quickly and effectively — to deliver
elevated levels of customer service.
The difference is how the respective
routers gain access to the Internet.
With Business Secure Router 252, all
you require to access the Internet is
high-speed DSL (digital subscriber line)
service from an Internet service provider.
Business Secure Router 222 requires you
to subscribe to DSL or cable service
from an Internet service provider, and
connect it into the DSL or cable modem
that accompanies that service. The
Business Secure Router 222 and 252 —
which have a built-in ADSL2+ and
modem — provide the secure link from
your internal company network to the
Internet access service, off-site employees
and other business locations.
Offer enterprise-class data and
security at a small-business price.
Any number of routers can connect
your data network across locations, or to
the Internet through cable modems or
DSL telephone lines. What makes the
Business Secure Router superior to other
products is the high degree of security
and the intelligent QoS they offer —
especially at such an attractive price.
These all-in-one routers include a rich
feature set tailored for a small and
medium-sized business.
Support a full range of voice and data
services. The Business Secure Router
222 and 252 support all the voice and
data features of your Nortel communica-
tion servers and IP phones. Hundreds of
calling features, voice messaging, Unified
Messaging, Automated Attendant,
Contact Centers… these capabilities and
more can span multiple locations.
Create secure networks over the public
Internet. Virtual private networks
(VPNs) enable you to use the Internet
as your own private network. You can
establish secure connections with home-
based workers, business partners and
satellite locations far beyond the reach of
the internal company network. VPNs
carry the private data traffic on a logical
connection — a secure, encrypted
“tunnel” over a public IP network. The
Business Secure Router family supports
up to 10 simultaneous tunnels or 10
secure “IPSec tunnels” — the term for
VPN-connected devices that use the
IPSec security protocol.
Ten tunnels offer a lot of flexibility. For
instance, you could set up a VPN tunnel
to another router to create secure office-
to-office communications, with an
employee’s laptop to enable secure
access to the network from home, or
secure access for a whole team of
outside sales people.
Remote users simply install IPSec client
software on their laptops, and then they
can securely connect to the company
network and access its voice and data
resources. Users can work from
anywhere, while satisfying even stringent
security requirements.
Protect the confidentiality, authentica-
tion and integrity of data in transit.
Traffic is encrypted to prevent eaves-
dropping. Even if data traffic could be
seen, it would be unreadable by anyone
except the intended recipient, whose
device has the sole “key” to decipher the
message at the other end.
Prevent hackers and viruses from
getting into your network. A built-in
firewall provides a perimeter defense to
guard your business network against
unauthorized users, such as those trying
to “spoof ” or pretend to be legitimate
users. The advanced firewall with
“stateful packet filtering” can grant or
deny network access based on time of
day, application, IP address, port range
and other attributes. Ultra-granular
control enables Web or data traffic to
be restricted while still letting voice over
IP (VoIP) calls pass through.
Prioritize your most important
services. Some data services, such as
VoIP, are sensitive to even the slightest
delay, while others, such as e-mail or fax,
can receive secondary treatment if neces-
sary. That’s why Business Secure Routers
support class-based QoS. They under-
stand that voice traffic must reach its
destination within milliseconds, and give
it highest priority treatment. As long as
the wide area network (WAN) has also
been engineered for voice-grade service,
the voice call will be clear and smooth.
The router can also prioritize other
applications or classes of service, to
ensure appropriate delivery of packets
where and when needed.
Increase security and flexibility in IP
addressing. Network Address
Translation (NAT) converts internal IP
addresses into your public IP address
and vice versa. By hiding your private IP
addresses from the world, NAT provides
an extra layer of security. NAT can also
be used to share static addresses across a
group of users who need exclusive, but
temporary, use of a static IP address.
2
Business Secure Router highlights
> Provides a high level of security through standards-based VPN, firewall, authentication and encryption
> Delivers Quality of Service through packet differentiation based on priorities
> Ensures easy installation through an intuitive, user-friendly Web Graphical User Interface
> Offers simplified operation, administration and maintenance through the Nortel Business Element Manager