance all-gigabit enterprise router products launched by TP-LINK. It is mainly targeted at enterprises, institutions, parks, chain hotels, etc. that require high-speed Internet access, authenticated Internet access, VPN remote secure communications and Internet behavior Managed network environment. TL-ER7520G uses a quad-core 64-bit network dedicated processor, single-core frequency up to 1.2GHz, with 2GB DDRIII high-speed memory, with powerful network data forwarding capabilities, and supports Web authentication, IPSec/PPTP/L2TP VPN, and Internet behavior Rich features such as management, firewall, and flow control are suitable for building a secure, efficient and easy-to-manage full Gigabit enterprise network. New hardware architecture, high-speed data forwardingUsing a brand-new hardware architecture, a professional quad-core 64-bit network dedicated processor, 2GB DDRIII high-speed memory, the data packet processing capability has been greatly improved, it can realize Gigabit line-speed forwarding, and effectively meet the data forwarding needs in high-bandwidth environments. In the actual environment, the typical belt machine volume is about 3000 units. Provide 5 10/100/1000M RJ45 ports, you can freely customize the port type according to your needs, and can bind a variety of logical interfaces to adapt to more complicated networking environments. Built-in AC function, unified management of TP-LINK enterprise APThe built-in AC function is both a router and a wireless controller, which can uniformly control up to 300 TP-LINK enterprise APs, and easily expand the enterprise wireless network; It can automatically discover TP-LINK APs in the network, configure and manage APs uniformly, realize AP zero-configuration access, plug-and-play, and support AP status monitoring and upgrades, which is easy to maintain. A variety of authentication methods to control online access and realize advertising and marketingSupport Web authentication, you can push merchant advertising information through the authentication page; Support SMS authentication, meet real-name authentication requirements, and conduct secondary marketing based on mobile phone number; Support PPPoE server, which can realize unified dial-up Internet access for intranet users. Safe and reliable IPSec/PPTP/L2TP VPNProvide standard IPSec VPN functions, support data integrity verification, data source authentication, anti-data packet replay and data encryption functions (DES, 3DES, AES128, AES192, AES256 and other encryption algorithms); support IKE and manual mode to establish VPN connections , And in view of the characteristics of domestic users that use dynamic IP, PPPoE dial-up and other methods to access the network, it allows to configure VPN connections through domain names; allows up to 200 IPSec VPN tunnels to be established, which can meet the needs of corporate headquarters and branches, corporate and corporate The need to establish remote secure communication between business partners/suppliers. Support PPTP/L2TP server and client functions, allowing up to 200 PPTP/L2TP VPN tunnels to be established. Users can flexibly choose to use server and client functions according to actual needs: When deployed in the corporate headquarters, PPTP/L2TP server functions are generally used to meet the needs of traveling employees or branches to remotely securely access the company network; When a PPTP/L2TP server establishes a VPN connection, it needs to use the PPTP/L2TP client function. Comprehensive and effective online behavior managementBuilt-in database of common Internet applications, one-key control of various desktop and mobile Internet applications, including social software / video software / music software / shopping and leisure software / news information software / P2P software / financial software / online games / application store / Basic applications and other categories; Built-in database of hundreds of URLs in dozens of categories, which can limit employees' access to corresponding websites with one click; Support prohibiting webpage submission, restrict employees from logging in to various web-based forums, Weibo, emails, etc. to post information, to avoid leakage of sensitive corporate data; Supports file expansion types, which can easily filter various small files embedded in web pages to prevent viruses, Trojans, etc. from intruding into the corporate network through these small files and jeopardizing network security; Support behavior auditing function, comprehensively record online behaviors, and output audit results in report form. Rich security strategySupport access control strategy, set firewall rules based on network protocol type, port number, source/destination IP address, time period, and control the security of internal and external network communication; It provides automatic scanning of IP and MAC addresses and one-key binding function, which can bind the IP and MAC address information of LAN port (internal network) and WAN port (external network) at the same time, which can effectively prevent internal/external network ARP spoofing and avoid causes Network disconnection caused by ARP spoofing; when suffering from ARP spoofing, it can actively send ARP correction information according to the designated frequency to restore the normal state of the network in time, and effectively reduce the degree of harm. Support internal/external network attack protection function, which can effectively prevent various common DoS attacks, scanning attacks, suspicious packet attacks, such as: TCP Syn Flood, UDP Flood, ICMP Flood, WinNuke attack, fragmented packet attack, WAN Port ping, TCP Scan (Stealth FIN/Xmas/Null), IP spoofing, etc. Support the filtering function based on MAC address, effectively block the access of illegal hosts. Flexible flow controlSupports intelligent IP bandwidth control function, and flexibly enables bandwidth control strategies based on actual bandwidth utilization. Two-way bandwidth control can be performed for each host (IP) in the network, effectively suppressing excessive bandwidth usage by P2P applications such as BT and Thunder, and avoiding network The problem of game card and slow Internet speed ensures that the network is always smooth. Provides IP-based connection limit function, which can limit the number of connections occupied by each computer, make rational use of limited NAT connection resources, prevent a few users from occupying a large number of connections, and ensure the smoothness of games, Internet, chat, video and voice, etc. get on. It supports multiple load balancing strategies such as intelligent balancing, routing for special applications, routing for ISPs, and so on. The multi-pronged approach can effectively improve network service quality, while making full use of interface bandwidth to enhance network experience and protect user investment. Convenient and practical management and maintenanceIt adopts a full Chinese Web interface operation style, all functions can be configured through a graphical interface, and each configuration provides necessary help information to facilitate users to configure the router. Provide log list and log server functions, detailed log records to monitor network operation, help quickly find network abnormalities, locate the source of the problem and eliminate network faults in time; provide a graphical interface, real-time monitoring of CPU utilization and other key internal router resources, and discover potential in time Of various dangers and attacks. Support local LAN or Internet remote management routers, facilitating chain operations and remote assistance; supporting ping detection, routing follows detection and other fault detection tools, and backup and import router profiles for daily maintenance and management. |
Technical Specifications
Property Description | Property Value |
---|---|
port | 5 10/100/1000M RJ45 ports 1 Console port |
processor | Quad-core 64-bit MIPS network dedicated processor, single-core frequency 1.2GHz |
RAM | DDRIII 2GB |
FLASH | 64MB |
Indicator light | Per port: Link/Act, Speed Per device: PWR, SYS |
Dimensions | 440(w)x227(D)x44(H) mm |
Input power | 100~240V AC,50/60Hz |
Cooling method | Thermally conductive silicone + natural heat dissipation |
Use environment | Operating temperature: 0°C~40°C, operating humidity: 10%~90%RH non-condensing Storage temperature: -40°C~70°C, storage humidity: 5%~90%RH non-condensing |
Typical belt load | Around 3000 |
Network protocol | TCP/IP、DHCP、ICMP、NAT、PPPoE、SNTP、HTTP、DNS、H.323、SIP、DDNS |
basic settings | Interface setting DHCP server |
AP management | AP settings, manage up to 300 TP-LINK AP wireless network settings wireless client status |
Access method | Dynamic IP, static IP, PPPoE, L2TP, PPTP |
Transmission control | NAPT One-to-one NAT mapping virtual server FTP ALG, H.323 ALG, SIP ALG, PPTP ALG IP bandwidth control, connection number control, flow/connection number monitoring Maximum concurrent connections: 1000000 intelligent balance, special application routing, ISP routing, line backup static routing, policy routing, system routing list |
ARP protection | Support ARP scanning, ARP list, free GARP, support IP MAC binding |
Attack protection | Anti-DoS, scanning, suspicious packet and other common attacks |
Access control | Support setting MAC address filtering black and white list access control list |
Behavior control | Social software/Video software/Music software/Shopping and leisure software/News software/P2P software/Financial software/Online games/App store/Basic applications and other common applications Limit QQ black and white list URL filtering Web page security (Prohibit page submission, filtering Specify the file extension type) Application signature database upgrade |
VPN | IPsec VPN (200 tunnels) PPTP/L2TP VPN (200 tunnels) |
Certification Management | Web authentication, support local authentication, Radius authentication, one-click Internet access, to meet a variety of authentication needs Customize authentication page, easily push text and image ads, carry out marketing promotion Authentication-free strategy |
system service | Dynamic DNS (Peanut Shell, Comay, 3322) UPnP service DNS proxy |
Management and maintenance | Chinese Web network management, remote management configuration backup and import configuration system software upgrade interface traffic statistics, IP traffic statistics ping, tracert diagnostic tool system log |