We offer special settings if you want to protect your network, as well as how your team can access the internet. You need to opt in for the ones you want.
These settings activated per your private VLAN
Each activation applies to all devices in your VLAN network. You cannot separate any devices.
Who can use these services? #
We offer these services as add-ons for $20 per month. You can only use this service if you have your own VLAN. VLAN is already included in our VIP packages.
Please read the important definitions in this article and determine if any option is for you or not, then use the link at the bottom of this article to submit the request form.
Intrusion setup is already activated on our hotspot (visitor and member network that you connect with your email/PIN) and meeting room LAN wired connections.
Intrusion Prevention and Detection (IPS/IDS) #
- Default is OFF for custom VLANs (ex. private offices).
- It is ON for our hotspot’s general WiFi access and meeting room LAN connections.
Intrusion Prevention Systems (IPS) and Intrusion Detection Systems (IDS) are critical components in enhancing network security. These systems serve as frontline defences, identifying and mitigating threats before they cause harm.
What Are IPS and IDS? #
- Intrusion Detection System (IDS): Monitors network traffic for suspicious activity.
- Intrusion Prevention System (IPS): similar to IDS but also takes proactive steps to block detected threats. We directly block these threats in West Quay Offices once setup is made for your network.
Why are IPS and IDS important? #
Compliance: Helps meet security standards and regulatory requirements (PCI-DSS, HIPAA, etc.).
Threat Detection & Prevention: Identifies malicious traffic, preventing potential damage. Real-time signature updates ensure you are protected against new and evolving threats.
Real-time signature updates #
Threats evolve and patterns change; we stay ahead by regularly updating our threat signature databases. This ensures your network is protected from even the latest threats.
Is my information private? #
Yes, we guarantee the privacy and security of your information at our offices, which we completely delete after a month. The only data retained is that of the attacker’s IP address to ensure our threat database remains up-to-date.
Note: Only when security detections are triggered, certain metadata, including timestamps, IP addresses, ports, protocols, and signatures, temporarily pass through an encrypted communication channel with our cloud security database provider before it is ultimately deleted. These data won’t have any personal identifying meta of yours.
Does enabling intrusion prevention affect the speed of the internet?
Since traffic is being actively inspected, maximum routing performance may be reduced. This may effect your internet and connection speed outside of your VLAN network. But most won’t notice the difference.
Included checks #
Virus and Malware #
- Botce: Treats from known, active botnets.
- Malware: infiltrative software that steals internet activity data from your network and computers.
- Mobile Malware: Infiltrative software that steals internet activity data from your network and mobile device.
- Trojan: malicious software that exhibits clear criminal intent.
- Worm: Network traffic that indicates potential worm activity.
P2P #
- TOR: Network traffic sent to and from Tor exit nodes using an IP-based rule set.
Hacking #
- Attack Response: Indications that a network device in your VLAN is compromised.
- RPC: UNIX RPC service-related exploits and outdated functionality.
- Scan: Reconnaissance and probing activities that are unknown to your network.
- Shellcode refers to the targeting of vulnerable processes that are running on a separate machine, within a local network, or on an intranet.
IPs with Bad Reputation #
- CI Army: Cross-references to the CI Army list, a daily directory of IP addresses deemed as having a bad reputation.
- Compromised: Cross-references a list of IP addresses known to be compromised hosts, which is updated daily by private and public sources.
- DShield: Cross-references a list of IP addresses that have been identified as sources of past attacks.
Network Protocol #
- NetBIOS: Known NetBIOS attacks.
- TELNET: Malicious activity using Telnet protocol.
Dark Web Blocker #
Automatically blocks traffic encrypted by Tor.
Block Known Malicious IPs #
Blocks known malicious IP addresses using an automatic, real-time updated database.
Intrusion Prevention offered as one package
All the above checks are offered in one setup and you cannot unselect some, like the rest of the below options.
Content Filtering #
Default is OFF for all networks.
Blocks access to explicit, pornographic, and malicious domains from your network. Search engines and Youtube switched to safe mode.
Firewall Rules #
Block application groups #
The default is OFF for all networks.
Any devices on your network won’t be able to access the internet with these applications in the groups of your choice.
Application groups to block can be chosen separately.
Application Group | Description |
---|---|
Social networks | This will block all media streaming applications like Youtube, Spotify, etc. |
Online Games | This will block all known online games. |
Instant Messengers | This will block file transfer applications. This also applies to businesses that use Google Drive or OneDrive. |
File Transfers | This will block all media streaming applications like YouTube, Spotify, etc. |
Media Streaming Services | This will block all media streaming applications like Youtube, Spotify, etc… |
This will block all media streaming applications like YouTube, Spotify, etc. | This will block any VPN usage from your network, and if anyone wants to bypass the above rules by using a VPN or proxy service, This may also be some requirement for certain businesses that need to track and limit computer access for compliance. |
Blocks can be time-frame limited
You can block or allow these application groups between certain times. (ex. allow social networks during 12 AM and 12 PM). Or you can also block these at certain days (ex, like Fridays)
Block applications separately #
The default is OFF for all networks.
You can separately list the applications you want to block, and doing so will prevent any computer or mobile device connected to your VLAN from accessing them.
Blocks can be time-frame limited
You can block or allow these applications between certain times. (ex. allow them during 12 AM and 12 PM). Or you can also block these at certain days (ex., like Fridays)
Blocking access to certain websites #
The default is OFF for all networks.
You can block access to certain websites based on their domain names from your VLAN network.
Block access to certain IPs from your network #
The default is OFF for all networks.
List any IPs or subnets you want to block access from your network.
Block access to Countries from your network #
The default is OFF for all networks.
Listed countries won’t be accessible from your network.
Opt-in for these services #
Please submit this form to activate these functions.