Header

Immunity Gateway Controller

Power. Protection. Performance

Product Overview

The Immunity Gateway Controller (IGC) is a centralized wireless and network management platform designed to deploy, monitor, and manage Immunity Lotus Alpha Access Points and wired network devices from a single interface. Built for enterprises, hospitality, campuses, and service providers, IGC delivers Captive Portal authentication, RADIUS integration, VLAN management, and real-time network visibility — with optional sync to Immunity Net Cloud.

Centralized management for your entire wireless and wired network.

Enterprise-Grade Wireless & Network Management

Network Switch

The Immunity Gateway Controller is purpose-built for organizations that need reliable, scalable wireless infrastructure management. It brings multiple Access Points under unified control — enabling seamless roaming, SSID management, VLAN segmentation, and real-time traffic monitoring from a single dashboard. Guest networks with Captive Portal login, RADIUS-based authentication, and bandwidth policies can be configured in minutes.

What truly sets the IGC apart is its ability to work standalone for on-premises deployments or sync with Immunity Net Cloud for remote management, firmware updates, and analytics. With local logging for compliance and troubleshooting, role-based access control, and a scalable architecture that grows with your network, the IGC is the command center for your entire Immunity Networks deployment.

Provides Advanced Security and Performance

Key Features

Comprehensive management capabilities purpose-built for wireless network operations.

Captive Portal & Guest Management

Deploy branded Captive Portal login pages for guest Wi-Fi with time limits, bandwidth policies, and social login support.

Multi-AP Centralized Control

Manage Immunity Lotus Alpha Access Points from a single interface with zero-touch provisioning and bulk configuration.

RADIUS & AAA Authentication

Integrate with RADIUS servers and 802.1X for enterprise-grade user access control and policy enforcement.

Real-Time Monitoring & Logging

Full network visibility with live dashboards, client analytics, local logging, and event alerts for proactive management.

Net Cloud Sync

Sync with Immunity Net Cloud for remote management, firmware rollouts, configuration backups, and multi-site dashboards.

VLAN & Traffic Management

Configure SSIDs, VLANs, QoS policies, and bandwidth limits across all managed devices with an intuitive web interface.

Redefined for the Modern Enterprise

Our Products

Engineered for enterprise-grade reliability with low latency

Gateway Controller-IGC(M)

Designed to deliver seamless connectivity, efficient performance, and future-ready expansion.

US-8MP Port Switch
  • 21.1Gbps Throughput and 5 Mega Packets per Second
  • Fast Filtering up to 50.000 Connections per Second
  • Hardware Assisted Encryption with 2.5Gbps IPsec (AES256GCM16)
  • Guard Web Access Filtering (SSL) Proxy. Captive Portal with Voucher support
  • 128GB SSD Offering Sufficient Space for Logging & Reporting
  • System wide two-factor authentication and compatible with Google Authenticator.
  • Dual Power Supply with integrated non-interrupted automatic failover
  • Offers an intuitive dashboard for easy configuration, monitoring, and real-time analytics
  • Seamlessly integrates with existing IT ecosystems
See More
Overcoming The Barriers

Key Networking Challenges

Top Enterprise Networking Challenges Businesses Must Overcome.

Lack of Network Visibility

It is difficult to track performance, detect threats, and resolve issues before they disrupt business operations.

Bandwidth & Latency

Increasing user demands and cloud-based applications strain bandwidth, causing latency issues.

Cybersecurity Threats

Evolving cyber threats like ransomware, intrusions, and data breaches put enterprise sensitive data at risk.

Inflexible Infrastructure

Limits scalability and adaptation, preventing enterprises from meeting evolving technology demands.

Take a free consultation.

Book your schedule with the Leaders for planning your end point security strategy.

TOP