TP-LINK TL-R600VPN VPN Router Review
http://amzn.to/1GNvkoC
- 1 Gigabit WAN port and 4 Gigabit LAN ports provide high-speed wired connectivity
- Supports IPsec/PPTP VPN protocols, Up to 20 IPsec VPN tunnels and 16 PPTP VPN tunnels are simultaneously supported
- SPI firewall and DoS defense protect your network from most known Internet attacks
- Professional 4KV lightning protection keeps your investment safe and sound
- Remote Management
- DoS Attack Defence, Ping of Death
Review:
We were beforehand utilizing two Netgear FVS318s to interface our satellite office to our fundamental office. I as of late found that the Netgear is constrained to 10Mbps on the WAN port, and we have a 35/35 association at the primary office and a 50/25 at the satellite office, so a redesign was all together. I was initially going to run with the Cisco RV180, however in the wake of perusing about the numerous bugs with it I figured I'd try the TP-LINK out.
The interface is really essential, and therefore makes designing it a snap. Inside of 10 minutes I had it arranged for our ISP and made numerous inbound/outbound arrangements that we requirement for RDP, FTP, Exchange, and so on. Setting up an IPsec VPN between the two TP-LINK units took around 5 minutes. They have been running for a week now with no issues or reboots. I will upgrade this survey in the event that I begin having dependability issues.
I know different audits have said issues with their web data transmission diminishing following 24 hours with this switch, however I haven't encountered this. Be that as it may, those clients have a 100+Mbps association and the most elevated we have is 50Mbps - so that could be the reason we haven't had this issue. VPN throughput tops out at 20Mbps, so on the off chance that you require speedier throughput on the VPN you would need to take a gander at an alternate switch - yet this is more than sufficiently quick for essential utilization (opening documents, email, and so forth). It's not as adaptable as a Cisco or a SonicWall, however its not intended to be and the cost mirrors this.
Geniuses:
Extraordinary form quality (every metal chassi)
Interior power supply
Execution
Cost
Cons:
Inward power supply transmits a low volume high pitch commotion (not exceptional, but rather the Netgear was noiseless)
Not rack/divider mountable
Upgrade 1 (10/21/13): Been utilizing two of these for more than a month now with no issues. I see a few individuals reported issues with PPTP VPN. I haven't encountered this as we are utilizing IPsec, yet TP-Link has redesigned the firmware to settle the PPTP issues. Still exceptionally content with this switch.
Upgrade 2 (02/13/14): 6 months am still exceptionally satisfied with them.
Upgrade 3 (10/30/14): Over a year now (framework uptime says 414 days) and haven't had any issues with our two units. Despite everything I think these are an awesome worth for a little business that needs fundamental VPN switch. For a medium estimated business or on the off chance that you require a more venture level item/includes, I would exceptionally propose the Ubiquiti EdgeRouter Lite or the Ubiquiti USG (both of which are around $120).
Example Route For VPN IPsec:
ere are some settings you should be able to use for setting up an IPsec VPN.
IKE Policy Settings for Main Office:
Policy Name: MainOffice
Exchange Mode: Main
Local ID Type: IP
Local ID: WAN IP Address
Remote ID Type: IP
Remote ID: Peer Gateway IP Address
Authentication Algorithm: AUTO
Encryption Algorithm: AUTO
DH Group: DH2
Pre-shared Key: D15Pn2G2oc (this is a random key I generated, you should make your own)
SA Lifetime: 28800
DPD: Disable
IPsec Policy Settings for Main Office:
Policy Name: MainOffice
Local Subnet: main office subnet (eg: 192.168.1.0 /24)
Remote Subnet: remote office subnet (eg: 192.168.2.0 /24)
Remote Gateway: IP address of gateway (eg: your static WAN IP address of Remote Office)
Exchange Mode: IKE
Security Protocol: ESP
Authentication Algorithm: AUTO
Encryption Algorithm: AUTO
IKE Security Policy: MainOffice
PFS Group: DH1
Lifetime: 28800
Status: Enable
IKE Policy Settings for Remote Office:
Policy Name: RemoteOffice
Exchange Mode: Main
Local ID Type: IP
Local ID: WAN IP Address
Remote ID Type: IP
Remote ID: Peer Gateway IP Address
Authentication Algorithm: AUTO
Encryption Algorithm: AUTO
DH Group: DH2
Pre-shared Key: D15Pn2G2oc (this is a random key I generated, you should make your own)
SA Lifetime: 28800
DPD: Disable
IPsec Policy Settings for Remote Office:
Policy Name: RemoteOffice
Local Subnet: remote office subnet (eg: 192.168.2.0 /24)
Remote Subnet: main office subnet (eg: 192.168.1.0 /24)
Remote Gateway: IP address of gateway (eg: your static WAN IP address of Main Office)
Exchange Mode: IKE
Security Protocol: ESP
Authentication Algorithm: AUTO
Encryption Algorithm: AUTO
IKE Security Policy: RemoteOffice
PFS Group: DH1
Lifetime: 28800
Status: Enable
IKE Policy Settings for Main Office:
Policy Name: MainOffice
Exchange Mode: Main
Local ID Type: IP
Local ID: WAN IP Address
Remote ID Type: IP
Remote ID: Peer Gateway IP Address
Authentication Algorithm: AUTO
Encryption Algorithm: AUTO
DH Group: DH2
Pre-shared Key: D15Pn2G2oc (this is a random key I generated, you should make your own)
SA Lifetime: 28800
DPD: Disable
IPsec Policy Settings for Main Office:
Policy Name: MainOffice
Local Subnet: main office subnet (eg: 192.168.1.0 /24)
Remote Subnet: remote office subnet (eg: 192.168.2.0 /24)
Remote Gateway: IP address of gateway (eg: your static WAN IP address of Remote Office)
Exchange Mode: IKE
Security Protocol: ESP
Authentication Algorithm: AUTO
Encryption Algorithm: AUTO
IKE Security Policy: MainOffice
PFS Group: DH1
Lifetime: 28800
Status: Enable
IKE Policy Settings for Remote Office:
Policy Name: RemoteOffice
Exchange Mode: Main
Local ID Type: IP
Local ID: WAN IP Address
Remote ID Type: IP
Remote ID: Peer Gateway IP Address
Authentication Algorithm: AUTO
Encryption Algorithm: AUTO
DH Group: DH2
Pre-shared Key: D15Pn2G2oc (this is a random key I generated, you should make your own)
SA Lifetime: 28800
DPD: Disable
IPsec Policy Settings for Remote Office:
Policy Name: RemoteOffice
Local Subnet: remote office subnet (eg: 192.168.2.0 /24)
Remote Subnet: main office subnet (eg: 192.168.1.0 /24)
Remote Gateway: IP address of gateway (eg: your static WAN IP address of Main Office)
Exchange Mode: IKE
Security Protocol: ESP
Authentication Algorithm: AUTO
Encryption Algorithm: AUTO
IKE Security Policy: RemoteOffice
PFS Group: DH1
Lifetime: 28800
Status: Enable