![]() |
SHARE | ![]() |
![]() |
![]() |
![]() |
![]() |
|||||||||||||||||||||||||
| Overview | |||||||||||||||||||||||||
|
|||||||||||||||||||||||||
| The Vigor C510 series combines 4G LTE and 5G to provide excellent mobile coverage in Australia and New Zealand: | |||||||||||||||||||||||||
| 5G/LTE/WCDMA Specifications | |||||||||||||||||||||||||
| 5G NR Sub-6 SA Band: n1, 3, 7, 8, 20, 28, 38, 40, 77, 78 5G NR Sub-6 NSA Band: n1, 3, 7, 8, 20, 28, 38, 40, 77, 78 5G Max. Data Rate NR SA: 2.4Gbps (DL) / 900Mbps (UL)** 5G Max. Data Rate NR NSA: 3.4Gbps (DL) / 550Mbps (UL)** LTE FDD Band: B1, 3, 5, 7, 8, 20, 28 LTE TDD Band: B38, 40 LTE Category: Cat19 (DL) / Cat18 (UL) WCDMA (3G) Band: B1, 8 WCDMA Max. Data Rate: 42Mbps (DL) / 5.76Mbps (UL) |
|||||||||||||||||||||||||
**Typical 5G Downlink/Uplink speeds are 400Mbps/200Mbps, depending on the local conditions. |
|||||||||||||||||||||||||
| High-Performance 5G and WiFi 6 VPN Solutions with Powerful Security | |||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||
| The DrayTek Vigor C510 Series is a powerful line of single-WAN cellular routers engineered for high-speed 5G and 4G LTE network applications. Ideal for both businesses and remote professionals, the Vigor C510 delivers ultra-fast performance, robust security, and seamless connectivity in any environment. With Gigabit Ethernet, dual nano SIM slots, and WiFi 6 (AX3000) support, the Vigor C510 series ensures uninterrupted internet access with multi-WAN failover. Its advanced VPN capabilities allow secure remote access with IPSec, OpenVPN, and WireGuard. Featuring up to 3.4Gbps 5G download speeds, this router is built for high-performance applications, including VoIP, cloud services, and remote office deployments. Designed with an enterprise-grade firewall and content filtering, the Vigor C510 series provides comprehensive security against cyber threats. Flexible management options include web-based UI, SSH, and SNMP, making network administration effortless. For businesses requiring fast, reliable, and secure connectivity, the DrayTek Vigor C510 Series is the ideal networking solution. |
|||||||||||||||||||||||||
|
|||||||||||||||||||||||||
Interface |
|||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||
|
|||||||||||||||||||||||||
| 5G Router with High Speed Mobile Connectivity | |||||||||||||||||||||||||
|
|||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||
| Effortless and Secure VPN Access with EasyVPN | |||||||||||||||||||||||||
| Setting up a VPN can often be complex, involving protocol selection, manual configurations, and troubleshooting, especially for non-technical users. While Vigor routers support advanced VPN protocols such as IPsec, WireGuard, and OpenVPN, traditional setup methods can be time-consuming and daunting. EasyVPN simplifies this process by offering a streamlined, hassle-free solution for secure remote connectivity. With EasyVPN, users can quickly establish encrypted connections without the need to:
|
|||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||
IAM (Identity and Access Management) |
|||||||||||||||||||||||||
Vigor C510 Series with the new DrayOS5 is Zero Trust ready!IAM (Identity and Access Management) is a cybersecurity system that controls user access by managing digital identities, authentication, and authorisation, to ensure correct access to network resources such as applications and devices.With processes including identifying, authenticating, authorising users or groups, and assigning appropriate levels of access, IAM enhances both security management and the user experience and plays an important role in cloud-based services. The IAM solution from Vigor C510 is Zero Trust Ready, and allows you to grant and categorise user privileges, create and manage access policies, and define large-scale group policies that integrate multiple filtering rules and traffic-shaping settings.Users & Groups
![]() Access PoliciesSystem administrators can create access policies for the local users in this tab. The access policies can be configured based on:
![]() Group PoliciesGroup policies can be configured for predefined local resources such as employees, workstations, network printers, and local servers. Network Firewall and traffic shaping policies can be configured to enhance network security and optimise traffic flows.Conditional Access Policy Conditional access policies can be configured to request users to provide multiple forms of authentication before granting appropriate access to a resource.
Resources Tab Configure local resources such as IP and Mac addresses for workstations, network printers, PBX systems, NVR systems, servers, etc. Hotspot Web Portal DrayTek’s Hotspot Web Portal offers a fully customizable Wi-Fi login experience with multiple authentication methods, including username/password, social media login, and voucher-based access. It also supports quotation management, Wi-Fi marketing tools for promotions, and custom branding options to enhance user engagement and brand visibility. Account Status The Account Status feature includes brute force protection, which automatically logs key details such as the attacking IP address, targeted username or profile, and the service under attack. It also tracks the protection duration, recording the start and end times of the block, along with the total number of attempted hits. Backup and Restore Easily back up or restore router settings, including Users and Groups, Access Policies, Group Policies, and more. For added security, password protection can be applied during the backup and restore process to prevent unauthorised access. ![]() |
|||||||||||||||||||||||||
URL Reputation |
|||||||||||||||||||||||||
|
URL Reputation is a cloud-based threat intelligence service that adds an extra layer of security to protect LAN clients during their online activities. With a total of 82 content categories, including 10 security-focused ones, it provides comprehensive and up-to-date protection for both home and business networks. These categories cover a wide range of areas—from malware, spyware, and adware, to parental controls, business productivity, and social networking—helping to create a safer online environment, enhance employee productivity, and support efficient bandwidth management. IP ReputationEvery internet communication involves source and destination IP addresses. Cybercriminals often exploit known malicious IPs to launch attacks using various techniques, including:
IP Reputation helps identify and block traffic from these high-risk IP addresses, adding an essential layer of network protection against cyber threats.Blocking communication with malicious IP addresses is critical for network security. However, relying on static blocklists is no longer effective, as they lack the real-time, predictive intelligence needed to combat evolving threats. The IP Reputation Service addresses this challenge by delivering dynamic, real-time scoring and classification of IP addresses. It enables the automatic blocking of:
The system evaluates IPs based on multiple factors, including infection history, protocol behaviour, and attack frequency. Each IP is assigned a reputation score, which determines whether it should be trusted, monitored, or blocked, ensuring proactive and intelligent network protection. You can purchase a URL Reputation B card for your VigorC510 series
|
|||||||||||||||||||||||||
Vigor C510ax 5G Cellular Router with AX3000 (WiFi 6) Capacity |
|||||||||||||||||||||||||
The Vigor C510ax is a high-performance 2×2 dual-band WiFi 6 and 5G cellular router, delivering blazing-fast wireless connectivity with 160MHz channel bandwidth and 1024-QAM modulation for significantly increased throughput. With theoretical speeds of up to 3000Mbps—574Mbps on the 2.4GHz band and 2402Mbps on the 5GHz band, it offers up to 2.5 times the speed of a standard 802.11ac 2×2 dual-band router. OFDMA (Orthogonal Frequency Division Multiple Access). |
|||||||||||||||||||||||||
|
OFDM |
|||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||
|
OFDMA |
|||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||
|
MU-MIMO functions by transmitting data to multiple users simultaneously, much like several delivery trucks operating in parallel. This improves overall network capacity and boosts individual user speeds. |
|||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||
|
BSS Colouring Instead of CSMA/CA which allows only one device to transmit at a time, 802.11ax uses BSS Colouring to manage collision avoidance. Each Wi-Fi device is assigned a Basic Service Set (BSS), a 6-bit colour field, while adjacent devices are allocated with different colours. Before transmitting, the device checks the BSS and backs off only when the BSS is of the same colour as its own. In this way, the spectral efficiency is maximized as APs and Wi-Fi clients can transmit simultaneously even if they are on the same channel. |
|||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||
|
TWT (Target wake time) Devices negotiate with the AP for a Target Wake Time (TWT), or joint a TWT broadcast session, and transmit data only when the TWT arrives, thereby reducing power consumption and increase network efficiency. |
|||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||
|
WPA3 (Wi-Fi Protected Access 3) enhances the security of Wi-Fi networks by addressing vulnerabilities in previous standards (WEP, WPA and WPS2) and introduces new features including stronger authentication, better encryption, and improved protection against attacks such as brute-force password guessing and man-in-the-middle exploits. DrayTek’s WiFi 6 encryption:
The comparison table below compares security design of Wi-Fi security protocols WEP, WPA, WPA2 and WPA3.
|
|||||||||||||||||||||||||
|
AP-Assisted Roaming – built-in in selected Wi-Fi Vigor Routers and all Vigor Access Points |
|||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||
Extend Transmission RangeWhen a Wi-Fi client moves out of its effective transmission range which is defined by the Basic Rate and/or Received Signal Strength threshold, the AP forces the Wi-Fi client to pick up a nearby access point with stronger signals thereby extending the range. Improve Data RatesWhen the “Minimum RSSI with Adjacent AP” option is set, APs or routers on the same local subnet will exchange client information with each other and switch to the AP or router that has the strongest signal, ensuring that data rates can be as good as possible. Better User ExperienceInstead of ineffective transmission with low basic rates or RSSI, the better links provide better user experience while saving the airtime. No Controller RequiredAssisted Roaming is a built-in feature in all Vigor Access Points and a number of Wi-Fi routers; it saves the need for an ad-hoc wireless controller and is an ideal solution for simple network deployments. |
|||||||||||||||||||||||||
Mesh Wi-Fi
|
|||||||||||||||||||||||||
|
Vigor C510ax supports up to 7 APs, which can form one or more Wireless Groups. Each group can form Mesh links automatically based on the optimum signal level among the APs and devices. |
|||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||
| Key Features | |||||||||||||||||||||||||
|
|
|||||||||||||||||||||||||
| Wireless Management Solution | |||||||||||||||||||||||||
Mesh (ax model) |
|||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||
| Up to 7 APs | |||||||||||||||||||||||||
|
|||||||||||||||||||||||||
Virtual AP Controller |
|||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||
| Up to 20 VigorAPs | |||||||||||||||||||||||||
|
|||||||||||||||||||||||||
Device Management |
|||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||
| View and Configure VigorAPs | |||||||||||||||||||||||||
|
|||||||||||||||||||||||||
|
Switch Management Solution |
|||||||||||||||||||||||||
SWM |
|||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||
|
Virtual Switch Controller |
|||||||||||||||||||||||||
Device Management |
|||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||
|
Display VigorSwitch name, MAC address, IP address, Firmware Version, Model, Online Status, System Uptime, Port in Use, Clients, and Last Process Status. |
|||||||||||||||||||||||||
Port Profile |
|||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||
|
Create profiles that include general settings, VLAN, GVRP, Multicast STP, and QoS settings, which can be applied to the managed switch. |
|||||||||||||||||||||||||
Maintenance |
|||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||
|
Perform maintenance tasks for selected VigorSwitch. Tasks include Configuration backup and restore, Remote Reboot and Factory Reset of the selected switch. |
|||||||||||||||||||||||||
| Software Management | |||||||||||||||||||||||||
VigorACS 3 |
|||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||
|
|||||||||||||||||||||||||
|
In-the-box |
|||||||||||||||||||||||||
|
|||||||||||||||||||||||||
Note :The throughput figures are maximum, based on DrayTek internal testing with optimal conditions. The actual performance may vary depending on the different network conditions and applications activated |
|||||||||||||||||||||||||
| Config Demo | |||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||
|
Click below for the Config Demo Page: |
|||||||||||||||||||||||||
|
|||||||||||||||||||||||||
|
|||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||
|