UT-6630 Gigabit Encrypted Ethernet Tunnel



Encrypted Ethernet Tunnel

  • Sustained AES encryption throughput greater than 230 Mbps
  • Two 10/100/1000 BaseT ethernet ports
  • Easy to setup and maintain
  • Supports up to 128 UT-3302 or UT-6602 clients
  • Interoperates with UT-3302 and UT-6602 client devices
  • Set unit up as server or client device
  • Extensive statistics logging and diagnostic tools
  • Tunnels all ethernet protocols, not just IP
  • AES or other encryption techniques
  • Ethernet to ethernet connections
  • Links LAN to LAN with a true tunnel 
  • Passes all ethernet protocols
  • Compact 1U high: stand-alone or rack mounting
  • Bridges 802.1Q tagged V-LAN trunks
img

UT-6630 Front View

Features
Description
Specifications How To Order

General
Indicators (front panel)
Controls
Physical/Electrical

APPLICATION Notes & Manual


  • Tunneling multicast voice and video through public and/or private networks using efficient UDP/IP
  • VLAN – Ideal for tunneling multiple VLAN segments through an external IP network
  • Serving remote offices over tunneled networks to ease network administration, provide remote file and device access
  • Utilities – Gas and oil production, pipelines, electric generation, transmission and distribution
  • Retail – Stores, kiosks, credit card machines --- especially those using wireless links
  • Law Enforcement – Remote offices
  • Medical – AES encryption of the UT-6630 meets HIPAA requirement for securing data over open networks such as the Internet. Ideal for emergency and portable medical operations.
  • Field sales personnel working out of the home, hotel rooms wired for high speed Internet access or cellular broadband.
  • Financial industry – Additional security on internal corporate links, branch offices, ATM machines, key personnel remote secure access.
  • Added security within a large corporate network
  • Office to Home
  • 2 nets at each end, bridged via the Internet
  • Remote network monitoring via the Internet

DESCRIPTION

The UT-6630 creates an encrypted tunnel through IP networks. It features two gigabit ethernet LAN port and a serial port which is used for initial setup and may be used for a PPP link.

The UT-6630 encrypts data between private networks using the public Internet or any other UDP/IP network as the transport.  The UT series products operate in server-client combinations (or using multiple clients and servers in a system). The UT-6630 may be a server unit for other UT-6630s, UT-3302s, or PCs running UT-SOFT client software. The UT-6630 can also be a client device bridging it's local LAN to another UT-6630 or UT-3302 configured as a server. The UT-6630 supports up to 128 simultaneous client UT locations. 

The UT series uses AES encryption. AES is the US Government standard, selected using an open selection process, to replace DES and 3DES encryption.

The UT-6630 trusted and untrusted ports are ethernet 10/100/1000BaseT. .The serial port is used  for initial setup or as a PPP port..

The UT series operates through firewalls with only one UDP port of your choice opened. It bridges all ethernet protocols including IPX, IP, NetBEUI, VOIP, and other proprietary protocols as well as multi-cast. The UT series is straight-forward, easy to configure and maintain. The UT series has state-of-the-art AES encryption security without the configuration complexity of typical VPN equipment. One UT encrypts a location for 100s of PCs and other devices.

The server typically has a fixed IP address. Clients may have fixed IP addresses or obtain a dynamic address. Dynamic DNS is also supported for server locations that do not have a fixed address available.

For encryption of serial RS-232 links not involving ethernet or IP, see our SE-6600 product line.

The UT-6630 serial port is normally used only for setup, but may also be configured as a single port PPP dial in or dial out port.  

Due to the encryption employed in these products, UT series products are export controlled items and are regulated by the Bureau of Industry and Security (BIS) of the U.S. Department of Commerce. The UT-6602 and UT-3302 are classified as mass market encryption devices and may not be exported or shipped for re-export to restricted countries in Country Group E:1. They are shippable to most other countries.  The UT-6630 models may involve more export requirements.


SPECIFICATIONS

General

- Two 10/100/1000BaseT ethernet ports:


Protocol Features:


Indicators


Controls

Physical/Electrical

Environmental


Application Notes:

Click here to download a copy of the manual.



Just The Facts, Please.

Read the encryptor FAQ for quick answers to questions others have asked. Just click here.
Quick-start guide to the XT family products.
This application note guides the new XT user from opening the boxes to having a working encrypted tunnel between two XT units on a test bench. Step-by-step instructions make it quick and painless to learn the configuration process. Uses the XT-hEX as an example, but also covers other XT products.

Troubleshooting guide for the above Quick-start.
If it didn't go well and doesn't immediately work, this guide offers some troubleshooting hints. Most people won't need this, but it's here if you do.


What Do Those Tunnel Log Entries Mean?
When analyzing logs from DCB Tunnels (XT, UT, ET, and FT), there are often log entries that are surprising to the new user. We discuss those here.


Configuring the LAN3 on the XT-hEX, a Quick-start guide.
Most people won't need this, but if you want to use the third LAN port on the XT-hEX, this information will help you configure it.


All DCB ethenet encryptors operate similarly, with differences being in the protocols, capabilities, and authentication methods. Since the topology is comparable for all of them, we show application notes for all these products together.

DCB's Encryption Product Export Statement
Some of our encryption products are export controlled items and are regulated by the Bureau of Industry and Security (BIS) of the U.S. Department of Commerce. Some are classified as mass market encryption devices and may not be exported or shipped for re-export to restricted countries in Country Group E:1. They are exportable to most other countries. Read our Encryption Product Export Statement here for more specifics.

Using XT Tunnels with IP Radio Dispatch Systems.
Radio installers rely on DCB tunnel products to implement secure networks for mission critical applications. DCB Encryptors (XT, UT, and ET roducts) enable IP dispatching across multiple networks. They remove the multi-cast problem faced in many IP network installations so are frequently used along with Telex, Motorola, Kenwood, Harris, Zetron, AVTEC, and other two-way radio consoles. This document describes some of those techniques with examples we've seen at PSAPs and other dispatch centers.

Tunnel Product Security In Perspective.
Our encrypted tunnel appliances provides a LAN -to- LAN encrypted tunnel between locations. It employs a layer three (UDP/IP or TCP/IP) connection between two or more tunnel devices to create a secure, AES encrypted tunnel. For export purposes, the Some models are considered a Mass Market Encryption Device by the Department of State Bureau of Industrial Security and are export limited.

This product line meets HIPPA and most government standards for non-classified data transfer. However, it is not NIST FIPS 140-2 approved. For a FIPS 140 approved product, the (more expensive) FT line of encryption appliances is required. This note discusses the security implications of using our encrypted tunnels.


Redundancy Techniques Using DCB Tunnel Devices and Software.
Users have come to rely on DCB tunnel products to implement secure networks for mission critical applications in which downtime must be kept to a minimum. Thus it is not unusual for customers to ask questions about techniques that may be applied to make the tunnel network more robust. This document describes some of those techniques with examples.
Quick-start guide to the XT-3306.
This application note guides the new XT-3306 user from opening the boxes to having a working encrypted tunnel between two XT-3306 units on a test bench. Step-by-step instructions make it quick and painless to learn the configuration process. One difference between the XT and the UT/ET families is that the XT allows the selection of TCP and UDP protocols for the tunnel path.

Troubleshooting guide for the above Quick-start.
If it didn't go well and doesn't immediately work, this guide offers some troubleshooting hints. Most people won't need this, but it's here if you do.

Quick-start guide to the UT-3302.
This application note guides the new UT-3302 user from opening the boxes to having a working encrypted tunnel between two UT-3302 units on a test bench. Step-by-step instructions make it quick and painless to learn the configuration process.

Troubleshooting guide for the above UT-3302 Quick-start.
If it didn't go well and doesn't immediately work, this guide offers some troubleshooting hints. Most people won't need this, but it's here if you do.

Encrypted Bridge Installation Option
An application note describing an appliance-like installation that allows the Tunnel to be located anywhere on the local LAN. Known around DCB as the "Single-Port Installation".

Using the UT Encrypted Bridges and UT-SOFT with IP Multicast.
Discusses applying the UT products to transport VOIP multicast via non-multicast wide area networks. Examples showing IP voice dispatch radios for public service agencies. The UT supports multi-cast IP over normal uni-cast networks and allows a private multi-cast network to span multiple IP networks. The UT-SOFT software client allows any PC to be a securely connected node on a remote network

Motorola MIP 5000 VoIP Radio Console VPN Solution Guide
This Motorola produced MIP 5000 VoIP Radio Console VPN Solution Guide features a virtual private network (VPN) solution that has been tested with MIP 5000 VoIP Radio Console. The VPN solution uses a pair of encrypted Ethernet bridges to provide a secure Ethernet tunnel between the dispatch center and a remote MIP 5000 console. The secure Ethernet tunnel supports a remote console operator receiving audio from and transmitting audio to radio channels and other MIP 5000 consoles using AES encryption.

UT Tunnel Installation Note - "Living On a Wild Feed... Safely"
This short application note summarizes the options and requirements for directly connecting the untrusted interface of UT encrypted tunnels to the Internet. Yes, the UT tunnels may be safely living on the wild side of your firewalls and if properly configured appear to be a "black hole" to your adversaries!

Using the UT for Remote Management Applications Since the UT along with UT-Soft enables a remote workstation to have a virtual presence on a remote LAN segment, it's quite useful for network monitoring and analysis, similar to a RMON without the headaches. Download an application note that discusses using UT-Soft and our UT servers for remote LAN network montoring.

ET Encrypted Bridge Quick-Start Installation Guide
A cookbook style quick start guide to installing the ET Encrypted Bridges. Illustrates common usage examples with fill-in-the-blank instructions.


ET-3302/6600 Encrypted Bridge Applications
Some ways the ET products are being used to tunnel IP traffic in the real world.


Using the ET-6601 Encrypted Bridge with EVDO & Wifi
Discusses using the ET-6601 with high speed cellular modems and 802.11 Wifi wide area connections.

ET Encrypted Bridge Installation Option
An application note describing an appliance-like installation that allows the ET to be located anywhere on the local LAN. Known around DCB as the "Single-Port Installation".


Using the ET Encrypted Bridges with 801.Q VLANs
Discusses configuring the ET products to handle 801.Q VLAN traffic. The ET supports 801.Q VLAN tagged packets, and allows a VLAN to span multiple IP networks.


Using the ET Encrypted Bridges with IP Multicast.
Discusses applying the ET products to transport VOIP multicast via non-multicast wide area networks. Examples showing IP voice dispatch radios for public service agencies. The ET supports multi-cast IP over normal uni-cast networks and allows a private multi-cast network to span multiple IP networks.

Automating Dial-Up Router and Bridge PPP Connections
An application note that details one common method of automating the use of IP-6600 routers and ET-6600 bridges to dial multiple remote locations on a scheduled or automated basis.


Applications Drawing


How to Order Due to the nature of this product, it is not offered through our on-line store. Please phone us at 800-432-2638 or 217-897-6600 to discuss your encryption applicaions.

Item Number DESCRIPTION Price  Each
UT-6630 Encrypted Ethernet Tunnel Appliance with Two 10/100/1000BaseT ports, 230 Mbps throughput
$ 4695
Other UT series products that interoperate with the UT-6630.
UT-6602 Encrypted Ethernet Tunnel Appliance  Click here for datasheet
$1,489
UT-3302 Encrypted Ethernet Tunnel  Appliance Click here for datasheet $ 389
UT-Soft Software Client for UT Encryption Tunnels Click here for datasheet $ 199

img
Data Comm for Business Inc.
2949 County Road 1000 E
Dewey, Il 61840
Voice: 217-897-6600
Toll Free: 800-4-DCB-NET
Toll Free: 800-432-2638
Email: Contact Page
Web: www.dcbnet.com
Fax: 217-897-8023
All DCB web pages copyright ©1995- Data Comm for Business, All rights reserved.
EtherPath®, EtherSeries®, EtherPoll®, EtherBridge® and EtherModem® are Registered Trademarks of Data Comm for Business, Inc.