Access Control, Authentication, and Management at Once

Key Security Features
Blocking ARP/IP Spoofing
Secure network from ID spoofing and telephone tapping
IP/MAC Address-Based Access Control
Access control on unauthorized endpoint devices

Blocking the Spread of Wired/Wireless Traffic
Preventing slowdowns and system failures after traffic overloads
Preventing the Self-Loop
A guarantee for stable network service
Product Series
