Home How it Works Hardware Draytek 2820N
Routers - Draytek 2820N PDF Print E-mail

Draytek 2820N

ADSL2+ N wireless router with 2nd Ethernet WAN

The Vigor2820 is an ADSL2+ router with 2nd Ethernet WAN. This 2nd WAN can connect to DSL/Cable modem or fiber media converter for policy-based load-balance, fail-over and BoD; it also features advanced bandwidth control mechanisms such as IP-layer QoS, NAT Session Limitation, Bandwidth Borrowed, etc., to allow easy, flexible and reliable access control and bandwidth management.
With hardware-based implementation of the VPN protocol, the Vigor2820 supports up to 32 VPN tunnels using advanced protocols such as IPSec / PPTP / L2TP / L2TP over IPSec with AES / DES / 3DES for encryption and MD5 / SHA-1 for authentication.
The SPI firewall uses Object-Based design to make setting of firewall policies easy. The CSM feature allows more precise and efficient access control for URL / Web Content Filtering, IM and P2P applications.
Vigor2820 model complie with IEEE802.11n standards. They support WEP / WPA / WPA2, encryption and MAC Address Control, Wireless LAN Isolation, Multi SSID and 802.1x authentication. The Wireless Rate Control function can adjust the data rate of each wireless station (client). WDS can help users to extend wireless coverage easily.


1. ADSL Compatibility ANSI T1.413 Issue2
ITU-T G.992.1 G.dmt
ITU-T G.992.2 G.lite
ITU-T G.992.3 ADSL2 G.dmt.bis
ITU-T G.992.5 ADSL2+
Annex L (READSL)
Annex M
2. ATM Protocols (DSL) RFC-2684 / RFC-1483 Multiple Protocol over AAL5
RFC-2516 PPP over Ethernet
RFC-2364 PPP over AAL5
PPPoE Pass Through LAN / WLAN
PPPoE / PPPoA Relay
Transparent Bridge for MPoA
3. Dual WAN Outbound Policy-based Load-balance
BoD (Bandwidth On Demand)
WAN Connection Fail-over
4. Wireless Access Point IEEE802.11n Compliant
Wireless Client List
Wireless LAN Isolation
64 / 128 bit WEP
Hidden SSID
Mac Address Access Control
Access Point Discovery
Multiple SSID
Wireless Rate-control
WMM (Wi-Fi Multimedia)
WDS (Wireless Distribution System)
802.1X Authentication *
5. VPN Up to 32 VPN Tunnels
Protocol :
L2TP over IPSec
Encryption :
Hardware-based AES
Hardware-based MD5
IKE Authentication :
Pre-shared Key
Digital Signature (X.509)
LAN-to-LAN , Teleworker-to-LAN
NAT-Traversal (NAT-T)
Dead Peer Detection (DPD)
VPN Pass-through
6. Firewall Policy-based Firewall
CSM (Content Security Management) for IM / P2P Application and URL / Web Content Filter
Multi-NAT / DMZ Host / Port-Redirection / Open Port
SPI (Stateful Packet Inspection) (Flow Track)
DoS / DDoS Prevention
IP address Anti-spoofing
E-Mail Alert and Logging via Syslog
IP and MAC Binding
7. Bandwidth Management QoS :
Class-based Bandwidth Guarantee by User-Defined Traffic Categories
DiffServ Code Point Classifying
4-level Priority for Each Direction (Inbound / Outbound)
Bandwidth Borrowed
Bandwidth / Session limitation
8. WAN Protocol (WAN2) DHCP Client
Static IP
L2TP *
9. Network Feature Port-based VLAN
DNS Cache / Proxy
DHCP Client / Relay / Server
IGMP Proxy
Dynamic DNS
NTP Client
Call Scheduling
Routing Protocol :
Static Routing
10. USB 3G USB Modem (3G only can act as WAN2)
USB Printer
11. Network Management Web-based User Interface (HTTP / HTTPS)
Quick Start Wizard
CLI (Command Line Interface , Telnet / SSH)
Administration Access Control
Configuration Backup / Restore
Built-in Diagnostic Function
Firmware Upgrade via TFTP / FTP / HTTP / TR-069
Logging via Syslog
SNMP Management MIB-II
12. Support Smart Monitor Up to 30 PCs

Want UK TV in France?

Click Here