More Than Load Balancing

Firewall Services

Using a built-in Stateful Packet Inspection (SPI) firewall, the IRG is able to secure your network from unwanted traffic. The IRG monitors for hackers who scan public IP addresses seeking access to your network. The IRG adds them to the drop list and disallows further communication to or from those IP addresses.

Each IRG port may be individually isolated. Utilizing VLANs, the unit has the capacity to separate traffic flows, providing the power to run multiple, independent networks through the same hardware. Independently isolated Visitor, Sales, Admin, DMZ, and other networks each with its own set of rules to ensure optimal workflow may all run simultaneously on the same device.

Unwelcome P2P traffic can also be problematic for many businesses. The IRG can identify several common P2P traffic markers and either exclude or limit the amount of bandwidth given to such activity, freeing network resources to ensure critical application functionality.

Visitor Network and Captive Portal

By isolating one or more of its physical ports, the IRG router is able to establish a captive portal where guests are securely fire-walled from the business administration network, and must accept Terms of Service to access the Internet. Once there, bandwidth consumption is strictly controlled and the IRG maintains time-stamped network connection identity logs to assure and identify violation of federal regulation compliance.

VPN Services

The IRG is capable of many common VPN protocols, enabling secure connections into your network over the Internet.

  • Road Warrior VPN End Point: Enables secured remote work force access to resources that are only available within your network.
  • Point-to-Point VPN: Enables remote offices to maintain a secured Internet connection into the central office and the protected information on file there.

Redundant Virtual WAN Services

Redundant virtual WAN services enable the use of multiple Internet connections to establish reliable, secure, and redundant channels to access information from remote sites. WAN traffic may be controlled by employing load balancing, policy-based routing, and simple failover capabilities.

MPLS Backup

InnSite Managed WAN services enable the use of commodity Internet connections to back up an MPLS network. The IRG establishes a secured point-to-point VPN connection between two or more remote locations and to the MPLS network. Should the MPLS network go offline, traffic is automatically seamlessly - routed over the VPN connection. Options exist to dedicate MPLS use for a specific type of traffic (e.g., VoIP) while deploying the backup VPN for other uses, freeing capacity and lowering bandwidth requirements on the MPLS network.

Cloud Integration

InnSite Managed WAN services enable integration with your cloud provider by installing a virtual server on your account. Using the power of the Cloud, our expanded services include several enhanced features that help run your day-to-day business more effectively and reliably.

  • Same IP Failover/Inbound load balancing and failover: By using the public IP addresses available to a cloud provider, we can forward communication requests back to your site over multiple Internet connections. Should your primary Internet connection go down, all traffic is routed through the backup link. Communication continues uninterrupted. Similarly, outbound traffic is all sent to the Cloud to use that same IP address, and is automatically rerouted between providers as needed.
  • No dropped VoIP: VoIP calls rely on uninterrupted sessions. In a conventional arrangement, if the primary Internet connection fails during a call, the session is lost and the phone call needs to be re-initiated. By integrating redundant VPN connections to the cloud and routing calls over those, if the primary Internet connection should fail the session is not lost but will simply use a different internet connection to the Cloud. The call continues, uninterrupted.
  • Secured redundant VPN connection to the Cloud: By establishing a secured VPN from your site to the Cloud, virtual servers are no longer exposed to the Internet where a hacker might try to access them. All cloud-based information is accessed through the VPN, ensuring secure data transmission over the Internet to and from the Cloud.
Top