1 of 25

Peter West

The Power of InControl

November 2024

2 of 25

What is InControl?

InControl is Peplink’s cloud-based device management, monitoring, and reporting platform, allowing you to take full control of your network and learn how to use InControl effectively.

It enables zero-touch configuration, provisioning, GPS fleet management, and troubleshooting—

all from a single screen.

3 of 25

Remote Management

Zero-Touch Deployment and Configuration:

With InControl, deploying new devices is truly plug-and-play. Configure devices remotely, apply mass configurations to groups, and ensure each device is ready for operation as soon as it’s connected.

End-to-End Device Control:

InControl gives you direct access to every device in your network. From configuring VPNs and firewall settings to pushing firmware updates, you have total control over your network’s infrastructure without needing an on-site presence.

Real-Time Diagnostics and Instant Issue Resolution:

InControl provides real-time insights into device health, bandwidth usage, and signal quality. This means faster issue detection and the ability to resolve problems instantly, reducing downtime and keeping your network performing at its best.

Location and Mobility Management:

Whether managing a fleet of vehicles, remote IoT assets, or multiple office sites, InControl’s GPS tracking, geofencing, and mobile-friendly interface mean you stay connected to your assets, wherever they are.

4 of 25

Zero Touch

Bulk Configurator

Allows you to manage all your Peplink devices that are connected to the same network simultaneously

Remote Device IP Configuration

Makes it easy to manage specific devices by using the IP address of your device

Bulk Outbound Policy Configuration

Allows you to apply traffic steering rules from a master config file to multiple Peplink devices simultaneously.

Bulk Firewall Policy Configuration

Extract firewall policies from a config file to apply to your Peplink Devices.

Centralized Firmware Management

Allows you to create and manage firmware policies for your Peplink ecosystem

Centralized SSID Options

Create and manage network SSIDs and implement password-protected wireless networks

Customized Captive Portal

Create and Manage a completely customizable landing page

5 of 25

Bulk Configurator

IC2 Group > Settings > Bulk Configurator

6 of 25

Bulk Configurator

7 of 25

Centralized Device IP Setting

IC2 Group > Settings > Device IP Settings

8 of 25

Centralized Outbound Policy

9 of 25

Centralized Outbound Policy

10 of 25

Centralized Outbound Policy

11 of 25

  • Weighted Balance

Traffic distributed among available WAN connections based on specified load distribution weight.

  • Persistence

Traffic from the same machine persistently routed through the same WAN connection.

  • Enforced

Traffic routed through specified connection regardless of its health status.

  • Priority

Traffic routed through healthy connection with highest priority.

  • Overflow

Traffic routed through healthy WAN connection with highest priority and not in full load. If connection saturated, new sessions routed to next healthy WAN connection not in full load

  • Least Used

Traffic routed through healthy WAN connection selected in "Connection" field with most available downlink bandwidth.

  • Lowest Latency

Periodic latency checking packets sent to all selected healthy connections. Latency determined by response time of second and third hops. New traffic routed to healthy connection with lowest average latency during detection period.

  • Fastest Response Time

Traffic duplicated and sent to all selected healthy connections. Connection with earliest response used to send all further traffic for fastest possible response time. Slower responses received from other connections discarded. This algorithm selects most responsive connection on per-session basis.

Centralized Outbound Policy

12 of 25

Centralized Firewall Policy

IC2 Group > Network Settings > Firewall Rules

Manage firewall rules on Balance, MAX, and FusionHub devices.

If a device is selected by more than one rule set, the rule set with the earliest creation date will be applied.

13 of 25

Centralized Firewall Policy

Supports importing existing rules from the device config file or creating new ones.

14 of 25

Centralized Firmware Management

IC2 Group > Settings > Firmware Policy

15 of 25

Centralized SSID Options

IC2 Group > Wi-Fi AP > Group-wide SSID Settings

16 of 25

Centralized SSID Options

17 of 25

Customized Captive Portal

IC2 Group > Network Settings > Captive Portals

18 of 25

Customized Captive Portal

19 of 25

Customized Captive Portal

20 of 25

Full Router Access - With or Without Subscription

Without payment of the subscription fee, some devices would be locked and would not be available for use.

All of our devices include one year of our care plan services and InControl cloud management with the purchase price.

Customers can optionally choose to continue these subscriptions, but we do not restrict configurations or continued operation if the subscription expires. We always allow customers to log directly into their router and change any parameters they need, as well as perform firmware upgrades.

21 of 25

What is ICVA?

You can maximize on-premise security with the

InControl Virtual Appliance (ICVA).

By hosting InControl on a private network, you can take full ownership of sensitive data and minimize the risk of attacks.

22 of 25

What is InTouch?

Access all remote devices behind a Peplink router with just one login. Integrate each remote device’s platform with InControl for seamless connectivity and simpler management.

23 of 25

How-To Handbook

Your How-To Guide to InControl Setup

24 of 25

What’s more?

Live Demonstration

Delivers Live Demonstrations

Professor P.

25 of 25

Stay CONNECTED

www.peplink.com

Peplink

Peplink

Peplink

peplink

Peplink Community

www.westnetworks.com

Q & A

Peplink Portfolio