UT-3302 Encrypted Ethernet Tunnel



UT-3302 UT-Family compatible Encrypted Ethernet Tunnel

  • Ideal for LAN, voice, and video tunneling applications
  • UT Client software is available for PCs
  • Tunnels multicast + all other Ethernet protocols
  • UT-3302 temperature range of -20 to +70 C
  • Input voltage 10-18 VDC (12V. nominal), external 48, 125 VDC power options
  • UT-3302 is a small, five ethernet port version with VLAN port functionality
  • Integral 4 port switch on the trusted interface
  • AC and DC power supply options
  • Mlulticast Unicast conversion/tunneling
  • Much simpler multicast tunnel than multicast GRE tunnel
  • Ethernet ports: 10/100BaseT, MDI/MDIX
  • One asynchronous serial port for setup, UDP or TCP Server functionality
  • Extensive security features for CIPS compliance
  • Can be set to either client mode or server mode
  • Server unit supports up to 8 remote client UTs
  • Extensive statistics logging and diagnostic tools
  • AES 128, 192 or 256 bit encryption
  • Can be used with or without encryption
  • Uses UDP as the transport protocol
  • Remote PC appears to be on the local network
  • Stand alone, rack mount, DIN clip mount
  • Bridges 802.1Q tagged V-LAN trunks or use VLAN tagging at the port level
  • Extensive filtering on MAC, IP, and Protocols
  • NAT friendly
img
UT-3302 Top View
img
UT-3302 Side View

Features
Description
Specifications
How To Order
General
Protocol Features
Indicators
Physical/Electrical
Application Notes and Manual


Common Applications

  • VOIP dispatch terminals and consoles
  • Encrypted VOIP and encrypted ROIP
  • VOIP multicast VOIP applications
  • Encrypting video connections applications
  • Gas and oil production, pipelines
  • Alternative to GRE tunnel installations
  • Retail – Stores, credit card readers
  • Law Enforcement– Remote offices and multicast ROIP
  • Medical: Meets HIPAA encryption requirements for securely sending medical data
  • Secure remote sales and maintenance staff connections
  • NERC and CIPS compliant WAN connections
  • Support a remote office with one UT device
  • More security to sensitive locations within a corporate network
  • Securely bridge networks over the Internet for lower line costs
  • Remote network monitoring using the Internet for data transport

DESCRIPTION

The UT-3302 is a compact, industrial temperature rated device (Internet Appliance) that tunnels all ethernet protocols (layer2 Ethernet) through any UDP/IP connection. The tunnel can be encrypted with AES or non-encrypted. The UT-3302 features five Ethernet LAN ports, a 4 port switch on trusted interface and a serial setup port.

The UT-3302 encrypts data between private networks using the public Internet or any other network as the transport. This creates a flat, bridged network, a private network within public or private networks.

Each UT-3302 can be a client or server. All UT series products operate in server-client combinations (or using multiple clients and servers in a system). The UT-3302 can be a server unit for other UT-3302s, or PCs running UT-SOFT client software. The UT-3302 can also be a client device bridging it's local LAN to another UT-3302 or UT-6602 configured as a server. The UT-3302 supports up to 8 client UT locations, the UT-6602 supports 50 client UT units. Other models support 100 or more remote UT client locations.

The UT series uses AES 128, 192 or 256 bit encryption. AES is the US Government standard required for Critical Infrastructure Protection (CIPS) networks used in electrical power and utility communications. Additional features support the CIPS requirements such as password criteria, login banners, individual port enable/disable, and others.

Each of the four ethernet ports on the trusted side of the UT may be VLAN tagged (802.1q tagging) and interoperate with other VLAN equipment. Or, the UT connection can be configured as a VLAN trunk.

The UT-3302 network interfaces are Ethernet only. The UT-3302 has external 12, 24 and 48 volt options.

The UT series operates through firewalls with only one port of your choice opened. It bridges all Ethernet protocols including IPX, IP, NetBEUI, SIP, streaming, and other proprietary protocols. The UT series is straight-forward, easy to configure and maintain. The UT series has state-of-the-art AES encryption security without the configuration complexity of VPN.

The serial port of the UT-3302 functions as a TCP/IP or UDP/IP serial port "serial-server" or may be used for initial setup of IP address. The serial port may be used for initial IP address configuration. It interoperates with other DCB EtherPath or EtherPoll serial servers, and may be used to provide an AES encrypted serial link through any UDP/IP network.

For encryption of serial RS-232 links not involving ethernet or IP, see our SE-6600 product line.

Due to the encryption employed in these products, UT series products are export controlled items and are regulated by the Bureau of Industry and Security (BIS) of the U.S. Department of Commerce. The UT-6602 and UT-3302 are classified as mass market encryption devices and may not be exported or shipped for re-export to restricted countries in Country Group E:1. They are shippable to most other countries.


SPECIFICATIONS

General


Protocol Features


Performance:



Indicators


Physical/Electrical

Environmental


APPLICATIONS

How it works

The UT family products create an encrypted tunnel which passes Ethernet packets between two trusted LAN segments. All ethernet protocols are bridged between the UT units. The UT only operates in conjunction with other UT units. One unit is required for each location. Multiple client units may be connected to the same host unit, and a client may be connected to multiple host units (daisy-chained operation). A host unit may be configured to block client-unit to client-unit connections, or to allow them. All UT series units are compatible.

Download a copy of the manual.


Using the UT Encrypted Bridges and UT-SOFT with IP Multicast.
Discusses applying the UT products to transport VOIP multicast via non-multicast wide area networks. Examples showing IP voice dispatch radios for public service agencies. The UT supports multi-cast IP over normal uni-cast networks and allows a private multi-cast network to span multiple IP networks. The UT-SOFT software client allows any PC to be a securely connected node on a remote network

Motorola MIP 5000 VoIP Radio Console VPN Solution Guide
This Motorola produced MIP 5000 VoIP Radio Console VPN Solution Guide features a virtual private network (VPN) solution that has been tested with MIP 5000 VoIP Radio Console. The VPN solution uses a pair of encrypted Ethernet bridges to provide a secure Ethernet tunnel between the dispatch center and a remote MIP 5000 console. The secure Ethernet tunnel supports a remote console operator receiving audio from and transmitting audio to radio channels and other MIP 5000 consoles using AES encryption.

UT Tunnel Installation Note - "Living On a Wild Feed... Safely"
This short application note summarizes the options and requriements for directly connecting the untrusted interface of UT encrypted tunnels to the Internet. Yes, the UT tunnels may be safely living on the wild side of your firewalls and if properly configured appear to be a "black hole" to your adversaries!

Using the UT for Remote Management Applications Since the UT along with UT-Soft enables a remote workstation to have a virtual presence on a remote LAN segment, it's quite useful for network monitoring and analysis, similar to a RMON without the headaches. Download an application note that discusses using UT-Soft and our UT servers for remote LAN network montoring.

The UT series operates similarly to our ET series encrypted tunnel. The main difference between the two product lines is that the UT uses UDP/IP protocol for the tunnel link while the ET uses TCP/IP for the tunnel link protocol. The following ET application notes apply to the UT as well as the ET series.

ET Encrypted Bridge Quick-Start Installation Guide
A cookbook style quick start guide to installing the ET Encrypted Bridges. Illustrates common usage examples with fill-in-the-blank instructions.


ET-3302/6600 Encrypted Bridge Applications
Some ways the ET products are being used to tunnel IP traffic in the real world.


Using the ET-6601 Encrypted Bridge with EVDO & Wifi
Discusses using the ET-6601 with high speed cellular modems and 802.11 Wifi wide area connections.

ET Encrypted Bridge Installation Option
An application note describing an appliance-like installation that allows the ET to be located anywhere on the local LAN. Known around DCB as the "Single-Port Installation".


Using the ET Encrypted Bridges with 801.Q VLANs
Discusses configuring the ET products to handle 801.Q VLAN traffic. The ET supports 801.Q VLAN tagged packets, and allows a VLAN to span multiple IP networks.


Using the ET Encrypted Bridges with IP Multicast.
Discusses applying the ET products to transport VOIP multicast via non-multicast wide area networks. Examples showing IP voice dispatch radios for public service agencies. The ET supports multi-cast IP over normal uni-cast networks and allows a private multi-cast network to span multiple IP networks.

Automating Dial-Up Router and Bridge PPP Connections
An application note that details one common method of automating the use of IP-6600 routers and ET-6600 bridges to dial multiple remote locations on a scheduled or automated basis.


Applications Drawing


Questions? Phone us toll free at 800-432-2638

Due to the nature of this product,
we prefer that you phone us and discuss your application prior to ordering this product.

Item Number Description Price Buy Now!
UT-3302 Encrypted UT ethernet Tunnel Appliance, includes external 120 VAC power supply $ 389 Qty:
9501090 18-35 VDC external power supply option $ 75 Qty:
9501091 36-72 VDC external power supply option $ 75 Qty:
9501081 125 VDC external power supply option $ 125 Qty:

img
Data Comm for Business Inc.
2949 County Road 1000 E
Dewey, Il 61840
Voice: 217-897-6600
Toll Free: 800-4-DCB-NET
Toll Free: 800-432-2638
Email: Contact Page
Web: www.dcbnet.com
Fax: 217-897-1331
Shopping cart is
HACKER SAFE certified sites prevent over 99.9 of hacker crime.
All DCB web pages copyright ©1995--2014 Data Comm for Business, All rights reserved.
EtherPath®, EtherSeries®, EtherPoll®, EtherBridge® and EtherModem® are Registered Trademarks of Data Comm for Business, Inc.