Your browser does not support JavaScript. Please turn it on for the best experience.
T3700G-28TQ
En savoir plus
T2600G-52TS
T2600G-28TS
T1600G-28TS
T1600G-28PS
TL-SG2210P
TL-SG2008
TL-SG1016DE
TL-SG108E
TL-SG105E
TL-SF1005D
TL-SG105
TL-SG108
TL-SG1016D
TL-SG1024D
TL-SG1048
TL-POE150S
TL-POE10R
TL-SM311LS
TL-POE200
EAP110
CPE510
CPE210
TL-ER6120
TL-ER6020
TL-R600VPN
TL-ER5120
TL-R480T+
TL-R470T+
Omada Cloud Software Defined Networking (SDN)
Omada’s Software Defined Networking (SDN) platform integrates network devices, including access points, switches and gateways, providing 100% centralized cloud management. Omada creates a highly scalable network—all controlled from a single interface. Seamless wireless and wired connections are provided, ideal for use in hospitality, education, retail, offices, and more.
Omada WiFi 6 (802.11ax)
Need to deploy stable Wi-Fi in high-density environment? Try Omada Wi-Fi 6 technology! Omada Wi-Fi 6 access points greatly improve experiences in high-density environments, and provides faster speed and greater range for more devices.
WPA3, the Newest Security Protocol
Want to enhance the network security in public WiFi and home WiFi? Try TP-Link WPA3 technology! To maximum the safety of enterprise and your home WiFi, TP-Link is inserting WPA3, the latest encryption technology, into Omada access points, WiFi routers, range extenders, and more devices.
Pharos Long-Range Wireless
Need to transmit network to long range or remote areas? Try Pharos wireless solution! Pharos is TP-Link's next-generation outdoor product series, providing long-range outdoor wireless networking solutions for applications such as WISP, Enterprise Bridge (P2P), and Wireless Surveillance (PtMP).
MAXtream
Worried about buffering when using outdoor wireless broadband? Try TP-Link MAXtream technology! MAXtream, the breakthrough TDMA technology, makes outdoor AP smoother and produces more efficient communications.
MU-MIMO
Facing the annoying latency when multiple devices connected? Try TP-Link MU-MIMO technology! MU-MIMO solves this problem by creating multiple simultaneous connections to serve several users with multiple data streams at the same time.
Power over Ethernet (PoE)
Need to deploy your surveillance cameras in your farm? Try TP-Link PoE technology to transmit power and data through one single Ethernet cable.
LiteWave Unmanaged Switches
Need to work at home or expand your wired connections? Try TP-Link LiteWave Switches! The TP-Link LiteWave Unmanaged Switches provide the simplest and most affordable way to expand your wired network. Just plug and play!
JetStream 10G Smart Switches
Provide high levels of performance, scalability, and cost-effectiveness that SMBs require from their 10G networking solutions.
Partner Program
Learn MoreBecome a Partner
Training & Certification
Learn MoreStart Training
Case Study
Find the Stories
Solution
Retour
Products
Technologies
Partners
Support
All Support
Configuration Guide
Download Center
Technical Support
FAQs
Replacement & Warranty
TP-Link Emulators
GPL Code Center
Community
Protecting our customers from threats to their security is always an important task for TP-Link. As a key player in global Networking and Smart Home markets, we will do our utmost to provide our users with secure stable products and services, and to strictly protect the privacy and security of their data.
We welcome and encourage all reports related to product security or user privacy. We will follow established processes to address them and provide timely feedback.
We strongly encourage organizations and individuals to contact TP-Link’s security team to report any potential security issue.
TP-Link will need to obtain detailed information about the reported vulnerability to more accurately and quickly begin the verification process. We strongly recommend submitting a vulnerability report according to the template we provide above.
TP-Link supports encrypted messages using Pretty Good Privacy (PGP)/GNU Privacy Guard (GPG) encryption software.
1. All parties to a vulnerability disclosure should comply with the laws of their country or region.
2. Vulnerability reports should be based on the latest released firmware, and preferably written in English.
3. Report vulnerabilities through the dedicated communication channel. TP-Link may receive reports from other channels but does not guarantee that the report will be acknowledged.
4. Adhere to data protection principles at all times and do not violate the privacy and data security of TP-Link's users, employees, agents, services or systems during the vulnerability discovery process.
5. Maintain communication and cooperation during the disclosure process and avoid disclosing information about the vulnerability prior to the negotiated disclosure date.
6. TP-Link is not currently operating a vulnerability bounty program.
Awareness & Receipt
Verification
Remediation
Notification
TP-Link encourages customers, vendors, independent researchers, security organizations, etc. to proactively report any potential vulnerabilities to the security team. At the same time, TP-Link will proactively obtain information about vulnerabilities in TP-Link products from the community, vulnerability repositories and various security websites. In order to be aware of vulnerabilities as soon as they are discovered.
TP-Link will respond to vulnerability reports as soon as possible, usually within five business days.
TP-Link Security will work with the product team to perform a preliminary analysis and validation of the report to determine the validity, severity and impact of the vulnerability. We may contact you if we need more information about the reported vulnerability.
Once the vulnerability has been identified, we will develop and implement a remediation plan to provide a solution for all affected customers.
Remediation typically takes up to 90 days and in some cases may take longer.
You can keep up to date with our progress and the completion of any remediation activities.
TP-Link will issue a security advisory when one or more of the following conditions are met:
1. The severity of the vulnerability is rated CRITICAL by the TP-Link security team and TP-Link has completed the vulnerability response process and sufficient mitigation solutions are available to assist customers in eliminating all security risks.
2. If the vulnerability has been actively exploited and is likely to increase the security risk to TP-Link customers, or if the vulnerability is likely to increase public concern about the security of TP-Link products, TP-Link will expedite the release of a security bulletin about the vulnerability, which may or may not include a full firmware patch or emergency fix.
Click to submit a security-related inquiry regarding one of our products to TP-Link Technical Support.
Contact Technical Support
[2492] Vulnérabilité d'exécution de code à distance du RE365 / RE360 / RE500 / RE650
[2278] Sécurité - Malware GhostDNS
[2276] Vulnérabilité d'exploitation à distance
[2217] Avis de sites Web affiliés frauduleux et non TP-Link
[2213] VPNFilter - Sécurité contre les logiciels malveillants
[2166] Correction des vulnérabilités des TL-WR740N et TL-WR940N
[1970] Etat sur la faille de sécurité WPA2 (KRACK)
[1595] Remédier aux vulnérabilités du M5350
SubscriptionTP-Link prend votre vie privée au sérieux. Pour plus de détails sur la politique de confidentialité de TP-Link, veuillez consultez la page suivante Politique de confidentialité de TP-Link .
Je souhaite recevoir la newsletter TP-Link France afin de découvrir ses nouveautés produits et ses offres promotionnelles.
En cochant cette case, je confirme avoir pris connaissance de notre Politique de confidentalité.
S'enregistrer
Suivez nous
De United States?
Infos produits, événements, services pour votre pays.
Ce site Web utilise des cookies pour améliorer la navigation sur le site Web, analyser les activités en ligne et offrir aux utilisateurs la meilleure expérience sur notre site Web. Vous pouvez vous opposer à tout moment à l'utilisation de cookies. Vous pouvez obtenir plus d'informations dans notre politique de confidentialité .
Cookies basiques
Ces cookies sont nécessaires au fonctionnement du site Web et ne peuvent pas être désactivés dans vos systèmes.
Fenêtre contextuelle de sélection de site
accepted_local_switcher
Système de sélection de produits pour PME
tp_smb-select-product_scence, tp_smb-select-product_scenceSimple, tp_smb-select-product_userChoice, tp_smb-select-product_userChoiceSimple, tp_smb-select-product_userInfo, tp_smb-select-product_userInfoSimple
Chat en direct
__livechat, __lc2_cid, __lc2_cst, __lc_cid, __lc_cst, CASID
Youtube
VISITOR_INFO1_LIVE, YSC, LOGIN_INFO, PREF, CONSENT, __Secure-3PSID, __Secure-3PAPISID, __Secure-3PSIDCC
Cookies d'analyse et marketing
Les cookies d'analyse nous permettent d'analyser vos activités sur notre site Web pour améliorer et ajuster les fonctionnalités de notre site Web.
Les cookies marketing peuvent être définis via notre site Web par nos partenaires publicitaires afin de créer un profil de vos intérêts et pour vous montrer des publicités pertinentes sur d'autres sites Web.
Google Analytics & Google Tag Manager & Google Optimize
_gid, _gat, _gat_global, _ga, _gaexp
Google Ads et DoubleClick
NID, IDE, test_cookie, id, 1P_JAR
Facebook
fr, spin, xs, datr, c_user, sb, _fbp
Crezzag
_ce.s, _CEFT, _gid, cean, _fbp, ceac, _drip_client_9574608, cean_asoc
Hotjar
_hjKB, _fbp, ajs_user_id, _BEAMER_LAST_UPDATE_zeKLgqli17986, _hjid, _gcl_au, _ga, ajs_anonymous_id, _BEAMER_USER_ID_zeKLgqli17986, _hjAbsoluteSessionInProgress, _hjFirstSeen, _hjIncludedInPageviewSample, _hjTLDTest
Baidu
Hm_lpvt_33178d1a3aad1dcf1c9b345501daa675, Hm_lvt_33178d1a3aad1dcf1c9b345501daa675, HMACCOUNT_BFESS
Linkedin
lms_analytics, AnalyticsSyncHistory, _gcl_au, liap