ET-6600 / ET-6690 / ET-3302 Encrypted Ethernet Tunnel

ET Family Encrypted Ethernet Tunnel

  • Industrial rated -40 to +70 C
  • ET-3302 two ethernet port version with built-in 4 port ethernet switch
  • ET-6600 has two asynchronous serial RS232 ports
  • ET-6690 has one asynchronous serial RS232 port and a dial-modem
  • AC and DC power supply options
  • Two Ethernet ports: 10BaseT, 10/100BaseT
  • Each port is independent
  • Easy to setup and maintain
  • Host unit supports up to 8 simultaneous remote locations
  • Set unit up as host or user device
  • Extensive statistics logging and diagnostic tools
  • Tunnels all Ethernet protocols, not just IP
  • Encryption with 128 bit AES, 192 bit AES, 256 bit AES, or ISAAC encryption
  • Ethernet to Ethernet or with ET-6600, Ethernet to serial (for secure PPP dialup)
  • Link LAN to LAN or remote computer dial-in
  • Remote PC appears to be on the local network
  • Compact size, Stand-alone or Rack Mounting
  • Bridges 802.1Q tagged V-LAN trunks
  • Extensive filtering on MAC, IP, and Protocol
  • All ET family products interoperate.
ET-6600 Front View
ET-6600 Rear View

How To Order
Indicators (front panel)
Physical/Electrical APPLICATION Notes & Manual

Common Applications

  • Tunnel VOIP multicast applications through unicast networks
  • Tunnel 802.1Q tagged VLAN trunks through non VLAN networks
  • Utilities – Gas and oil production, pipelines, electric generation, transmission and distribution
  • Retail – Stores, kiosks, credit card machines --- especially those using wireless links
  • Law Enforcement – Small remote offices
  • Medical – AES encryption of the ET-6600 meets HIPAA requirement for securing data over open networks such as the Internet. The medical industry is mandated by HIPAA to meet HIPAA privacy and security requirements over open networks.
  • Real Estate – Connecting to and updating the database of listed homes.
  • Field sales personnel working out of the home, hotel rooms wired for high speed Internet access.
  • Financial industry – Additional security on internal corporate links, branch offices, ATM machines, key personnel remote secure access.
  • Remote office with more than one device, with the ET-6600 shared with switch or hub.
  • Added security within a large corporate network
  • Office to Home
  • 2 nets at each end, bridged via the Internet
  • Remote network monitoring via the Internet


The ET-6600 is an industrial temperature rated device (Internet Appliance) for creating encrypted Ethernet tunnels. To meet your needs, the basic unit is available in three models...The ET-6600 features two serial ports and two Ethernet LAN ports. The ET-6690 has two ethernet ports, one RS-232 port, and one internal modem port. The ET-3302 has one untrusted ethernet port and a four-port switch on the trusted side.

The ET series encryption appliances encrypt data between private networks using the public Internet or any other network as the transport.

The ET series uses AES 128-bit or 256-bit, or ISAAC encryption. AES is the US Government standard, selected using an open selection process, to replace DES and 3DES encryption. AES is required by many US government regulations.

The ET-3302 is Ethernet only, and is in a very compact box. The ET-6600 and ET-6690, with both Ethernet and serial connections are in a slightly larger box.

ET-6600 units can be connected Ethernet to Ethernet or serial to serial. The serial connection can also be used as an automatic fall-back connection should the Ethernet fail.

The ET series operates through firewalls with only one port of your choice opened. It bridges all Ethernet protocols including IPX, IP, Netbuei, and other non-routable proprietary protocols. It is often used to transport multi-cast IP

All ET family products interoperate. All may be configured as a partner with any other unit. For example, the lower cost ET-6600 or ET-3302 models are often used as partners with the high performance ET-6602 or ET-6630. The higher performance units are often used with hundreds of client locations, high performance VOIP, and complex networks.

The ET series is straight-forward, easy to configure and maintain. The ET series has state-of-the-art AES encryption security without the configuration complexity of VPN.

For encryption of serial RS-232 links not involving ethernet or IP, see our SE-6600 product line.

Due to the encryption employed in these products, ET series products are export controlled items and are regulated by the Bureau of Industry and Security (BIS) of the U.S. Department of Commerce. The ET-6600, ET-6690, and ET-3302 are classified as mass market encryption devices and may not be exported or shipped for re-export to restricted countries in Country Group E:1. They are shippable to most other countries.





  • Two Ethernet ports:

  • ET-3302

    Protocol Features:

    ET-6600 and ET-6690 - Performance:

    ET-3302 - Performance:


    Controls   (DIP switch:)




    The ET family products create an encrypted tunnel which passes Ethernet packets between two trusted LANs. All Ethernet protocols are bridged between two units. The ET only operates in conjunction with other ET units. One unit is required for each location. Multiple units may be connected to the same host unit. All ET series units are compatible.

    Download a copy of the manual.

    The Facts, Please.

    Read the encryptor FAQ for quick answers to questions others have asked. Just click here.

    All DCB ethenet encryptors operate similarly, with differences being in the protocols, capabilities, and authentication methods. Since the topology is comparable for all of them, we show application notes for all these products together.

    UT Product Security In Perspective
    This document provides an overview of the UT security perspective as well as best practices for configuring UT encryptors.

    Redundancy Techniques Using DCB Tunnel Devices and Software.
    Users have come to rely on DCB tunnel products to implement secure networks for mission critical applications in which downtime must be kept to a minimum. Thus it is not unusual for customers to ask questions about techniques that may be applied to make the tunnel network more robust. This document describes some of those techniques with examples.

    Quick-start guide to the XT-3306.
    This application note guides the new XT-3306 user from opening the boxes to having a working encrypted tunnel between two XT-3306 units on a test bench. Step-by-step instructions make it quick and painless to learn the configuration process. One difference between the XT and the UT/ET families is that the XT allows the selection of TCP and UDP protocols for the tunnel path.

    Troubleshooting guide for the above Quick-start.
    If it didn't go well and doesn't immediately work, this guide offers some troubleshooting hints. Most people won't need this, but it's here if you do.

    Encrypted Bridge Installation Option
    An application note describing an appliance-like installation that allows the Tunnel to be located anywhere on the local LAN. Known around DCB as the "Single-Port Installation".

    Using the UT Encrypted Bridges and UT-SOFT with IP Multicast.
    Discusses applying the UT products to transport VOIP multicast via non-multicast wide area networks. Examples showing IP voice dispatch radios for public service agencies. The UT supports multi-cast IP over normal uni-cast networks and allows a private multi-cast network to span multiple IP networks. The UT-SOFT software client allows any PC to be a securely connected node on a remote network

    Motorola MIP 5000 VoIP Radio Console VPN Solution Guide
    This Motorola produced MIP 5000 VoIP Radio Console VPN Solution Guide features a virtual private network (VPN) solution that has been tested with MIP 5000 VoIP Radio Console. The VPN solution uses a pair of encrypted Ethernet bridges to provide a secure Ethernet tunnel between the dispatch center and a remote MIP 5000 console. The secure Ethernet tunnel supports a remote console operator receiving audio from and transmitting audio to radio channels and other MIP 5000 consoles using AES encryption.

    UT Tunnel Installation Note - "Living On a Wild Feed... Safely"
    This short application note summarizes the options and requirements for directly connecting the untrusted interface of UT encrypted tunnels to the Internet. Yes, the UT tunnels may be safely living on the wild side of your firewalls and if properly configured appear to be a "black hole" to your adversaries!

    Using the UT for Remote Management Applications Since the UT along with UT-Soft enables a remote workstation to have a virtual presence on a remote LAN segment, it's quite useful for network monitoring and analysis, similar to a RMON without the headaches. Download an application note that discusses using UT-Soft and our UT servers for remote LAN network montoring.

    The UT series operates similarly to our ET series encrypted tunnel. The main difference between the two product lines is that the UT uses UDP/IP protocol for the tunnel link while the ET uses TCP/IP for the tunnel link protocol. The following ET application notes apply to the UT as well as the ET series.

    ET Encrypted Bridge Quick-Start Installation Guide
    A cookbook style quick start guide to installing the ET Encrypted Bridges. Illustrates common usage examples with fill-in-the-blank instructions.

    ET-3302/6600 Encrypted Bridge Applications
    Some ways the ET products are being used to tunnel IP traffic in the real world.

    Using the ET-6601 Encrypted Bridge with EVDO & Wifi
    Discusses using the ET-6601 with high speed cellular modems and 802.11 Wifi wide area connections.

    ET Encrypted Bridge Installation Option
    An application note describing an appliance-like installation that allows the ET to be located anywhere on the local LAN. Known around DCB as the "Single-Port Installation".

    Using the ET Encrypted Bridges with 801.Q VLANs
    Discusses configuring the ET products to handle 801.Q VLAN traffic. The ET supports 801.Q VLAN tagged packets, and allows a VLAN to span multiple IP networks.

    Using the ET Encrypted Bridges with IP Multicast.
    Discusses applying the ET products to transport VOIP multicast via non-multicast wide area networks. Examples showing IP voice dispatch radios for public service agencies. The ET supports multi-cast IP over normal uni-cast networks and allows a private multi-cast network to span multiple IP networks.

    Automating Dial-Up Router and Bridge PPP Connections
    An application note that details one common method of automating the use of IP-6600 routers and ET-6600 bridges to dial multiple remote locations on a scheduled or automated basis.

    Applications Drawing


    Questions? Phone us toll free at 800-432-2638

    Due to the nature of these products,
    we prefer that you phone us and discuss your application prior to ordering.

    Item Number Description Price Buy Now!
    ET-6600 Encrypted Ethernet Tunnel Appliance with Two Async Ports, Two LAN Ports, 6 VDC w/ 120VAC supplied $ 489 Qty:
    ET-6690 Encrypted Ethernet Tunnel Appliance with one async port, one modem port, Two LAN Ports, 6 VDC w/ 120VAC supplied $ 789 Qty:
    ET-3302 Encrypted Ethernet Tunnel Appliance with 2 LAN Ports, 4 port Switch, 10-24 VDC w/ 120VAC supplied $ 389 Qty:
    ET6600-12VDC 9-18 VDC internal power supply option for ET-6600, ET-6690 $ 75 Qty:
    ET6600-24VDC 18-36 VDC input internal power supply option for ET-6600, ET-6690 $ 75 Qty:
    ET6600-48VDC 36-72 VDC internal power supply option for ET-6600, ET-6690 $ 75 Qty:
    9501083 125 VDC input external power supply option (for ET-3302, ET-6600, ET-6690) $ 125 Qty:
    9801087 36-72 VDC input external power supply option for ET-3302 $ 75 Qty:

    Data Comm for Business Inc.
    2949 County Road 1000 E
    Dewey, Il 61840
    Voice: 217-897-6600
    Toll Free: 800-4-DCB-NET
    Toll Free: 800-432-2638
    Email: Contact Page
    Fax: 217-897-8023
    All DCB web pages copyright ©1995--2017 Data Comm for Business, All rights reserved.
    EtherPath®, EtherSeries®, EtherPoll®, EtherBridge® and EtherModem® are Registered Trademarks of Data Comm for Business, Inc.