* The AP Management can work with VigorAP 800, VigorAP 810, and VigorAP 900.
Vigor2860 series security firewall routers have built-in VDSL2/ADSL2+ modem, plus a second Ethernet WAN port for Cable or Satellite broadband, and 2 USB ports for 3G/4G mobile broadband access. With the multi-WAN accesses, Vigor2860 series router supports multi-wan fail-over and load-balancing for USB WANs, VDSL2/ADSL2+, FTTx broadband. If your premise can not subscribe fixed broadband line, you can rely on the 3G/4G LTE (connected to USB WANs) as primary connection.
The specifications cover many functions that are required by modern day businesses, including secure but easy to apply firewall, comprehensive VPN capability, Gigabit LAN ports, USB ports for 3G/4G mobile dongles, FTP and Samba server and network printers, VLAN for flexible workgroup management, and much more.
The Vigor2860 Series provides you with different levels of security including authentication (802.11x), encryption (up to WPA2) and methods such as DHCP fixing to restrict access to authorized users only and Mac address locking. Through the Web User Interface (WUI), you can see how many and which clients are currently connected and how much bandwidth usage they consume.
The wireless VLAN function lets you isolate wireless clients from each other or from the “wired” LAN. You can set certain password for your guest to let guests access your WLAN with “password”. The Web-portal setup (log-in) can let you have four rules along with 4 multiple SSIDs. When users connect to your WLAN, they will be directed with your log-in screen before any Internet access is permitted. You can customize your Web-portal setup (log-in) page.
The multiple SSID features can let your network administrator set up four common or distinct virtual wireless access points. e.g. those with SSID1 can access to your ERP, those with SSID2 can surf internet. With the button of WPS (Wi-Fi protected setup), your client PC can get its security keys by pressing the WPS button on front of the router. There are several wireless channels for you to choose the best channel where is with the least congested wireless traffic.
DrayTek Vigor2860 series are implemented with AP Management to facilitate deployment of multiple VigorAP 810 SOHO-level access point and VigorAP 900 enterprise-level access point. You can have overview over the status of multiple APs. For multiple wireless clients, to apply the AP Load Balancing to the multiple APs will manage wireless traffic with smooth flow and enhanced efficiency.
The Gigabit Ethernet WAN port caters for any type of Internet access, including ADSL, Cable or Satellite broadband. You can then use both WAN 1 and WAN 2 for Fail-over, ensuring that you will always have an access to the Internet even if one of the WAN fails, or for Load Balancing so the 2 WANs share Internet traffic requirements of your organization.
For remote teleworkers and inter-office links, Vigor2860 Series provide up to 32 simultaneous VPN tunnels (such as IPSec/PPTP/L2TP protocols) for secure data exchange and communication. With a dedicated VPN co-processor, the hardware encryption of AES/DES/3DES and hardware key hash of SHA-1/MD5 are seamlessly handled, thus maintaining maximum router performance. Teleworkers can be authenticated directly with your LDAP server if preferred. The Vigor2860 Series are equipped physical DSL port and Gigabit Ethernet port for WAN load-balancing and backup. The VPN trunking (VPN load-balancing and VPN backup) are hence implemented on Vigor2860 Series. With VPN trunking, you can create multiple WAN connections to a remote site in order to increase bandwidth. The VPN trunking also can allow you to have failover (backup) of VPN route through a secondary WAN connection.
With SSL VPN, Vigor2860 Series let teleworkers have convenient and simple remote access to central site VPN. The teleworkers do not need to install any VPN software manually. From regular web browser, you can establish VPN connection back to your main office even in a guest network or web cafe. The SSL technology is same as the encryption that you use for secure web sites such as your online bank. The SSL VPNs can be operated in either full tunnel mode or Proxy mode. After F/W 3.7.3, the Vigor2860 series allow up to 16 simultaneous incoming users.
With F/W 3.7.3, the embedded Central VPN Management (CVM) will let network administrator register up to 16 remote routers but run concurrent remote management over 8 remote routers.
APM provides the 3-step installation, plug-plug-press, and then wireless clients are able to enjoy surfing internet. Moreover, through the unified user interface of Draytek routers, the status of APs is clear at the first sight.
If your network requires several VigorAP900 or VigorAP 810 units, to centrally manage and monitor them individually as a group will be expected. DrayTek central wireless management (AP Management) lets control, efficiency, monitoring and security of your company-wide wireless access easier be managed. Inside the web user interface, we call “central wireless management” as Central AP Management which supports mobility, client monitoring/reporting and load-balancing to multiple APs. For central wireless management, you will need a Vigor2860 or Vigor2925 Series router; there is no per-node licensing or subscription required. For multiple wireless clients, to apply the AP Load Balancing to the multiple APs will manage wireless traffic with smooth flow and enhanced efficiency.
With the 6-port Gigabit switch on the LAN side provides extremely high speed connectivity for the highest speed local data transfer of any server or local PCs. The tagged VLANs (802.1q) can mark data with a VLAN identifier. This identifier can be carried through an onward Ethernet switch to specific ports. The specific VLAN clients can also pick up this identifier as it is just passed to the LAN. You can set the priorities for LAN-side QoS. You can assign each of VLANs to each of the different IP subnets that the router may also be operating, to provide even more isolation. The said functionality is tag-based Multi-subnet.On the Wireless-equipped models (Vigor2860n/Vigor2860n plus/Vigor2860Vn-plus) each of the wireless SSIDs can also be grouped within one of the VLANs.
The subnets also support non-NAT mode, so that Vigor2860 can be deployed in a network that does not require NAT, such as an MPLS network.
We support Dual Stack (PPP, DHCPv6 Client, Static IPv6, 6rd) and Tunnel Mode (TSPC, AICCU, 6in4 static-tunnel) to let your business operation successfully be migrated to the era of IPv6.
Because the IPv4 addresses are limited and IPv6 allows for a larger address space and much more efficient routing. The Vigor2860 Series support IPv6 and IPv4. The Vigor2860 Series can support IPv6 broker/tunnel services to provide IPv6 access using either AICCU or TSPC via 3rd party IPv6 providers if your ISP does not support IPv6 yet.
Through mobility, brought by cellular networks, you can connect 3.5G/4G USB mobile to 2.0 version USB port on Vigor2860 series. This can be a backup broadband connection if the primary fixed line drops. You can connect USB disk or hard-drive to USB port for memory storage and file sharing. The Vigor2860 Series provide you with FTP access file uploading/downloading, which can be used from the local LAN or from anywhere on the Internet. The access can be using "username and password" or 'public'. Each of them can have their own directories and/or file access rights. The VDSL2/ADSL2+ interface, Gigabit Ethernet interface and USB mobile can be used either for WAN-backup or load balancing.
DrayTek Vigor2860 Series inherited versatile firewall mechanism from previous Vigor series routers. The object-based design used in SPI (Stateful Packet Inspection) firewall allows users to set firewall policy with ease. Object-based firewall is flexible and allows your network be safe. DoS prevention and URL/Web content filter strengthen the security outside and control inside. The enterprise-level CSM (Content Security Management) enables users to control and manage IM(Instant Messenger) and P2P (Peer-to-Peer) applications more efficiently. The CSM hence prevents inappropriate content from distracting employees and impeding productivity. Furthermore, the CSM can keep office networks threat-free and available. By adoption of the world-leading CYREN GlobalView Web Content Filtering, you can block whole categories of web sites (e.g. sports, online shopping), subject to an annual subscription to the CYREN GlobalView WCF, which is timely updated with changed or new site categorizations. A free 30-day trial can be activated via activation wizard of WUI. The "User Management" implemented on your router firmware can allow you to prevent any computer from accessing your Internet connection without a username or password. You can set scheduler or maximum usage time to your employees within office network. The user accounts can also be restricted by any other aspect of the firewall rule on a user-by-user basis. Vigor2860 Series support DrayTek’s SmartMonitor network traffic analyzer (up to 30 users), which captures actual live data of activities in your managed network, such as the content of MSN entering to or out of your network. You can track specified files download/upload or view statistics on data type activities to realize what corporate related information have been released accidentally or on purpose.
It supports multiple SIP Registrars with high flexible configuration and call handing options. You can connect your regular analogue line (PSTN/POTS*) to the Line port of Vigor2860 Series. While you enable VoIP facility, you still can access fixed line (analogue line) to make calls just by dialing #0. The phone connected to two FXS ports (via analogue phone adapter) can be used for both analogue calls and VoIP calls because the incoming calls are automatically switched through to your telephone(s) (either one or both). As a result, both analogue telephones plugged into your router allow you to access VoIP and analogue line. Furthermore, you can set rules through "Digit Map" function about particular call destinations using either your SIP/VoIP service or the POTS line.
e.g. you can route local calls via your PSTN line (if you have a free calls package) whereas international calls go via your preferred VoIP provider; there is flexibility to have several Digit Map rules.
(The VDSL2/ADSL2+ interface, Gigabit Ethernet interface and USB mobile can be used either for WAN-backup or load balancing.)
* Firmware Upgradable
This feature helps business isolate different work groups, preventing important and valuable information from any leakage.
On the Wireless-equipped models, each of the wireless SSIDs can also be grouped within one of the VLANs.
The scope of application of privacy protection policy
Personal data collection, processing and use
When you visit this website or use the functional services provided on this website, we will ask your necessary personal information and use it within that specific purpose; without your agreement in writing this website will not use your personal data for any other purpose.
When you use interactive features such as mailboxes and surveys, this site will retain your name, e-mail address, contact information and usage time.
In normal browsing, the server will record the relevant actions, including the IP address of the device you are using, the time of use, the browser you are using, the browsing and data logging, etc., as a reference for our website services. This record for internal applications will not be announced.
Statistics and analysis of collected questionnaires, statistics or descriptive text of the results will be provided for accurate service. In addition to internal research, statistical data and descriptive text will be published if it is necessary. The information published excludes information on specific individuals.
The protection of information
The website hosts are equipped with firewall, anti-virus system and other related information security equipment and the necessary security measures to protect the site and your personal information with strict protection measures. Only authorized personnel can access your Personal data. The relevant processing personnel are signed confidentiality contract, if there is breach of confidentiality obligations, will be subject to the relevant legal punishment.
In the event that it is necessary to entrust other units to provide services for business purposes, the Site will strictly require compliance with the confidentiality obligations and take the necessary inspection procedures to ensure that it will comply.
External links to the site
The policy of sharing personal information with the third party
This website will not provide, exchange, rent or sell any of your personal information to other individuals, groups, private enterprises or public agencies. However the legal basis or contractual obligations are excluded.
The foregoing proviso includes, but not limited to:
The use of Cookie
Please read this Term of Use Agreement ("Terms") carefully before you register to get the Firmware and Technical article Update Notice.
Acceptance of Terms
Privacy and Protection of Personal Information
Third Party Sites
The service may contain links to other Internet websites or online and mobile services provided by independent third parties.
These Terms shall be governed and construed in accordance with the laws of Taiwan, without regard to its conflict of law provisions.
If you have any questions about these Terms, please contact us.