Access Control, Authentication, and Management at Once


Key Security Features

Blocking ARP/IP Spoofing

Secure network from ID spoofing and telephone tapping

IP/MAC Address-Based Access Control

Access control on unauthorized endpoint devices

Blocking the Spread of Wired/Wireless Traffic

Preventing slowdowns and system failures after traffic overloads

Preventing the Self-Loop

A guarantee for stable network service


Product Series

Download Datasheet