TL-WVR308 is TP-LINK to meet the small and medium-sized enterprisesschools chain network environment of wireless network demand and launched a 300M wireless VPN router products using 11N wireless technology the wireless transmission rate up to 300Mbps and support the Internet software function characteristics of behavior management, IPSec/PPTP/L2TP VPNintelligent IP bandwidth control and connection limit ARP protection and attack protection dual port WAN load balancing and line backup rich wirelessnetwork help SMEs build high performance price ratio high security easy tocontrol.

The strong processing function high stability

The MIPS 32 network processor frequency of 533MHz with 64MB DDRII high speed memory to ensure that the router has powerful ability of processingdata packets;

The fanless design mute energy saving stable; high quality built-in switching power supply a wide input voltage range.

Wireless strong performance

300Mbps high speed wireless: using 11N wireless technology the wirelesstransmission rate up to 300Mbps can meet more wireless client access and provide wireless higher bandwidth for each client. The 2x2 MIMO architectureconfiguration of two 5dBi detachable high gain antenna signal multipathtransceiver improve signal penetration increased wireless coverage. Typical total machine weight: 30, typical wireless machine quantity: 15 sets.

WDS wireless bridging: support WDS wireless bridging function, can realize thewireless bridge between multiple routers the extended wireless coverage to meet a wide range of wireless coverage requirement.

Multi-SSID features: supports up to 4 SSID can be set to different SSID fordifferent parts of the company and the visiting guests and can realize the isolation between the internal SSID and AP isolation ensure the enterprisedata security.

Wireless security: support SSID hidden wireless MAC address filtering WEP encryption and WPA/WPA2 WPA-PSK/WPA2-PSK security mechanism,security of wireless network security.

A variety of means to control employee Internet

Application: support for IM software P2P software financial software network game agents based on the application of common application of a banInternet behavior effectively limited staff at the same time support group configuration block strategy based on in view of the different users to assign different permissions ensure the normal use of key user.

URL Filter: built-in 10 categories of hundreds of Web database easy controlstaff can visit the web site.

URL filter: filter strategy for web based on black and white list and user groupcan limit employee access to all kinds of website avoid the latent harm to visita malicious web site brings.

Webpage safety: may prohibit Webpage submission and filtering custom file to ensure that the secret of the enterprise does not leak enterprise networksecurity.

Access control list: the configuration of the basic access control rules canallow or prohibit the employee use of various network applications including FTP download email Web browsing video and voice communication. At the same time, support the user group and the time of access control rules based on fine management can realize the access permissions to employees.

TP-LINK Internet behavior audit software

TP-LINK Internet behavior audit software is installed in the networkadministrator to specify a computer and TP-LINK wireless enterprise VPNrouter supporting the use specifically for the Internet behavior monitoringrecording and analysis of enterprise network software able to multi dimension record employee Internet clear presentation of enterprise network usage;flexible customization of export report function to meet the various reporting requirements; behavior audit log contains rich retrieval mechanism convenient and rapid access to the required information; owned several database securitybackup, effectively guarantee information security auditing.

Support for multiple VPN remote communication security security

Support IPSec VPN PPTP VPN L2TP VPN can meet various applicationenvironment to establish secure remote connection requirements.

IPSec VPN: provide standard IPSec function of VPN MD5 and SHA1 safety certification support DES 3DES AES128 AES192 AES256 encryption algorithm; support the establishment of VPN connection IKE and manual modeand for domestic users with dynamic IP PPPoE dialing access networkcharacteristics allowing the connection through the domain configuration VPN;

PPTP/L2TP VPN: support for PPTP/L2TP server and client function allows a maximum of 10 PPTP VPN and 10 L2TP VPN tunnel tunnel.

Intelligent control of flexible bandwidth

Intelligent IP bandwidth control: to support intelligent IP bandwidth controlfunction according to the ratio of flexible enable bandwidth control strategyusing the actual bandwidth for the network each host (IP) bidirectionalbandwidth control effectively inhibit the BT thunder and other P2P applications to avoid excessive bandwidth network game card slow speed the Internet, security network connectivity.

Connection limit: IP connection limit function based on the number of connections can be restricted possession of each computer, the rational use of the limited number of NAT connections resources prevent a few users overoccupies a large number of connections, to ensure that in games Internetchat video, voice and other smooth.

Security policy rich

ARP double protection: IP and MAC address automatically scan and a keybinding function can also bind LAN (intranet) WAN (outer) host IP and MAC address information effectively prevent the internal / external ARP spoofing;ARP spoofing in suffering in accordance with the specified frequency sendsARP information correction recovery network in the normal state.

Attack protection: support internal / external attack protection function caneffectively prevent all kinds of common DoS attack scan attack attack behavior suspicious package.

MAC filter: filter function based on MAC address effectively blocking theaccess of illegal host.

Dual port WAN load balancing and failover

TL-WVR308 provides 2 10/100M WAN and 7 10/100M LAN meet the enterprise double line access network demand.

Load balancing: a variety of load balancing strategies including intelligent balanced application specific routing ISP routing, routing strategy multi pronged approach can make full use of WAN bandwidth protect usersinvestment;

Line backup: support WAN backup function once the main line failure flow will rapidly switch to the backup route ensure the network normal operation. At the same time also can configure backup port WAN according to time enabled,higher flexibility.

Router configuration tutorial

Domestic product Setup Guide: http://www.tp-link.com.cn/pages/promos/event/setupGuide/

How do I cannot login management interface? Http://service.tp-link.com.cn/content/cfg/login.htm

How to extend the home wireless coverage? Http://service.tp-link.com.cn/content/cfg/WDS.htm

How to extend the wired network to wireless network? Http://service.tp-link.com.cn/content/cfg/cascading.htm

Share online tutorial _ 3G router? Http://service.tp-link.com.cn/content/cfg/3G-route.htm