Multi-Core High-Performance Broadband Routers
Short Description:One Console port2 10/100/1000M TX WAN ports4 10/100/1000M TX LAN ports 1 USB expended port
BD-R3806/R4806, adopting the 64-bit high-performance multi-core MIPS processor and private ASIC switching chips, are cost-effective and intelligent broadband routers developed by BAUDCOM for small- or medium-sized cybercafés, enterprise and undertakings.
This series of broadband products are strong in data processing, flexible in a variety of mainstream bandwidth access environments and various in providing sound bandwidth distribution solutions, all of which are means of effective utilization of bandwidth resources. In addition, these products provide network behavior management, P2P control, VPN networking, firewall, ARP cheat prevention and vicious attack prevention.
These comprehensive broadband routers integrate multiline, NAT sharing, security and elastic rate limit, so they are to users an all-in-one comprehensive solution with high performance, high reliability and high performance-to-cost ratio.
High reliability and stability
After over a decade years of research experience in the data communication network field and studious research on broadband user’s requirements, BAUDCOM broadband solutions have won customers’ trust in all respects, especially in hareware or software design and in systematic strong ability, and these routers can run reliably for a long time in harsh environments such as high temperature, poor ventilation and bad grounding.
Strong data-processing capability
BD-R3806/R4806 adopts the 64-bit MIPS multi-core processor and the private ASIC switching chip, so it has high throughput and a high performance-to-cost ratio. They secure the reliable and rapid operation of such kernel functional modules as NAT, VPN, P2P identification and control, and firewall in an environment of multi-user and large flow.
Flexible multi-WAN access
A maximum of 4 WAN ports can be used for networking; the access modes such as Ethernet, FTTB optical fiber, ADSL and cable are supported; the multiline policies such as “bandwidth nesting”, “intelligent routing” and “master/standby” are supported.
User-friendly and flexible flow control
Beside providing multiple users the broadband NAT network surfing, BD-R3806/R4806 also supplies flexible speed limitation strategy. When the network bandwidth is idle, the bandwidth of each user will be automatically increased; when the network bandwidth is busy, the bandwidth will be averagely distributed, preventing bandwidth from being over-occupied. The assisting strategies such as big-flow host limitation mechanism, flow outburst factors and optional user punishment / limitation bring various and feasible methods for network management.
Various behavior management policies
They have the following functions:
Identifying and controlling common IM software such as QQ and MSN based on the application layer
Supporting the white list
Identifying frequent P2P programs based on the application layer
Blocking relevant services and conducting rate limit
Shielding the stock, entertainment or purchase website based on the policy database
Updating the policy database freely online
Multiple anti-attack policies
These routers are strong in preventing attacks. It can make a correct statistics and detailed analysis on all types of packets such as ARP, IP, ICMP, TCP and UDP. The attacks can be automatically prevented once they are found. The alarm information will also be provided. Therefore, you need not worry about the security of your network.
For ARP cheat, BAUDCOM provides IP-to-MAC binding, ARP-to-SCAN technology and free ARP and other mechanisms to secure the intranet; If working with BAUDCOM private switching products, these router products can be armed with DHCP-Snooping. In this way, ARP cheat cannot hide itself and it is 100% sure that ARP cheat can be detected and prevented.
Allround VPN functions
BD-R3806/R4806 routers support VPN protocols such as L2TP, PPTP, GRE, IPIP and IPSec, and provide encryption algorithms, so that an overall solution can be provided to the construction of the remote office, the mobile office and the virtual private network; these routers also have the hardware encryption unit in their CPUs and hence have a strong ability of encryption.
User-friendly Web page
A simple and clear Web graphic interface is provided for configuration, so you can easily operate it even you are not professional.
|Ports||One Console port2 10/100/1000M TX WAN ports4 10/100/1000M TX LAN ports1 USB expended port||One Console port2 10/100/1000M TX WAN ports4 10/100/1000M TX LAN ports1 USB expended port|
|MAC cloning||Supporting MAC cloning in both the intranet and the public network|
|Port mirroring||Supporting 1-to-1 or multi-to-1 port mirroring|
|Access mode||ADSL, optical fiber, Ethernet, cable|
|Processor||64-bit multi-core MIPS processor (single core)||64-bit multi-core MIPS processor (dual cores)|
|FLASH||8M, which can be expanded to 32M||8M, which can be expanded to 32M|
|DRAM||256M, which can be expanded to 1G||256M, which can be expanded to 1G|
|Suggested number of hosts||400~600||600~800|
|Temperature/Humidity||Temperature: 0℃-40℃; humidity: 10%-85%, no condensation|
|Power source’s characteristics||Voltage: 170～264VAC; Curent:10MAVoltage: -36～-72V
|Maximum power consumption||20W|
|Routing protocol||Supporting direct-through routes, static routes and default routes|
|Policy routing||Supporting flexible application schedule policies|
|Multi-WAN Policy||Supporting bandwidth cascading, intelligent path choosing, primary and secondary WANs, etc.|
|Link backup||Supporting auto switchover of multiple WANs|
|Line monitoring||Supporting the ICMP or DNS keepalive mechanism|
|Address transfer||Supporting the dynamic/static NAT and PAT|
|Virtual server||Supporting static port mapping, special mapping (SNAT+DNAT) and the DMZ host|
|NAT connection||Supporting to limit the total number of connections of the whole machine or of each userSupporting to limit the TCP and UDP connections respectively|
|DNS||Supporting DNS Client/ProxySupporting the peanuthull DDNS client|
|DHCP||Supporting DHCP server/client/relay|
|PPPoE||Supporting the PPPoE server and conducting IP-to-MAC binding, account freezing and speed limitationSupporting the PPPoE client|
|Page push||Supporting electronic whiteboard to turn over the HTTP pages and also supporting content customization|
|NTP||Supporting the SNTP network clock protocolSupporting policy management based on period and single time segment|
|Flexible speed limitation||Automatically judging whether the network is idle or busy and conducting flexible speed limitation according to different standards|
|Grouping speed limitation||Making user groups and designating different policies of speed limitation|
|Dynamic distribution||Automatically calculating the threshold of speed limitation|
|Multi-WAN||Limiting the speed of each WAN|
|P2P speed limitation||Supporting P2P identification on the application layer and limiting the corresponding speed without affecting normal services|
|User Management||Optional control policies such as user punishment, limitation and outburst flows|
|Real-time communication||Supporting to block the IM software like QQ and MSN by one key|
|P2P application||Identifying and controlling ten kinds of P2P programs such as BT, Thunder, PPStream and eMule|
|Website management||Supporting to block the entertainment, share and shopping websites by one keySupporting URL filtration and keyword filtration and so totally controlling user’s access|
|Priority service||Supporting the prior treatment to the E-mail of the enterprise, popular games and self-defined flow|
|Blacklist and White List||Supporting the blacklist and the white List so as to facilitate user’s control|
|Policy upgrade||Supporting free and online upgrade of the behavior management database|
|Firewall||Supporting the ACL firewall and blocking many frequent viruses on the basis of IP and port|
|DMZ port||Supporting to redefine the WAN1 port as the DMZ port and implementing safe networking|
|DoS attack prevention||Supporting to prevent SYN Flooding, UDP flooding, ICMP flooding and ARP flooding in the intranet and the public network
Preventing port or ARP scanning
|ARP security||Supporting static ARP binding, dynamic ARP binding and free regular ARP transmissionSupporting automatic monitoring and alarming of ARP cheatSupporting in-depth IMP filtration|
|VPN||Supporting multiple VPN protocols ( L2TP, PPTP, GRE, IPIP and IPSec) as well as protocol nesting|
|Graphic interface||Supporting Web interface management and providing fast wizardSupporting BIOS-based simple Web page and emergency recovery at incorrect operations|
|Network management protocols||Supporting SNMP V1/V2/V3|
|Fault diagnosis||Supporting the detection mode of the ICMP packets|
|Account management||Supporting the hierarchical management of account’s rights so as to fully secure the network|
|State monitoring||Supporting an overall and real-time display of the states of the port, system and user|
Typical application in hotels
BD-R3806/R4806 routers adopt mature, stable and cost-effective communication modules, so they can run reliably for a long time under harsh environments such as high temperature, poor ventilation and bad grounding and help the management of hotel’s network easily. According to the high mobility of the hotels, BAUDCOM specially designs PNP for hotel’s network, at the same time these routers support many QoS policies, which enable the guests of the hotels to experience happy Internet surfing.
Typical application in enterprises
BD-R3806/4806 routers provide various behavior control policies according to the office’s features. For example, they can identify and filter IM software like QQ and MSN, and shield P2P applications, and the entertainment, purchase or stock website on their own choice. At the same time, they provide versatile VPN technologies, for one, they support the static IP access and the dynamic PPPoE IP access, which is a sound solution for complicated remote networking.
Typical application in cyberbars
BD-R3806/4806 routers provide flexible multiline policies according to the requirements of cyberbars. They utilize “intelligent routing” to solve the access broadband bottleneck between Telcom A and Telcom B; they adopt “master/standby mode” to support automatic backup between multiple lines; they also support flexible bandwidth management to automatically check the network’s state so that they can use rate limit at the rush hour of a cyberbar to guarantee normal Internet surfing for everyone, or adopt loose rate-limit policies at the leisurely time to enjoy a happy Internet surfing experience.
|BD-R3806||64-bit gigabit broadband router with a multi-core platform (single core) (1 console port, 2 Ethernet 10/100/1000M WAN ports, 4 Ethernet 10/100/1000M LAN ports and 1 USB)||Request Price|
|BD-R4806||64-bit gigabit broadband router with a multi-core platform (dual cores) (1 console port, 2 Ethernet 10/100/1000M WAN ports, 4 Ethernet 10/100/1000M LAN ports and 1 USB)||Request Price|