TechUpSmart - Welcome to Internet of Everything
  • Phone System
  • Virtualization / Cloud Computing
    • Remote Personal Computer
    • Cloud Computing
  • Network Setup
    • VPN Encrypted Tunnel
    • Network Failover
    • Rack / Enclosure
  • Wireless
    • P2P or PtMP
    • WiFi Hotspot
  • Cabling
    • Cat6 - Coaxial Wiring
  • Security Cameras
  • Category
Network Setup, Upgrades, Configuration & Maintenance

Gigabit Router / Firewall
  • Block adult sites from your network
  • Fast Quad-Core Processor 
  • Ports 4+ Gigabit Ethernet LAN ports
  • Optional 24V passive PoE
  • Gigabit SFP WAN port
  • GigE WAN port
  • 1 x USB 3.0 Host Port
  • Memory 4GB eMMC Flash
  • 1GB DDR3 RAM
  • Power Supply Universal 24V, 60W power supply (included)
  • LEDs Port LEDs, tri-color LED status indicator
  • Management features NAT routing, stateful firewall, DHCP server,
  • VPN client and point-to-point, VLAN tagging,
  • Quality of Service and more
  • Performs 2+ Million Packets per second forwarding rate with full Deep Packet Inspection
  • Setup secure VPN networks between two or more locations​
​
Any business must have a firewall in place to protect their inside network from the outside world.  Hackers are scanning for open ports all day all over the world.  Once found, they can use it to connect to the associate device in your inside network.  Once an open port is found, next the hacker tries to break through the authentication by attempted thousands of passwords in a matter of minutes through their own hardware and software.  Once the the username and password is revealed to the hacker, that inside device in now in their control...  What can make the matter worse is through that inside device, more than likely they will have access to everything else in the internal network... Its easy to find open ports and its ease to guess standard username and passwords through dictionary attacks...  Hackers are doing this all day, everyday on the internet.  Its very important not to use common usernames like Admin or Administrator and simple to guess passwords...   
A firewall protects against hackers by blocking all ports and leaving open only what is needed.  A hardware firewall should be place right after your ISPs modem.  Its design to use its processing power to check all packets for vulnerability before it goes into the network..  Firewalls also protect again viruses.
If you have multiple locations, we can setup a Virtual Private Network which is an encrypted tunnel connecting the two locations as if they were in the same network.
​
Gigabit Switch - 8, 16, 24, or 48 Ports
  • Power, Fault, PoE Max, LAN Mode, PoE Mode, Speed, Link/Act
  • L2 Features IEEE802.3ad Link Aggregation, Port Mirroring, Port Trunking, IGMP Snooping v1/v2/v3,
  • IGMP Fast Leave, MLD Snooping, VLAN Group, Voice VLAN,
  • IEEE802.1X Port-based Access Control, IEEE802.1X Guest VLAN, Port Security,
  • Storm Control, Port Isolation, Attack Prevention, Access Control List (ACL)
  • Spanning Tree Protocol 802.1D Spanning Tree (STP), 802.1w Rapid Spanning Tree (RSTP),
  • 802.1s Multiple Spanning Tree (MSTP)
  • Queue CoS based on 802.1p priority, CoS based on physical port,
  • CoS based on TOS, CoS based on DSCP
  • Power feeding with priority, User define power limit
  • Additional Management SSH Server, Telnet Server, TFTP Client, BootP/DHCP Client, SNMP v1/v2c/v3 support,
  • Command Line Interface (CLI), SNTP, RMONv1, SYSLOG, Cable Diagnostic
  • 150W to 750W POE budget
  • Separate networks based on departments securely using VLANS
Picture

Telephone

(718) 340-3868

Email

info@techupsmart.com