SHARE
Facebook X Pinterest WhatsApp

Edgecore to Launch Wireless MBG

thumbnail Edgecore to Launch Wireless MBG

Edgecore’s Wireless Multi-Access Business Gateways (MBG) combines the functions of both a network gateway and wireless controller to provide a high-performance wireless network infrastructure that the company claims to be secure, cost-effective and easy-to-manage. In this news release on Earth Times, the company said that access control can be enforced on a per-user and per-user […]

Apr 22, 2010
Enterprise Networking Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Edgecore’s Wireless Multi-Access Business Gateways (MBG) combines the functions of both a network gateway and wireless controller to provide a high-performance wireless network infrastructure that the company claims to be secure, cost-effective and easy-to-manage. In this news release on Earth Times, the company said that access control can be enforced on a per-user and per-user group basis including controls for firewalls, bandwidth limitations and scheduling.


“The Edgecore Wireless MBGs provide a robust set of features and functions making them ideal wireless network infrastructure solutions for SMBs and enterprises. To ensure maximum system reliability, the Wireless MBGs support WAN failover to ensure network availability, load balancing to optimize network performance, advanced roaming to ensure seamless mobility across subnets, and VoWLAN Quality of Service to deliver true voice quality over wireless.

“Access control can be enforced on a per-user and per-user group basis including controls for firewalls, bandwidth limitations and scheduling. Client management can be controlled via multiple user groups and multiple service zones. Management of access points is centralized giving administrators the ability to configure, control and manage multiple types of access points.

“Offering a host of security capabilities, the Wireless MBG can authenticate users based upon a built-in local/on-demand database or by accessing an external authentication database. The system supports local VPN, remote VPN and site-to-site VPN, and provides additional security through WPA, rogue AP detection, wireless intrusion detection and prevention.”

Read the Full Story at Earth Times

Recommended for you...

4 Phishing Examples: Spot and Avoid Fraudulent Attacks
Examples of Ransomware: A Cautionary Tale
Juniper, Cato Build Out SASE Platform Offerings
Jeff Burt
Feb 4, 2022
Pandemic Leads to Permanent Changes in Workforce, WAN: Aryaka
Jeff Burt
Jan 20, 2022
Enterprise Networking Planet Logo

Enterprise Networking Planet aims to educate and assist IT administrators in building strong network infrastructures for their enterprise companies. Enterprise Networking Planet contributors write about relevant and useful topics on the cutting edge of enterprise networking based on years of personal experience in the field.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.