Innominate EAGLE mGuard w/VPN-10 BD-301010 User Manual

Product codes
BD-301010
Page of 4
systems. The full graphic integration can be realised
on the Industrial HiVision management platform from
the firm Hirschmann, for example.
Maximum data throughput for the VPN 
and firewall
The Intel processor features hardware-based DES,
3DES and AES encryption. This guarantees maximum
data throughput for firewall (up to 99 Mbit/s) and
VPN (up to 70 Mbit/s).
Virtual addressing in VPN tunnel
Virtual private networks often connect networks in
which non-public IP addresses are used. These arbi-
trary address spaces are often used on a multiple
basis. In order to avoid address conflicts, the mGuard
offers an address translation feature (1:1 NAT) within
the VPN. The components which can be reached via
VPN are each displayed under a different IP address
to local devices.
At a glance: 
Industry-suitable design: mounted on rails,
IP20, ventilator-free, protected from shocks and
vibrations.
High system availability (MTBF 27,4 years).
Maximum security and availability: 24 volt redun-
dant input, signaling switch, status LEDs, logging
on the syslog server.
Maximum data throughput via hardware-based
encryption for high speed VPN and firewall.
Virtual addressing (1:1 NAT) in the VPN tunnel
avoids address conflicts.
High-capacity anti-virus solution (optional).
User firewall regulates access to internal or exter-
nal resources via user login to the mGuard and
central RADIUS server.
Configuration with the Innominate Device Manager
(IDM).
Also available with Fiber Optic WAN Interface.
Unassailable with the Innominate
Stealth Mode
mGuard systems by Innominate take
advantage of a special function – the
Stealth Mode. This allows the systems
to perform absolutely transparently –
for they do not even require their own IP
addresses. Instead, the mGuard uses
the same IP as the computer it is pro-
tecting and therefore cannot be recog-
nized by invaders, making the system
unassailable to attack. Moreover, the
Innominate Stealth Mode does not re-
quire any modifications to the network.
Simple configuration
During service, the overall device confi-
guration can be transmitted via the
Configuration Adapter.
Innominate
Security Technologies AG