View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
October 26, 1995

XYLOGICS LAUNCHES NAUTICA REMOTE ACCESS ISDN BRIDGE-ROUTERS FOR ISDN AND LEASED LINE NETWORKS

By CBR Staff Writer

Burlington, Massachusetts-based Xylogics Inc has launched a line of remote access bridge-routers for ISDN and leased line networks. The Nautica Clam is a personal ISDN router aimed at home or small branch offices, while the multiport Nautica Marlin is designed for larger branch offices, medium-sized backbone networks or central sites, with up to 23 ports in North America and 30 in Europe. Marlin can also be used as a central site router or bridge and, with the optional Hublet board, as an integrated, fully managed eight-port 10Base-T repeater-hub for smaller remote office sites that need hubs but can’t justify the cost of a free-standing hub. Both Nautica products support Basic Rate ISDN and Ethernet connections, while the Marlin also supports Primary Rate ISDN. They enable multiple ISDN channels to be shared dynamically as a single pipe for higher speeds, and both are compatible with US and European ISDN standards, said the firm. They are designed to provide access over ISDN lines for users of IPX, TCP/IP, Banyan Vines, Windows for Workgroups, Windows NT and Point-to-Point Protocol. Both can also be configured and managed from any local or remote location, said Xylogics, and a proprietary auto-learning feature, which enables them to automatically learn the network topology and services during the initial connection. A variety of filtering and spoofing techniques are incorporated, such as RIP/SAP Filtering, Watchdog Spoofing for NetWare and Static IP Routes for TCP/IP. Built-in security features include calling line identification checking, data encryption and address filtering. Pricing for the Nautica Clam starts at $1,200 and Marlin costs from $2,000. Both will ship in the US later this month, and are shipping now in Europe.

Content from our partners
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU