Features
Figure 1. How it works
Built-in VPN Endpoint
Full VPN Endpoint with support for up to 50 VPN tunnels using the IPsec encryption protocol.
Internet
Figure 2. Load Balancing
1A client computer makes a request to access www.(yourdomain).com.
2The request goes to the ISP’s DNS server and the DNS server replies with the IP address of the DNS responsible for that domain.
3The request is then processed by the Authoritative DNS of that domain and provides the IP address of the specified server.
4The client can then access the web server.
Authoritative DNS to IP Gateway
The
Multiple Connection Methods
All popular DSL and Cable Modems and connection methods are supported, including Fixed IP, Dynamic IP, PPPoE, even
2 x 10/100 WAN Ports
The
Load Balance two concurrent broadband connections in any combination to expand a network’s bandwidth to the Internet. The
Active connection from the ISP
The
Figure 3. Automatic Fail-over
In the event of one connection going down, all traffic is
Active connection from the ISP
Inactive connection from the ISP
All incoming and outgoing traffic from a LAN has an uninterrupted connection to the Internet when one of the two connections fail.
supported, including Fixed IP, Dynamic IP, PPPoE, even
4-Port 10/100 Switch
The
Automatic
If one broadband connection goes down all traffic is automatically
Stateful Packet Inspection (SPI) Firewall
Protects your network using advanced SPI against malicious and DDoS attacks.
Advanced NAT features
Access Filters, DMZ, DDNS, Remote Management, Dynamic or Static Routing, Special Applications, Virtual Servers, SNMPv1.
Access Filter
Gain fine control over the Internet access and applications available to LAN users with a powerful URL Blocking Engine. Five (5) user groups are available, and each group can have different access rights.
Block URL
Use this feature to block access to undesirable Web sites by LAN users. You can even have different settings for different groups of PCs.
5