TL-NR6500 is a new generation of x86 architecture high-performance 10 Gigabit enterprise router product launched by TP-LINK, which is mainly positioned in large enterprises, campus exits and other network environments that require high-speed Internet access, high-concurrency authentication Internet access, VPN remote secure communication and Internet behavior management.
TL-NR6500 adopts a multi-core x86 network processor, with 16GB DDRIV high-speed memory, 256GB large-capacity solid-state storage, with powerful network data forwarding capabilities, and supports Web authentication, IPSec/PPTP/L2TP VPN/SSL VPN, online behavior management, firewall, traffic control and other rich functional features, suitable for building a secure, efficient and easy-to-manage full gigabit enterprise network.
- Multi-core x86 architecture high-performance network-specific processor, TGL i5
- 16GB DDRIV high-speed memory
- 256GB SSD solid-state storage
- 2 x 10 Gigabit SFP+ fiber expansion ports, 6 x 10/100/1000M RJ45 electrical ports, and the port type can be customized
- Access Authentication (Web Authentication, SMS Authentication, PPPoE Server)
- Multiple VPNs (IPSec/PPTP/L2TP VPN/SSL VPN)
- Online behavior management (app restrictions/website filtering/web security)
- Intranet and intranet ARP protection and common attack protection
- Intelligent IP bandwidth management and limit the number of connections
- The maximum capacity can reach 15000
- One external hard drive is supported
New hardware architecture, high-speed data forwarding
Using a new hardware architecture, professional multi-core x86 network dedicated processor, 16GB DDRIV high-speed memory, 256GB large-capacity solid-state storage, the data packet processing capacity has been greatly improved, and the number of new connections can reach 500,000 cps, effectively meeting the data forwarding requirements in high-bandwidth environments. In the actual environment, the typical number of machines can reach up to about 15,000 units.
It provides 2 10 Gigabit SFP+ fiber module expansion ports and 6 10/100/1000M RJ45 ports, which can freely customize the port type according to needs, and can be bound to a variety of logical interfaces to adapt to more complex networking environments.
The built-in AC function can be used to manage TP-LINK enterprise APs in a unified manner
The built-in AC function is both a router and a wireless controller, which can control up to 1,500 TP-LINK enterprise APs in a unified manner, making it easy to expand the enterprise wireless network.
It can automatically discover the TP-LINK AP in the network, and perform unified configuration and management of the AP, realize zero-configuration AP access, plug and play, and support AP status monitoring and upgrade, which is easy to maintain.
A variety of authentication methods, control the Internet access, and realize advertising and marketing
Support web authentication, and push merchant advertising information through the authentication page;
Support SMS authentication, meet the requirements of real-name authentication, and can carry out secondary marketing based on mobile phone number;
* Support PPPoE server, which can realize unified dial-up Internet access for intranet users.
Secure and reliable IPSec/PPTP/L2TP VPN
It provides standard IPSec VPN functions, supporting data integrity verification, data source authentication, anti-packet replay, and data encryption functions (AES128, AES192, AES256 and other encryption algorithms). It supports IKE and manual mode to establish VPN connections, and allows domestic users to access the network by dynamic IP, PPPoE dial-up, etc., and allows VPN connections to be configured through domain names. A maximum of 1,000 IPSec VPN tunnels can be established to meet the needs of remote and secure communication between the enterprise headquarters and branches, and between the enterprise and business partners/suppliers.
PPTP/L2TP server and client functions are supported, allowing up to 1000 PPTP/L2TP VPN tunnels* to be established*. Users can flexibly choose to use server and client functions according to actual needs: when deployed in the enterprise headquarters, the PPTP/L2TP server function is generally used to meet the needs of employees on business trips or branches to remotely and securely access the company's network; If you want to establish a VPN connection with a remote PPTP/L2TP server, you need to use the PPTP/L2TP client function.
* Comprehensive and effective online behavior management
Built-in database of common Internet applications, which can control various desktop and mobile Internet applications with one click, including social software/video software/music software/shopping and leisure software/news and information software/P2P software/financial software/online games/app stores/basic applications, etc.;
Built-in database of hundreds of URLs in more than a dozen categories, which can restrict employees' access to the corresponding website with one click;
Support prohibiting web submission, restricting employees from logging in to various web-based forums, microblogs, mailboxes, etc. to publish information, and avoid the leakage of sensitive data of enterprises;
It supports the expansion type of filtering files, which can easily filter all kinds of small files embedded in web pages to prevent viruses and Trojan horses from invading the enterprise network and endangering network security through these small files.
It supports the behavior audit function, comprehensively records online behavior, and outputs audit results in reports.
Rich security policies
Support access control policies, and set firewall rules based on network protocol type, port number, source/destination IP address, and time period to control internal and external network communication security;
It provides automatic scanning of IP and MAC addresses and one-click binding functions, which can bind the IP and MAC address information of LAN port (intranet) and WAN port (extranet) hosts at the same time, effectively preventing intranet/extranet ARP spoofing and avoiding network disconnection caused by ARP spoofing. In the event of ARP spoofing, you can send ARP correction messages at a specified frequency to restore the normal state of the network in a timely manner and effectively reduce the degree of harm.
Supports intranet/extranet attack protection and can effectively prevent various common DoS attacks, scanning attacks, and suspicious packet attacks, such as TCP syn floods, UDP floods, ICMP floods, WinNuke attacks, fragment packet attacks, WAN port pings, TCP scan (stealth FIN/Xmas/Null), and IP spoofing.
MAC address-based filtering is supported to effectively block the access of unauthorized hosts.
Flexible flow control
It supports the intelligent IP bandwidth control function, flexibly enables the bandwidth control policy according to the actual bandwidth utilization, and can carry out two-way bandwidth control for each host (IP) in the network, effectively inhibiting the excessive bandwidth occupation of P2P applications such as BT and Thunderbolt, avoiding the problem of online game cards and slow Internet speed, and ensuring that the network is smooth at all times.
It provides an IP-based connection restriction function, which can limit the number of connections occupied by each computer, make reasonable use of the limited NAT connection resources, prevent a small number of users from excessively occupying a large number of connections, and ensure the smooth operation of games, Internet access, chat, video and voice, etc.
It supports multiple load balancing strategies, such as intelligent balancing, special application traffic selection, and ISP traffic selection, to effectively improve network service quality, make full use of interface bandwidth, improve network experience, and protect user investment.
Convenient and practical management and maintenance
Adopting the full Chinese web interface operation style, all functions can be configured through the graphical interface, and each configuration provides necessary help and explanation information to facilitate the user to configure the router.
Provide log list and log server functions, detailed log records to supervise network operation, help quickly find network anomalies, locate the source of problems, and eliminate network faults in time. Provides a graphical interface to monitor key router resources such as CPU utilization in real time, and detect potential dangers and attacks in a timely manner.
Support local LAN or Internet remote management router, convenient chain operation and remote assistance; It supports a variety of fault detection tools such as ping detection and traceroute detection, and can back up and import router configuration files for daily maintenance and management.
Hardware specifications
Port |
|
Processor |
|
Memory |
|
SSD |
|
Light |
|
Dimensions |
|
Enter the power supply |
|
Heat dissipation |
|
Use environment |
|
Typical machine size |
|
It is recommended to bring the number of machines |
|
Software Features
Network protocols |
|
Basic settings |
|
AP management |
|
Access mode |
|
Transmission control |
|
ARP protection |
|
Attack protection |
|
Access control |
|
Behavior control |
|
VPN |
|
Certification management |
|
System services |
|
Manage maintenance |
|
Tag description |
|
4.9
12 views
Reviews
Reviews
Q How to make a payment?
E****R 18/11/2024
A We accept various payment methods including bank transfers, credit cards, and PayPal. Please refer to our payment page during checkout for detailed instructions on how to complete your payment. If you have any questions or need assistance with payment, please contact our customer support team.
18/11/2024
Q How will the products be shipped?
T****k 16/08/2024
A We ship products through reliable courier services such as DHL, UPS, and FedEx. Shipping fees and delivery times may vary depending on the destination. You will receive a tracking number once your order has been dispatched, allowing you to track the status of your shipment. Please note that shipping times may vary based on location and availability.
16/08/2024
Q How is warranty provided?
L****Y 08/05/2024
A We offer a warranty on all of our products. The warranty period and conditions vary depending on the product category. For specific warranty information, please refer to the product page or your purchase agreement. If you encounter any issues with a product during the warranty period, please contact our customer service team with your proof of purchase, and we will guide you through the warranty claim process.
08/05/2024
★ ★ ★ ★ ★ 16/08/2024
Good service!
(156)
★ ★ ★ ★ ★ 23/07/2024
Good!
(982)
★ ★ ★ ★ ★ 23/07/2024
Good quality!
(982)