TR-3605 Router

Product Overview

 Techroutes 3605, adopting mature processors such as ARM and 1XP and designed with professional switching chips, are cost-effective and comprehensive broadband routers developed by Techroutes for small- or medium-sized cybercafés, enterprise and undertakings. This series of broadband products are strong in data processing, flexible in a variety of mainstream bandwidth access environments and various in providing sound bandwidth distribution solutions, all of which are means of effective utilization of bandwidth resources. In addition, these products can provide network behavior management, P2P control, VPN networking, firewall, ARP cheat prevention and vicious attack prevention.

Techroutes 3605 routers integrate with such features as multiline, NAT, security and flexible rate limit, and therefore they are a set of all-in-one solutions. These products can be widely applied in Internet clubs, enterprises, hotels .

Flexible multi-WAN access

 A maximum of 4 WAN ports can be used for networking; the access modes such as Ethernet, FUR optical fiber, ADSL and cable are supported; the multi-line policies such as “bandwidth nesting”, “intelligent routing” and “master/stand by” are supported.

User-friendly and flexible flow control Resides providing multiple users the broadband

NAT network surfing, this router series supplies flexible speed limitation strategy. When the network bandwidth is idle, the bandwidth of each user will be automatically increased; when the network bandwidth is busy, the bandwidth will be averagely distributed, preventing bandwidth from being over- occupied. The assistant strategies such as big-flow host limitation mechanism, flow outburst factors and optional user punishment / limitation bring various and feasible methods for network

Multiple anti-attack policies

Techroutes broadband routers are strong in preventing attacks. They can make a correct statistics and detailed analysis on all types of packets such as ARP, IP, 1CM P. TCP and UDP. The attacks can be automatically prevented once they are found. The alarm information will also be provided. Therefore, you need not worry about the security of your network.

For ARP cheat, TECHROUTES provides IP-to MAC binding, ARP-to-SCAN technology and free ARP and other mechanisms to secure the intranet; If working with TECHROUTES private switching products, these router products can be armed

User-friendly Web page

A simple and clear Web graphic interface is provided for configuration, so you can easily operate it even you are not professional.

All-round VPN funtions

Techroutes routers support VPN protocols such as L2TP, PPTP, GRE, IPIP and IPSec, and provide encryption algorithms, so that an overall solution can be provided to the construction of the remote office, the mobile office and the virtual private

Technical Specification




Standard Interface





Default Optional

2*100M WAN+3*100M LAN to 4 WAN



1XP 533MHz


16MB up to 32MB


128MB,up to 256MB

Physical Characters




Working Temperature: 0°C ~ 40°C;

Humidity: 10% ~85% ,no condensation

Power Source Consumption

170 ~ 264V AC, 10mA or -36 ~ -72V DC, 1A 15W

Routing & Backup

IP Routing

Static route and PBR


Load sharing,intelligent path choosing,primary and secondary WANs,etc.

Line Backup

Port/Line based backup

Line Monitoring

ICMP or DNS based detection

Network Protocols


Dynamic/Static NAT and PAT

Virtual Server

Static port mapping,special mapping (SNAT+DNAT), DM7 host





DNS Client/Proxy,DDNS


DHCP serer/client/relay


PPPoE server/client


Page push



Intelligent rate-limit

Bandwidth load based intelligent rate-limit

Grouping rate-limit

Group/policy based rate-limit

Dynamic distribution

Automatically calculating based rate-limit


WAN based rate-limit

P2P rate-limit

Intelligent P2P application rate-limit

User Management

Punishment, limitation, outburst flows

Behaviour Management

7-layer filtration

Basing on the characteristic code on the application layer, identifying and controlling P2P download, VOD, HTTP and Email, and limiting or guaranteeing the bandwidth

Real-Time Communication

Supporting to block the 1M software like QQ ans MSN by one key

P2P application

Identifying and controlling ten kinds of PZP programe such as BT,Thunder,PP Stream

Website management

Supporting to block the entertainment, share and shopping websites by one key

Supporting URL filtration and keyword filtration and so totally controlling user’s access

Priority service

Supporting to first process company’s Emails, hot network games, common 0A databases and self-defined flows (based on characteristic identification according to the_application_layer)

Black/white List

Supporting the blacklist and the white List so as to facilitate user’s control

Policy upgrade

Supporting free and online upgrade of the behavior management database

Network Security


Supporting the ACL firewall and blocking many frequent viruses on the basis of IP and port

DMZ Port

Supporting to redefine the WAN1 port as the DMZ port and implementing safe networking

DoS attack prevention

Supporting to prevent SYN Flooding, UDP flooding, ICMP flooding and ARP flooding in the intranet and the public network Preventing_port_or ARP_scanning

ARP security

Supporting static ARP binding, dynamic ARP binding and free regular ARP transmission

Supporting automatic monitoring and alarming of ARP cheat

Supporting in-depth IMP filtration


Supporting multiple VPN protocols (L2TP, PPTP, GRE, IP IP and IPSec) as well as protocol nesting


Graphics Interface

Supporting Web interface management and providing fast wizard Supporting BIOS-based simple Web page and emergency recovery at incorrect operations

Supporting SNMP V1/V2/V3

Network management Fault diagnosis

Supporting the detection mode of the ICMP packets

Account management

Supporting the hierarchical management of account’s rights so as to fully secure the network

State monitoring

Supporting an overall and real-time display of the states of the port, system and user


Sitemap | Terms of Use | Privacy Policy