EnGenius security gateway offers a comprehensive network solution that puts everything under a single pane of glass. The cloud interface allows users to view and manage a network where each device—access points, switches, and gateways—can be explored for more granular visibility and options.
The dual WAN ports are capable of highly efficient load-balancing, increasing overall WAN bandwidth. The gateway also features redundant WAN links, automatically switching itself from primary WAN to backup WAN in the event of WAN uplinks failure.
If all WAN ports go down, the 3G/4G/5G network connection with the USB wireless dongle can provide a backup for the corporate network from disruption.
The security gateway has four 2.5G ports for dual WAN and dual LAN connection, which is suitable, not only for the high-speed WAN environment but also for in-line architecture design to have a 2.5G uplink to an existing router and 2.5G downlink with near-wire-speed firewall throughput up to 2.35Gbps.
The stateful firewall of EnGenius Security Gateways protects business networks by integrating corporate security policies and real-time filtering of malicious internet traffic while delivering high throughput.
It takes just a few clicks to create a secure VPN connection without the hassle of configuring all the VPN detail parameters. For remote sites, the VPN integrating corporate security policies for web filtering and configuration provides employees with a safe and efficient connection. For end-users, their private data communications are secured by the VPN tunnel for browsing the Internet or working from anywhere.
EnGenius Cloud keeps monitoring the VPN connection between EnGenius Gateways and will automatically update related VPN information to all peers for continuous VPN connection in the case of WAN IP address reassignment or forwarding port change.
When businesses want to keep their current routing settings with existing routers or gateways, EnGenius Security Gateway can be set to the 'Passthrough' mode, which only performs data monitoring and security protection without affecting the original network configurations.