background image

Patent Pending. © 2020 Byos Inc. - Halifax, Nova Scotia - All Rights Reserved - 

byos.io

5

1.  Turn off your device’s Wi-Fi (place it in airplane mode). Plug in 

the µGateway using either the standard USB-C port or use an 

adapter for an USB-A port. 

2.  The  µGateway  will  take  20  seconds  to  boot  up.  After  20 

seconds, open up a browser and type “

my.byos/home

” into the 

URL bar. This will take you to the Sign-in page of the Home 

Dashboard. This dashboard is self-hosted on the µGateway.

 

3.  Create your account username and password, and log in. Click 

“Remember Me” so you will log in automatically every time you 

plug in your μGateway. 

4.  You  will  now  be  prompted  to  select  a  network  in  range  to 

connect  to.  Select  your  desired  network  and  type  in  the 

password. The device will now perform a network health and 

security check before connecting. If the network has a captive 

portal, you will be prompted to accept its terms before traffic 

will be allowed to flow. 

5.  If you wish to connect to a hidden network, click cancel and 

then navigate to the Wi-Fi page from the button in the left 

navigation  bar.  Once  on  the  Wi-Fi  page,  click  “Connect  to  a 

hidden network” and enter in the credentials.

6.  Once the connection is established, you will now see the home 

Dashboard with your network traffic map by country. You are 

now free to work securely. 

7. 

Optional: Configure your VPN

 - If you also subscribe to a VPN 

service, you can run it through the μGateway. Click “VPN” on the 

left navigation bar, click “Add VPN, and select your provider.

Step 2: 

Login and Connect to the Wi-Fi

Now that you are connected 

to the internet using your 

Byos μGateway, you are fully 

isolated from the rest of the 

devices on the network and 

can close the dashboard. 

You will need to use the dashboard to 

connect to the Wi-Fi every time you enter a 

new network environment. We also suggest 

always using the µGateway wherever you are 

to protect yourself from the risks associated 

with public and Home Wi-Fi networks.

How to Connect for the First Time:

Summary of Contents for mGateway

Page 1: ...Byos Gatewvay Evaluation Guide...

Page 2: ...de to help you make the most out of the Byos Gateway micro gateway and take advantage of all its features Please carefully review each section below and if you have any questions please reach out to e...

Page 3: ...er tested with current versions of Chrome Firefox Safari Internet Explorer Edge and Opera No additional plug ins or software required Manufactured In Canada and USA Dimensions 10 5 x 3 4 x 1 cm 4 1 x...

Page 4: ...SB device allowing individuals employees and devices to safely and securely connect any network regardless of their location or network environment We took the proven approach of network segmentation...

Page 5: ...rms before traffic will be allowed to flow 5 If you wish to connect to a hidden network click cancel and then navigate to the Wi Fi page from the button in the left navigation bar Once on the Wi Fi pa...

Page 6: ...nications with the network gateway without allowing the poisoning of the routing tables Private DNS Queries the Gateway runs an in device Encrypted DNS server preserving confidentiality of the user s...

Page 7: ...tries domains IP addresses and ports your device connects to Most people don t realize the amount of connections their devices make on a day to day basis let alone which countries these servers are in...

Page 8: ...e product does not have hidden backdoors Security and Privacy of the Gateway We perform extensive white box and black box testing on the Gateway to ensure our product is secure The Gateway is NIST SAN...

Page 9: ...e Gateway uses the USB OTG specification and should be recognized by your device as a RNDIS Ethernet Gadget If your device does not recognize Gateway unplug it The driver will be automatically install...

Page 10: ...red with an enterprise class Management Console to deploy and manage Gateways at scale This allows IT security teams to confidently efficiently and cost effectively manage a global workforce centrally...

Page 11: ...uitry directly in a device automatically creates a micro segment of 1 delivering hardware enforced protection of the device from the inherent risks on dirty networks while allowing secure zero trust b...

Reviews: