Appliances×アイビーソリューション - List of Manufacturers, Suppliers, Companies and Products

Appliances Product List

1~2 item / All 2 items

Displayed results

Network Connection Control Appliance "GoNET"

It is possible to provide Wi-Fi services while eliminating unauthorized access!

"GoNET" is a network connection control appliance that provides Wi-Fi services for foreign tourists visiting Japan and can be used in areas where unauthorized access needs to be eliminated. It serves as a tool aimed at attracting customers, delivering information such as tourist guides and product introductions. It allows for customization based on a basic template, including logo images and messages tailored to specific purposes. In addition to supporting multiple languages, it is equipped with various features such as usage restrictions, log management, and Wi-Fi access. 【Features】 ■ Supports required authentication methods ■ "Information dissemination" via redirection ■ "Visualization" of network devices ■ Automatic switching during disasters ■ Compatibility with external servers *For more details, please refer to the catalog. Feel free to contact us with any inquiries.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Network authentication appliance "iBAQS-FX"

Achieve secure network access from wired and wireless LAN to VPN!

The "iBAQS-FX" is a RADIUS authentication server that supports various authentication patterns. It switches modes according to the implementation phase. In MAC collection mode, it automatically collects the MAC addresses of devices connected to the existing network and allows for bulk registration, leading to cost reduction. It is possible to identify where unauthorized access occurred, enabling prompt response. 【Features】 ■ Cost reduction through phased implementation from MAC collection mode ■ Diverse authentication methods such as one-time passwords ■ Early resolution by identifying the location of unauthorized access ■ External integration with external user databases ■ Redundant configuration with automatic synchronization that does not interrupt operations ■ Support for "certificate authentication" through the issuance of certificate authority certificates *For more details, please refer to the catalog. Feel free to contact us with any inquiries.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration