Peter West
The Power of InControl
November 2024
What is InControl?
InControl is Peplink’s cloud-based device management, monitoring, and reporting platform, allowing you to take full control of your network and learn how to use InControl effectively.
It enables zero-touch configuration, provisioning, GPS fleet management, and troubleshooting—
all from a single screen.
Remote Management
Zero-Touch Deployment and Configuration:
With InControl, deploying new devices is truly plug-and-play. Configure devices remotely, apply mass configurations to groups, and ensure each device is ready for operation as soon as it’s connected.
End-to-End Device Control:
InControl gives you direct access to every device in your network. From configuring VPNs and firewall settings to pushing firmware updates, you have total control over your network’s infrastructure without needing an on-site presence.
Real-Time Diagnostics and Instant Issue Resolution:
InControl provides real-time insights into device health, bandwidth usage, and signal quality. This means faster issue detection and the ability to resolve problems instantly, reducing downtime and keeping your network performing at its best.
Location and Mobility Management:
Whether managing a fleet of vehicles, remote IoT assets, or multiple office sites, InControl’s GPS tracking, geofencing, and mobile-friendly interface mean you stay connected to your assets, wherever they are.
Zero Touch
Bulk Configurator
Allows you to manage all your Peplink devices that are connected to the same network simultaneously
Remote Device IP Configuration
Makes it easy to manage specific devices by using the IP address of your device
Bulk Outbound Policy Configuration
Allows you to apply traffic steering rules from a master config file to multiple Peplink devices simultaneously.
Bulk Firewall Policy Configuration
Extract firewall policies from a config file to apply to your Peplink Devices.
Centralized Firmware Management
Allows you to create and manage firmware policies for your Peplink ecosystem
Centralized SSID Options
Create and manage network SSIDs and implement password-protected wireless networks
Customized Captive Portal
Create and Manage a completely customizable landing page
Bulk Configurator
IC2 Group > Settings > Bulk Configurator
Bulk Configurator
Centralized Device IP Setting
IC2 Group > Settings > Device IP Settings
Centralized Outbound Policy
Centralized Outbound Policy
Centralized Outbound Policy
Traffic distributed among available WAN connections based on specified load distribution weight.
Traffic from the same machine persistently routed through the same WAN connection.
Traffic routed through specified connection regardless of its health status.
Traffic routed through healthy connection with highest priority.
Traffic routed through healthy WAN connection with highest priority and not in full load. If connection saturated, new sessions routed to next healthy WAN connection not in full load
Traffic routed through healthy WAN connection selected in "Connection" field with most available downlink bandwidth.
Periodic latency checking packets sent to all selected healthy connections. Latency determined by response time of second and third hops. New traffic routed to healthy connection with lowest average latency during detection period.
Traffic duplicated and sent to all selected healthy connections. Connection with earliest response used to send all further traffic for fastest possible response time. Slower responses received from other connections discarded. This algorithm selects most responsive connection on per-session basis.
Centralized Outbound Policy
Centralized Firewall Policy
IC2 Group > Network Settings > Firewall Rules
Manage firewall rules on Balance, MAX, and FusionHub devices.
If a device is selected by more than one rule set, the rule set with the earliest creation date will be applied.
Centralized Firewall Policy
Supports importing existing rules from the device config file or creating new ones.
Centralized Firmware Management
IC2 Group > Settings > Firmware Policy
Centralized SSID Options
IC2 Group > Wi-Fi AP > Group-wide SSID Settings
Centralized SSID Options
Customized Captive Portal
IC2 Group > Network Settings > Captive Portals
Customized Captive Portal
Customized Captive Portal
Full Router Access - With or Without Subscription
Without payment of the subscription fee, some devices would be locked and would not be available for use.
All of our devices include one year of our care plan services and InControl cloud management with the purchase price.
Customers can optionally choose to continue these subscriptions, but we do not restrict configurations or continued operation if the subscription expires. We always allow customers to log directly into their router and change any parameters they need, as well as perform firmware upgrades.
What is ICVA?
You can maximize on-premise security with the
InControl Virtual Appliance (ICVA).
By hosting InControl on a private network, you can take full ownership of sensitive data and minimize the risk of attacks.
What is InTouch?
Access all remote devices behind a Peplink router with just one login. Integrate each remote device’s platform with InControl for seamless connectivity and simpler management.
How-To Handbook
Your How-To Guide to InControl Setup
What’s more?
Live Demonstration
Delivers Live Demonstrations
Professor P.
Stay CONNECTED
www.peplink.com
Peplink
Peplink
Peplink
peplink
Peplink Community
www.westnetworks.com
Q & A
Peplink Portfolio