Divide and secure
Create and define up to 5 separate VLANs and map up to 15 Wi-Fi SSIDs to each network (3 per VLAN) to keep your PCs, servers, and NAS protected if more vulnerable devices are attacked.
Networks are isolated from each other by default for maximum security. This means devices cannot communicate with devices connected to other Wi-Fi SSIDs. Different networks/VLANs can optionally be assigned to different physical ports on the router.
Easily create firewall rules to bridge networks for specific purposes. For instance, only allow connections initiated from your NAS to communicate with your IP cameras, but not the other way around.
Keep communications between networks completely open. For example, if you manage a large number of devices that you wish to separate into different subnets for convenience.
Allow this convenient, but more vulnerable, connection method (often seen on printers and cameras) only on specific networks. For example, accommodate guests and specific IoT devices with no other ways to connect.
Maximize security by enabling only WPA3 authentication on a wireless network with newer devices. Or set up a WPA-Enterprise network with a bridged fallback, such as for smart TVs and media casting targets.
Control your network
Each network can be configured with different internet access policies, bandwidth limits, and other settings based on your intended use.
Define per-device or network-wide profiles to protect devices against online threats and to limit internet use or allowed websites.
Set which networks are accessible to clients connected via VPN Plus. Use Site-to-site VPNs to bridge only a specific local network with a remote site.
Firewall and Traffic Control
Define routing and port forwarding rules, and allocate bandwidth limits for each network to prioritize specific applications and devices.
Fits right into existing setups
Already have your network defined? SRM 1.3 includes full 802.1q VLAN support so you can map custom networks and Wi-Fi SSIDs directly with your existing VLANs.