Router Vigor 2820VS poskytuje dvě vzájemně nezávislé WAN rozhraní a umožňuje sdílený přístup k internetu rychlostí až 24Mb/s. Je určen pro náročné aplikace středních podniků a kanceláří. Zařízení podporuje také množství dalších funkcí nutných pro zvýšení bezpečnosti, vzdálený přístup, multimediální podporu a vytváření virtuálních privátních sítí (VPN) přes internet v jednom kompaktním zařízení včetně modulu VoIP a možnosti připojení tiskárny, 3G modemu, či externího disku přes USB a ISDN modulu s 2 sběrnicemi S0.
Dual WAN (ADSL2+ a Ethernet) Firewall router s VoIP a ISDN
Podpora 3G USB modemu
Druhý WAN port pro vyvážení datového provozu a proti přetížení sítě
Funkce VoIP s jedním analogovým portem, jedním ISDN portem vyhrazeným pro ISDN telefon a jedním ISDN portem nastavitelným pro ISDN telefon nebo ISDN linku
Flexibilní správa šířky pásma pro využití šířky pásma
Objektově orientovaný firewall chrání před externími útoky a zjednodušené nastavení pravidel pro přístup k internetu
Hardwarové VPN pro vysoký výkon přístupu k vzdáleným datům.
Two MSN ( Multiple Subscriber Numbers ) on Each ISDN S0 Port for VoIP Call ( for VS model )
Dial Plan :
Phone Book
Digit Map
ISDN Loop-through ( TE mode only )
ISDN On-Net / Off-Net ( TE mode only )
5. ISDN
Euro ISDN Compatible
Automatic ISDN Backup
Support 64 / 128Kbps ( Multilink-PPP ) / BoD ( Bandwidth On Demand )
Remote Dial-In / LAN-to-LAN Connection
Remote Activation
Virtual TA
Bypass the Right and Left ISDN Port During Power Cut ( If the Left ISDN Port is NT )
6. VPN
Up to 32 VPN Tunnels
Protocol :
PPTP
IPSec
L2TP
L2TP over IPSec
Encryption :
MPPE
Hardware-based AES
DES
3DES
Authentication
Hardware-based MD5
SHA-1
IKE Authentication :
Pre-shared Key
Digital Signature ( X.509 )
LAN-to-LAN , Teleworker-to-LAN
NAT-Traversal ( NAT-T )
Dead Peer Detection ( DPD )
VPN Pass-through
7. Firewall
Policy-based Firewall
CSM ( Content Security Management ) for IM / P2P Application and URL / Web Content Filter
Multi-NAT / DMZ Host / Port-Redirection / Open Port
SPI ( Stateful Packet Inspection ) ( Flow Track )
DoS / DDoS Prevention
IP address Anti-spoofing
E-Mail Alert and Logging via Syslog
IP and MAC Binding
8. Bandwidth Management
QoS :
Guarantee Bandwidth for VoIP
Class-based Bandwidth Guarantee by User-Defined Traffic Categories
DiffServ Code Point Classifying
4-level Priority for Each Direction ( Inbound / Outbound )
Bandwidth Borrowed
Bandwidth / Session limitation
9. WAN Protocol ( WAN2 )
DHCP Client
Static IP
PPPoE
PPTP
BPA
L2TP*
10. Network Feature
Port-based VLAN
DNS Cache / Proxy
DHCP Client / Relay / Server
IGMP Proxy
Dynamic DNS
NTP Client
Call Scheduling
RADIUS Client
UPnP
Routing Protocol :
Static Routing
RIP V2
11. USB
3G USB Modem ( 3G only can act as WAN2 )
USB Printer
12. Network Management
Web-based User Interface ( HTTP / HTTPS )
Quick Start Wizard
CLI ( Command Line Interface , Telnet / SSH )
Administration Access Control
Configuration Backup / Restore
Built-in Diagnostic Function
Firmware Upgrade via TFTP / FTP / HTTP / TR-069*
Logging via Syslog
SNMP Management MIB-II
TR-069*
TR-104*
13. Support Smart Monitor
Up to 30 PCs
Hardware Interface
ADSL
1-port ADSL2+, RJ-11 connector (for AnnexA)
1-port ADSL2+, RJ-45 connector (for AnnexB)
LAN
3-port 10/100 Base-Tx and 1 port 1000 Base-TX Switch, RJ-45 connectors
WAN
1 port 10/100 Base-Tx, RJ-45 connector
VoIP
2-port FXS
ISDN
1 port Fixed ISDN NT/TE and 1 port configurable ISDN NT/TE, RJ-45 connector
USB
1-port USB Host 2.0 (USB Printer / 3.5G USB Modem)
Dual WAN
Outbound Policy-based Load-balance
BoD (Bandwidth On Demand)
WAN Connection Fail-over
ADSL Compatibility
ANSI T1.413 Issue2
ITU-T G.992.1 G.dmt
ITU-T G.992.2 G.lite
ITU-T G.992.3 ADSL2 G.dmt.bis
ITU-T G.992.5 ADSL2+
Annex L (READSL)
Annex M
ATM Protocol
RFC-2684 / RFC-1483 Multiple Protocol over AAL5
RFC-2516 PPP over Ethernet
RFC-2364 PPP over AAL5
PPPoE Pass Through LAN / WLAN
PPPoE / PPPoA Relay
Transparent Bridge for MPoA
VoIP
Protocol
SIPv2
RTP
RTCP
12 SIP Registrars
G.168 Line Echo-cancellation
Automatic Gain Control
Jitter buffer (180 ms)
Voice Codec
G.711 A/µ Law
G.723.1
G.726
G.729 A / B
VAD
CNG
iLBC *
DTMF Tone
In Band
Out Band (RFC-2833)
SIP Info
Supplemental Services
Internal Call
Call Hold / Retrieve / Waiting
Call Waiting with Caller ID
Call Transfer
Call Forwarding (Always / Bust / No Answer)
Call Barring (Incoming / Outgoing)
DND (Do Not Disturb)
MWI (Message Waiting Indicator) (RFC-3842)
Hotline
Two MSN (Multiple Subscriber Numbers) on Each ISDN S0 Port for VoIP Call
Dial Plan
Phone Book
Digit Map
ISDN Loop-through (TE mode only)
ISDN On-Net / Off-Net (TE mode only)
ISDN
Euro ISDN Compatible
Automatic ISDN Backup
Support 64 / 128Kbps (Multilink-PPP) / BoD (Bandwidth On Demand)
Remote Dial-In / LAN-to-LAN Connection
Remote Activation
Virtual TA
Bypass the Right and Left ISDN Port During Power Cut (If the Left ISDN Port is NT)
VPN
Up to 32 VPN Tunnels
Protocol : PPTP, IPSec, L2TP, L2TP over IPSec
Encryption : MPPE and Hardware-based AES / DES / 3DES
Authentication : Hardware-based MD5, SHA-1
IKE Authentication : Pare-shared Key and Digital Signature (X.509)
LAN-to-LAN, Teleworker-to-LAN
DHCP over IPSec
NAT-Traversal (NAT-T)
Dead Peer Detection (DPD)
VPN Pass-through
Firewall
Policy-based Firewall
CSM (Content Security Management) for IM / P2P Application and URL / Web Content Filter
Multi-NAT / DMZ Host / Port-redirection / Open Port
SPI (Stateful Packet Inspection) (Flow Track)
DoS / DDoS Prevention
IP address Anti-spoofing
E-Mail Alert and Logging via Syslog
IP and MAC Binding
Bandwidth Management
QoS
Guarantee Bandwidth for VoIP
Class-based Bandwidth Guarantee by User-Defined Traffic Categories
DiffServ Code Point Classifying
4-level Priority for Each Direction (Inbound / Outbound)
Bandwidth Borrowed
Bandwidth / Session Limitation
WAN Protocol (WAN2)
DHCP Client
Static IP
PPPoE
PPTP
BPA
L2TP*
Network Feature
DNS Cache / Proxy
DHCP Client / Relay / Server
IGMP Proxy
Dynamic DNS
NTP Client
Call Scheduling
RADIUS Client
UPnP
Routing Protocol
Static Routing
RIP V2
Network Management
Web-based User Interface (HTTP / HTTPS)
Quick Start Wizard
CLI (Command Line Interface , Telnet / SSH)
Administration Access Control
Configuration Backup / Restore
Built-in Diagnostic Function
Firmware Upgrade via TFTP / FTP / HTTP / TR-069 *
Logging via Syslog
SNMP Management MIB-II
TR-069 *
TR-104 *
Support Smart Monitor
Up to 30 PCs
Temperature
Operating : 0°C ~ 45°C
Storage : -25°C ~ 70°C
Humidity
10% ~ 90% (non-condensing)
Max. Power
10 Watt
Dimension
L241 * W165 * H44 (mm)
Power
DC 12V ~ 15V
Dual WAN Load Balancing / Fail Over
Figure 1. Dual WAN - Load Balance Application
Figure 2. Dual WAN - Fail Over Application
VPN Firewall Application
By adopting hardware-based VPN platform and hardware encryption of AES/DES/3DS, the router increases the performance of VPN greatly, and offers several protocols (such as IPSec/PPTP/L2TP) with up to 32 VPN tunnels. The object-based design used in SPI (Stateful Packet Inspection) firewall allows users to set firewall policy with ease. Object-based firewall is flexible and allows your network be safe. DoS/DDoS prevention and URL/Web content filter strengthen the security outside and control inside.
Figure 3. VPN Firewall Application
VoIP Application / ISDN (S0) Application
Phone S0 port is dedicated for ISDN phone while the ISDN/Phone S0 port is configurable for ISDN line, or ISDN phone if required. It can support multiple SIP registrars with high flexible configuration and call handling options. The analogue fax machine or conventional analogue phone can be attached to phone port (FXS port). You can connect your regular analogue line to the Line port of Vigor2820VSn. While you enable VoIP facility, you still can access fixed line (analogue line) to make calls just by dialing #0. Furthermore, you can set rules through "Digit Map" function about particular call destinations using either your SIP/VoIP service or the PSTN line or the ISDN line. e.g. you can route local calls via your PSTN/ISDN line (if you have a free calls package) whereas international calls can go via your preferred VoIP provider; there is flexibility to have several digitmap rules. You can make economical phone calls over the Internet with VoIP, or over analog phone line or the ISDN line.
Figure 4. VoIP Application
Figure 5. ISDN Application
CSM / 3.5G Fail-over Backup
Vigor2820 series' CSM (Content Security Management) function can block selected P2P and instant message applications. This would not only help employees stay focused on their job but also prevent possible treats from those applications damaging corporate essential data severs.
3.5G fail-over backup can keep business continuous during downtime of the leased line from ISP.