Secure Wireless Networks
Wireless Security is important as your traffic is broadcast wherever you can pick up a WiFi signal. Anyone within the geographical network range of an open, unencrypted wireless network can “sniff”, or capture and record, the traffic gain unauthorized access to internal network resources as well as to the internet, and then use the information and resources to perform disruptive or illegal acts. Such security breaches have become important concerns for both enterprise and home networks. It has been know that hackers have accessed systems, from the street outside, sometimes these type of intrusions can go undetected for months, even years.
When the guests connect to the network, you can redirect them to a captive portal before providing the Internet services for them. Routers are integrated with web portal solution for user authentication, inform the terms and conditions, or present a landing page for promotion.
Wireless Client Isolation
Access Points can block the wireless clients from accessing each other, as well as block the wireless clients from the wired network. This not only will protect your internal network from malicious users, but also ensure the privacy and security for your guests.
AirTime Fairness & Bandwidth Limit
AirTime Fairness and Bandwidth Limit feature will make sure the network resource will be fairly allocated, and every guest would experience a stable Internet speed. Moreover, Router can also do “auto-adjustment” to allow bandwidth usage over the limit when there is spare bandwidth available.
Wireless roaming allows your guests to stay connected anywhere at your venue. AP supports “AP-Assisted Roaming” feature to help your guests always connecting to the access point which has the strongest signal. PMK Caching and Pre-Authentication is also supported to ensure seamless roaming even when 802.1X authentication is deployed.
Enterprise Security for SMB
Firewall Security is always taken seriously with our routers. The firewall protects against attacks including DoS (Denial of Service) attacks, IP-based attacks and access by unauthorised remote systems. Wireless, Ethernet and VPN are also protected by various protection systems. The latest object-based firewall allows even more setup flexibility than ever, enabling you to create combinations of users, rules and restrictions to suit multi-departmental organisations. This also allows selective direction firewall rules of LAN to WAN, WAN to LAN or LAN to VPN. In addition, QoS (Quality of Service Assurance) can now be selectively applied to specific users.
Web Content Filtering
The Content control features, allow you to set restrictions on web site access, blocking download of certain file or data types, blocking specific web sites with whitelists or blacklists, blocking IM/P2P applications or other potentially harmful or wasteful content. Restrictions can be per user, per PC or universal. Using this service, you can block whole categories of web sites (e.g. gambling, adult sites etc.), subject to an annual subscription to the service, which is continuously updated with new or changed site categorisations or sites which have become compromised (such as infected with Malware).
Routers can be specified with multiple WAN connectivity to allow you to connect to Ethernet, 3G mobile, another ADSL line or any other Ethernet based Internet feed – ideal for load balancing or WAN backup as a redundant connection to step in if your primary connection fails, with automatic switching to give an almost uninterrupted service.
The USB port can be used to provide Internet connectivity (main, backup or load balanced) by connecting to a compatible USB modem (or cellphone) for access to the high speed 4G cellular networks from UK providers such as Vodafone, EE, and 02. This can be used where ADSL is not available (due to outage or where the service is not provided) and makes our routers ideal for temporary locations or mobile applications.