XT Encrypted Ethernet Tunnel Appliance



XT Encrypted Ethernet Tunnel Family

  • Privately controlled VPN Server appliance with hardware and software clients
  • Creates encrypted or non-encrypted tunnels through WAN ethernet links
  • Ideal for voice, video, VOIP, and ROIP tunnelling applications
  • Client software is available for PCs
  • Industrial rated products
  • AC and DC power supply options
  • Models with 10/100/1000 Base-T Ethernet interfaces
  • Supports dynamic DNS
  • Some models contain an internal four port switch
  • Models with multiple independent ethernet ports
  • Easy to setup and maintain
  • Each VPN server unit supports multiple client units
  • May be configured as a server, client, or both
  • Tunnels multicast and all other ethernet protocols over either UDP/IP or TCP/IP links
  • AES 128, 192 or 256 bit encryption
  • Any unit may be configured for primary and redundant connections
  • Bridge/Tunnel supports 4,096 MAC addresses
  • Remote PCs appear to be on the local network due to our bridging technology
  • Supports 802.1Q tagged V-LAN trunks
  • Extensive filtering on many combinations of MAC, IP, and Protocol conditions
  • Auxillary single Port Terminal Server Functionality
  • NAT friendly
  • Extensive logging and diagnostic tools
  • 100% Compatible with other DCB tunnels... UT, ET, and XT series products of any vintage interoprate
  • UT-Soft software client turns any remote PC into an XT client
img
XT-hEX Front View
img
UT-Soft
Model Maximum Throughput
(Varies with Packet size)
Client
sites
Base
Price
XT-3303 20 Mbps (-40 to +70C) 8 $ 675
XT-3305 20 Mbps (-10 to +45C) Discontinued 8 $ 489
XT-hEX 20 Mbps (-40 to +60C) 8 $ 489
XT-3305-S 20 Mbps (-10 to +45C) Discontinued 8 $ 575
XT-6606 63 Mbps 50 $ 1995
XT-6632 700-789 Mbps 128 $ 4695
UT-SOFT Software Client for Above None $ 199

img
XT-3303 Front View

img
XT-3305 Front View

img
XT-6606 Front View

img XT-6632 Front View

Quick Links

Description
Specifications
How To Order
Common Features
XT-3305 Features
XT-hEX Features
XT-6606 Features
XT-6632 Features
Application Notes
Download a PDF copy of the XT-3303 data sheet
Download a PDF copy of the XT-hEX data sheet
Download a PDF copy of the XT-6606 data sheet
Download a PDF copy of the XT-6632 data sheet
View the UT-Soft data sheet
Download a PDF copy of the XT User Manual


Common Applications

  • Tunneling multicast voice and video through public and/or private networks using efficient unicast UDP/IP
  • VLAN –Tunnel multiple VLAN segments through an external IP network
  • Provide a private hardware VPN server and client network
  • Utilities, NERC & CIPS: Critical Infrastructure Protection, gas and oil production, pipelines, electric generation, transmission and distribution
  • Retail – Stores, kiosks, credit card machines --- especially those using wireless links
  • Law Enforcement – Small remote offices
  • Medical – AES encryption meets HIPAA requirement for securing data over open networks such as the Internet. Ideal for emergency and portable medical operations.
  • Field personnel working in temporary and remote locations.
  • Financial industry – Additional security on internal corporate links, branch offices, ATM machines, key personnel remote secure access.
  • Added security within a large corporate network
  • Temporary remote locations... remote broadcast, ENG, emergency dispatch
  • Remote network monitoring via the Internet
  • CIPS: Secure remote SCADA networks, extend the Electronic Security Perimeter

The XT-3305 was discontinued. Please consider the new XT-hEX, XT-3303, or XT-6606 as a similar priced alternative.

DESCRIPTION

XT products create an encrypted tunnel through IP networks. They create an encrypted Layer 2 tunel via Layer 3 IP networks. In it's most simple form, the XT is a "lump in the cord" between a protected LAN and an unprotected WAN.

XTs use either UDP/IP or TCP/IP for transport between units, and are compatible with other XT units as well as DCB's UT and ET products. The UT-Soft software client also works well with XT servers to provide a remote PC client.

XT series products operate in server-client pairs (or using multiple clients and servers in a system).

The XT series encrypts the path between units using AES encryption. AES is the US Government standard. 128.192, or 256 bit AES encryption are supported.

Depending upon the model, XT trusted ports are either ethernet 10/100BaseT or 10/100/1000BaseT. The WAN, or untrusted, data ports are ethernet ports running 10/100BaseT or 10/100/1000BaseT. WAN port data can be sent encrypted or unencrypted. If present, the serial port is used only for setup.

The XT tunnels operate through firewalls with only one UDP or TCP port of your choice opened. It bridges all ethernet protocols including IPX, IP, NetBEUI, VOIP, ROIP, and other proprietary protocols as well as multi-cast. The XT series is straight-forward, easy to configure and maintain. Each XT encrypts an entire location for 100s of PCs and other devices.

Units configured as a server typically have a fixed IP address. Clients may have fixed IP addresses or obtain a dynamic address. Dynamic DNS is also supported for server locations that do not have a fixed address available.

Upon power-up, the clients attempt to create a persistant connection to the configured server. If a redundant server is configured, there is automatic fail-over between the primary and redundant server with automatic recovery when the primary link is again available.

Some XT products contain a serial port may be configured as a single port terminal server. This allows the XT to interoperate with DCB's EtherPoll SCADA communications system and other encrypted XT devices. This also provides an encrypted connection for the serial data.

The UT-Soft software allows most Windows PCs to become a stand-alone client without the need for client hardware. Supported on most modern versions of X86 (Not ARM) MS Windows including Windows 11 and Windows emulation on Apple computers. UTSoft is not compatible with Windows Server 2019 and 2022. It's ideal for ad-hoc laptop and tablet connections via the untrusted network.

The XT series provides state-of-the-art straight-forward, easy to configure AES encryption security without the configuration complexity of normal VPNs.

For encryption of serial RS-232 links not involving ethernet or IP, see our SE-6600 product line.

XT series products are export controlled items regulated by the Bureau of Industry and Security (BIS) of the U.S. Department of Commerce. Most devices are eligible for export exception ENC and may be exported to most countries. They may not be exported or shipped for re-export to restricted countries in Country Group E:1. Some models require specific export license. Read our Encryption Product Export Statement here for more specifics.


SPECIFICATIONS

XT Common Features


XT-3303 Features


XT-3305 (discontinued) Features


XT-hEX Features


XT-3305-S(Discontinued)Features


XT-6606 Specifications


XT-6632 Specifications

UT-Soft Specifications


APPLICATIONS

How it works

The XT family products create an encrypted tunnel which passes Ethernet packets between two trusted LAN segments. All ethernet protocols are bridged between the units. The XT operates in conjunction with other XT, ET, UT units and UT-Soft. One unit is required for each location. Multiple client units may be connected to the same host unit, and a client may be connected to multiple host units (daisy-chained operation). A host unit may be configured to block client-unit to client-unit connections, or to allow them. All XT series units are compatible. The following application notes were written for the UT and ET series products. The concepts and many operational details are identical to those of the XT products.

Just The Facts, Please.

Read the encryptor FAQ for quick answers to questions others have asked. Just click here.
Quick-start guide to the XT family products.
This application note guides the new XT user from opening the boxes to having a working encrypted tunnel between two XT units on a test bench. Step-by-step instructions make it quick and painless to learn the configuration process. Uses the XT-hEX as an example, but also covers other XT products.

Troubleshooting guide for the above Quick-start.
If it didn't go well and doesn't immediately work, this guide offers some troubleshooting hints. Most people won't need this, but it's here if you do.


What Do Those Tunnel Log Entries Mean?
When analyzing logs from DCB Tunnels (XT, UT, ET, and FT), there are often log entries that are surprising to the new user. We discuss those here.


Configuring the LAN3 on the XT-hEX, a Quick-start guide.
Most people won't need this, but if you want to use the third LAN port on the XT-hEX, this information will help you configure it.


All DCB ethenet encryptors operate similarly, with differences being in the protocols, capabilities, and authentication methods. Since the topology is comparable for all of them, we show application notes for all these products together.

DCB's Encryption Product Export Statement
Some of our encryption products are export controlled items and are regulated by the Bureau of Industry and Security (BIS) of the U.S. Department of Commerce. Some are classified as mass market encryption devices and may not be exported or shipped for re-export to restricted countries in Country Group E:1. They are exportable to most other countries. Read our Encryption Product Export Statement here for more specifics.

Using XT Tunnels with IP Radio Dispatch Systems.
Radio installers rely on DCB tunnel products to implement secure networks for mission critical applications. DCB Encryptors (XT, UT, and ET roducts) enable IP dispatching across multiple networks. They remove the multi-cast problem faced in many IP network installations so are frequently used along with Telex, Motorola, Kenwood, Harris, Zetron, AVTEC, and other two-way radio consoles. This document describes some of those techniques with examples we've seen at PSAPs and other dispatch centers.

Tunnel Product Security In Perspective.
Our encrypted tunnel appliances provides a LAN -to- LAN encrypted tunnel between locations. It employs a layer three (UDP/IP or TCP/IP) connection between two or more tunnel devices to create a secure, AES encrypted tunnel. For export purposes, the Some models are considered a Mass Market Encryption Device by the Department of State Bureau of Industrial Security and are export limited.

This product line meets HIPPA and most government standards for non-classified data transfer. However, it is not NIST FIPS 140-2 approved. For a FIPS 140 approved product, the (more expensive) FT line of encryption appliances is required. This note discusses the security implications of using our encrypted tunnels.


Redundancy Techniques Using DCB Tunnel Devices and Software.
Users have come to rely on DCB tunnel products to implement secure networks for mission critical applications in which downtime must be kept to a minimum. Thus it is not unusual for customers to ask questions about techniques that may be applied to make the tunnel network more robust. This document describes some of those techniques with examples.
Quick-start guide to the XT-3306.
This application note guides the new XT-3306 user from opening the boxes to having a working encrypted tunnel between two XT-3306 units on a test bench. Step-by-step instructions make it quick and painless to learn the configuration process. One difference between the XT and the UT/ET families is that the XT allows the selection of TCP and UDP protocols for the tunnel path.

Troubleshooting guide for the above Quick-start.
If it didn't go well and doesn't immediately work, this guide offers some troubleshooting hints. Most people won't need this, but it's here if you do.

Quick-start guide to the UT-3302.
This application note guides the new UT-3302 user from opening the boxes to having a working encrypted tunnel between two UT-3302 units on a test bench. Step-by-step instructions make it quick and painless to learn the configuration process.

Troubleshooting guide for the above UT-3302 Quick-start.
If it didn't go well and doesn't immediately work, this guide offers some troubleshooting hints. Most people won't need this, but it's here if you do.

Encrypted Bridge Installation Option
An application note describing an appliance-like installation that allows the Tunnel to be located anywhere on the local LAN. Known around DCB as the "Single-Port Installation".

Using the UT Encrypted Bridges and UT-SOFT with IP Multicast.
Discusses applying the UT products to transport VOIP multicast via non-multicast wide area networks. Examples showing IP voice dispatch radios for public service agencies. The UT supports multi-cast IP over normal uni-cast networks and allows a private multi-cast network to span multiple IP networks. The UT-SOFT software client allows any PC to be a securely connected node on a remote network

Motorola MIP 5000 VoIP Radio Console VPN Solution Guide
This Motorola produced MIP 5000 VoIP Radio Console VPN Solution Guide features a virtual private network (VPN) solution that has been tested with MIP 5000 VoIP Radio Console. The VPN solution uses a pair of encrypted Ethernet bridges to provide a secure Ethernet tunnel between the dispatch center and a remote MIP 5000 console. The secure Ethernet tunnel supports a remote console operator receiving audio from and transmitting audio to radio channels and other MIP 5000 consoles using AES encryption.

UT Tunnel Installation Note - "Living On a Wild Feed... Safely"
This short application note summarizes the options and requirements for directly connecting the untrusted interface of UT encrypted tunnels to the Internet. Yes, the UT tunnels may be safely living on the wild side of your firewalls and if properly configured appear to be a "black hole" to your adversaries!

Using the UT for Remote Management Applications Since the UT along with UT-Soft enables a remote workstation to have a virtual presence on a remote LAN segment, it's quite useful for network monitoring and analysis, similar to a RMON without the headaches. Download an application note that discusses using UT-Soft and our UT servers for remote LAN network montoring.

ET Encrypted Bridge Quick-Start Installation Guide
A cookbook style quick start guide to installing the ET Encrypted Bridges. Illustrates common usage examples with fill-in-the-blank instructions.


ET-3302/6600 Encrypted Bridge Applications
Some ways the ET products are being used to tunnel IP traffic in the real world.


Using the ET-6601 Encrypted Bridge with EVDO & Wifi
Discusses using the ET-6601 with high speed cellular modems and 802.11 Wifi wide area connections.

ET Encrypted Bridge Installation Option
An application note describing an appliance-like installation that allows the ET to be located anywhere on the local LAN. Known around DCB as the "Single-Port Installation".


Using the ET Encrypted Bridges with 801.Q VLANs
Discusses configuring the ET products to handle 801.Q VLAN traffic. The ET supports 801.Q VLAN tagged packets, and allows a VLAN to span multiple IP networks.


Using the ET Encrypted Bridges with IP Multicast.
Discusses applying the ET products to transport VOIP multicast via non-multicast wide area networks. Examples showing IP voice dispatch radios for public service agencies. The ET supports multi-cast IP over normal uni-cast networks and allows a private multi-cast network to span multiple IP networks.

Automating Dial-Up Router and Bridge PPP Connections
An application note that details one common method of automating the use of IP-6600 routers and ET-6600 bridges to dial multiple remote locations on a scheduled or automated basis.


Applications Drawing


Questions? Phone us toll free at 800-432-2638

You may order these on-line, but if this is your first XT installation, we prefer that you phone us and discuss your application prior to ordering. Our consultations are always free!

Item Number Description Price Buy Now!
XT-3303 Encrypted XT Ethernet Tunnel Appliance (includes 120VAC power supply) $ 675 Qty:
XT-hEX Encrypted XT Ethernet Tunnel Appliance (includes 120VAC power supply)
$ 489 Qty:
9000030 Unterminated DIN plug 6' cord (used for 12 and 24 VDC input) $ 9 Qty:
9501091 36-72 VDC external power supply option $ 75 Qty:
XT-6606 Encrypted XT Ethernet Tunnel Appliance (Includes 120VAC power supply) $ 1995 Qty:
9501095 12 VDC regulated external power supply option for XT-6606 $ 75 Qty:
9501096 24 VDC regulated external power supply option for XT-6606 $ 75 Qty:
9501097 36-72 VDC external power supply option for XT-6606 $ 75 Qty:
6013006 Optional DIN rail mounting clips $ 14 Qty:
XT-6632 Encrypted XT Ethernet Tunnel Appliance ( 120VAC power ) $4695 Qty:
UT-SOFT Encrypted Ethernet Tunnel Client Software, Price is per unit, 1 to 5 units $ 199 Qty:
UT-SOFT Encrypted Ethernet Tunnel Client Software, Price is per unit, 6 to 9 units $ 180 Qty:

img
Data Comm for Business Inc.
2949 County Road 1000 E
Dewey, Il 61840
Voice: 217-897-6600
Toll Free: 800-4-DCB-NET
Toll Free: 800-432-2638
Email: Contact Page
Web: www.dcbnet.com
Fax: 217-897-8023
All DCB web pages copyright ©1995- Data Comm for Business, All rights reserved.
EtherPath®, EtherSeries®, EtherPoll®, EtherBridge® and EtherModem® are Registered Trademarks of Data Comm for Business, Inc.