Power saving is maintained while achieving high-spec DHCP server support for IPv4 in addition to IPv6 compatibility.
External threats are coming from the numerous unidentified wireless access points. Don't you have multiple wireless access points in your company that no one knows who bought? There is nothing more threatening than a wireless AP that has been added to the wired network without permission. Shouldn't only PCs with correctly registered MAC addresses be able to obtain accessible addresses from the DHCP server and connect to the network? Security risks often have pitfalls in unexpected places.
Inquire About This Product
basic information
**Main Features** - Supports IP address distribution in IPv6 format compliant with RFC3315 in addition to IPv4. - Capable of distributing IP addresses to 1000/2500/5000 devices, and with fixed IP addresses, can distribute IPs to 2000/5000/10000 devices. Also supports shared networks (super scopes). - Equipped with MAC filtering functionality using a whitelist that only distributes IP addresses to registered MAC addresses, or a blacklist that does not distribute them, with settings possible on a subnet basis. - Real-time display of IP address distribution history and the current status of distributed IP addresses and MAC addresses. - Includes an initial setup wizard for easier initial configuration of the device, with the option to automatically send configuration information via email. Also features a configuration rollback function. - Standard provision of redundancy functions between sites using DDHA (Active/Standby) method, with redundancy configurations possible at the same site. Also supports redundancy configurations at the same site using VRRP (Virtual IP Address). - Comprehensive logging capabilities including authentication logs, accounting logs, system logs, and operation history, with options to display, transfer, and clear the acquired logs. - Dimensions: 195×143×40 (1U).
Price information
The price may vary due to optional maintenance, so please feel free to contact us.
Delivery Time
※The delivery time may vary depending on the quantity, so please feel free to contact us.
Applications/Examples of results
You can automatically authenticate devices when joining the company's network. ● It is possible to manage a whitelist that distributes IP addresses only to registered MAC addresses and a blacklist that does not distribute IP addresses. ● It has high durability because it does not use moving parts such as hard disks or fans. ● By installing two units, continuous operation is possible even if one side goes down. ● It features an easy-to-understand Japanese GUI for straightforward setup and operation.
Detailed information
-
There is a NetNebulas series. The NetNebulas DHCP 5000/10000 series can distribute IP addresses to 5000 or 10000 terminals, allowing for a total of 10000 or 20000 terminals when combined with fixed IP addresses. It also supports shared networks (super scopes) and DHCP option 82, and the product series allows for an upgrade from 5000 to 10000 through licensing.
Line up(3)
Model number | overview |
---|---|
NetRegio(R) DHCP 1000 | Up to 1,000 devices |
NetRegio(R) DHCP 2500 | Up to 2,500 devices |
NetRegio(R) DHCP 5000 | Up to 5,000 devices |
Company information
The company was established in 1994 as a provider of IT-related product imports, sales, and technical support. We mainly offer distribution and technical support for cutting-edge computer network-related products and information communication security-related products from the United States. Recognizing early on that security measures against computer viruses and malware are essential for information communication networks, we have also engaged in the sale and support of information security-related products. In recent years, cyber attacks targeting specific entities have become a social issue, making defensive measures against threats essential for businesses and organizations. In addition to solutions that defend against malicious attacks from outside and prevent information leaks, we provide new solutions that utilize artificial intelligence (AI) to detect anomalies and prevent incidents by leveraging machine learning and mathematical theories against cyber attacks that penetrate internal networks and internal threats that bypass perimeter defenses.