\
Junyu Network Technology(Shanghai)Limited company The first gold agent in Shanghai
\ \
TL-ER7520G is a new generation high-performance all-gigabit enterprise router product launched by TP-LINK. It is mainly targeted at enterprises, institutions, parks, chain hotels, etc. that require high-speed Internet access, authenticated Internet access, VPN remote secure communication and Internet behavior Managed network environment.
\ \
TL-ER7520GAdopts a quad-core 64-bit network dedicated processor, single-core frequency up to 1.2GHz, with 1GB DDRIII high-speed memory, with strong network data forwarding capabilities, and supports Web authentication, WeChat authentication, IPSec/PPTP/L2TP VPN, and Internet behavior Rich features such as management, firewall, and flow control are suitable for building a secure, efficient and easy-to-manage full Gigabit enterprise network.
\ \
\ \
New hardware architecture, high-speed data forwarding
\ \
Using a brand-new hardware architecture, a professional quad-core 64-bit network dedicated processor, 1GB DDRIII high-speed memory, the data packet processing capability has been greatly improved, it can realize Gigabit line-speed forwarding, and effectively meet the data forwarding requirements in a high-bandwidth environment. In the actual environment, the typical belt machine volume is about 3000 units.
\ \
Provide 5 10/100/1000M RJ45 ports, you can freely customize the port type according to your needs, and can bind a variety of logical interfaces at the same time to adapt to more complex networking environments.
\ \
\ \
\ \
\ \
Web authentication
\ \
No client software is required to achieve authentication to the network, reducing the workload of network maintenance;
\ \
Support local authentication, Radius authentication and one-click Internet access to meet multiple authentication requirements;
\ \
The authentication jump page can be customized to realize advertisement push.
\ \
\ \
\ \
WeChat with Wi-Fi
\ \
\ \
Customers do not need to enter complex passwords, and can realize one-click networking through the WeChat client;
\ \
Support Portal interface jump, can push customized pictures to users;
\ \
Support the setting of online duration, and flexibly control the user authentication period.
\ \
\ \
\
\ \
Safe and reliable IPSec/PPTP/L2TP VPN
\ \
Provides standard IPSec VPN functions, supports data integrity verification, data source authentication, anti-data packet replay and data encryption functions(Encryption algorithms such as DES, 3DES, AES128, AES192, AES256, etc.); Support IKE and manual mode to establish VPN connection, and according to the characteristics of domestic users who use dynamic IP, PPPoE dial-up and other methods to access the network, it allows to configure VPN connections through domain names; allows up to 200 IPSec VPN tunnels to be established, which can meet the needs of corporate headquarters The need to establish remote secure communications with branches, between enterprises and business partners/suppliers.
\ \
Support PPTP/L2TP server and client functions, allowing the establishment of up to 200 PPTP/L2TP VPN tunnels. Users can flexibly choose to use server and client functions according to actual needs: When deployed in the corporate headquarters, PPTP/L2TP server functions are generally used to meet the needs of traveling employees or branches to remotely securely access the company network; When a PPTP/L2TP server establishes a VPN connection, it needs to use the PPTP/L2TP client function.
\ \
\ \
\ \
Effective online behavior management
\ \
It supports online behavior control based on user groups and time, which can effectively control more than 60 network applications; at the same time, it supports the QQ black and white list mechanism to assign different permissions to different users to ensure the normal use of key users.
\ \
Support website grouping function, which can easily classify complex websites. It can manage and control employees'''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''' access to various websites, record their access history information, and warn employees to prohibit access to restricted websites.
\ \
Support prohibiting web page submission, restrict employees from logging in to various web-based forums, microblogs, emails, etc. to post information, to avoid leakage of sensitive corporate data; support filtering file extension types, which can easily filter various small files embedded in web pages , To prevent viruses, Trojan horses, etc. from invading the corporate network through these small files and endangering network security.
\ \
\ \
\ \
Rich security strategy
\ \
Support access control strategy, can set firewall rules based on network protocol type, port number, source/destination IP address, time period, and control the security of internal and external network communication;
\ \
Provides automatic scanning of IP and MAC addresses and one-key binding functions, which can bind LAN ports at the same time(Intranet), WAN port(Extranet)The host''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''s IP and MAC address information can effectively prevent internal/external network ARP spoofing and avoid network disconnection caused by ARP spoofing; when suffering from ARP spoofing, it can actively send ARP correction information according to the specified frequency to restore the normal state of the network in time , Effectively reduce the degree of harm.
\ \
Support internal/external network attack protection function, which can effectively prevent various common DoS attacks, scanning attacks, suspicious packet attacks, such as: TCP Syn Flood, UDP Flood, ICMP Flood, WinNuke attack, fragmented packet attack, WAN Ping, TCP Scan(Stealth FIN/Xmas/Null), IP spoofing, etc.
\ \
Support the filtering function based on MAC address, effectively blocking the access of illegal hosts.
\ \
\ \
\ \
Flexible flow control
\ \
Support intelligent IP bandwidth control function, flexibly enable bandwidth control strategy according to the actual bandwidth utilization, which can be targeted at each host in the network(IP)Two-way bandwidth control is implemented to effectively suppress excessive bandwidth usage by P2P applications such as BT and Xunlei, avoiding the problems of network game cards and slow Internet access speeds, and ensuring smooth network at all times.
\ \
Provides IP-based connection limit function, which can limit the number of connections occupied by each computer, make reasonable use of limited NAT connection resources, prevent a few users from occupying a large number of connections, and ensure the smoothness of games, Internet, chat, video and voice, etc. get on.
\ \
Supports multiple load balancing strategies such as intelligent balancing, routing for special applications, routing for ISPs, etc., multi-pronged approach to effectively improve network service quality, while making full use of interface bandwidth to enhance network experience and protect user investment.
\ \
\ \
\ \
Convenient and practical management and maintenance
\ \
Using the Chinese Web interface operation style, all functions can be configured through a graphical interface, and each configuration provides necessary help information to facilitate the user to configure the router.
\ \
Provide log list and log server functions, detailed log records to monitor network operation, help quickly find network abnormalities, locate the source of the problem and eliminate network faults in time; provide a graphical interface, real-time monitoring of CPU utilization and other key internal router resources, and timely discover potential Of various dangers and attacks.
\ \
Support local LAN or Internet remote management router, convenient chain operation and remote assistance; support Ping detection, route tracking detection and other fault detection tools, and can backup and import router configuration files to facilitate daily maintenance and management.![](https://img.alicdn.com/imgextra/i3/781672946/TB2DFJraLBNTKJjy1zdXXaScpXa_!!781672946.png)
\ \