The UT PC client software works in conjuction with a UT or XT fmaily of encryption servers. It allows a PC to participate in the encrypted network without additional hardware at the client location.
The UT PC Client software creates a layer 2 tunnel, which sets it apart from other VPN software. In practical application terms, this feature allows all protocols to pass between the PC and the network on the server side. The protocols include multi-cast, which is often used for VOIP and video applications.
The UT and XT server hardware is available in models that host from 8 to hundreds of clients
The UT/XT series uses AES encryption which is replacing DES/3DES encryption. The encryption can be 128, 192 or 256 bit, or encryption can be turned off.
The UT/XT series operates through firewalls requiring only one UDP/IP port, which can be any port. All Ethernet protocols are bridged, including multi-cast, IPX, IP, NetBEUI, etc. The UT/XT series is straight-forward, easy to configure and maintain.
The UT/XT series has state-of-the-art AES encryption security without the configuration complexity of VPN.
The server typically has a fixed IP address. Clients can have fixed IP addresses or use DHCP to obtain their address. Dynamic DNS is supported in UT ans XT hardware servers.
Due to the encryption employed in these products, UT/XT series products are export controlled items and are regulated by the Bureau of Industry and Security (BIS) of the U.S. Department of Commerce. The UT and XT series products may be classified as mass market encryption devices and may not be exported or shipped for re-export to restricted countries in Country Group E:1. They may be shipped to most other countries.
The UT-SOFT software is suppliled on a CDROM. Each user client instance
is configured using a unique software key supplied with the CDROM. The software is installed on a PC using a Windows installer program. When
installing the software, the user/administrator enters the software key as part of the installation process. A PC may have more than one instance of the PC Client software operating
at the same time. There must be one license purchased for each instance of the software running on a PC.
The UT-SOFT client software is installed on a Windows PC. Installation is similar to the installation of a network driver. It allows the Windows PC to participate in a UT/XT encrypted tunnel network without requiring UT/XT hardware at the PC site.
The UT/XT family products create an encrypted tunnel which passes Ethernet packets
between two trusted LAN segments. All ethernet protocols are bridged between the UT/XT
units. The UT/XT only operates in conjunction with other UT/XT units. One unit is
required for each location. Multiple client units may be connected to the same host
unit, and a client may be connected to multiple host units (daisy-chained operation). A host unit may be configured to block client-unit to client-unit connections, or to allow them. All UT/XT series units are compatible.
This application note guides the new XT user from opening the boxes to having a working encrypted tunnel between two XT units on a test bench. Step-by-step instructions make it quick and painless to learn the configuration process. Uses the XT-hEX as an example, but also covers other XT products.
Most people won't need this, but if you want to use the third LAN port on the XT-hEX, this information will help you configure it.
All DCB ethenet encryptors operate similarly, with differences being in the protocols, capabilities, and authentication methods. Since the topology is comparable for all of them, we show application notes for all these products together.
Some of our encryption products are export controlled items and are regulated by the Bureau of Industry and Security (BIS) of the U.S. Department of Commerce. Some are classified as mass market encryption devices and may not be exported or shipped for re-export to restricted countries in Country Group E:1. They are exportable to most other countries. Read our Encryption Product Export Statement here for more specifics.
Radio installers rely on DCB tunnel products to implement secure networks for mission critical applications. DCB Encryptors (XT, UT, and ET roducts) enable IP dispatching across multiple networks. They remove the multi-cast problem faced in many IP network installations so are frequently used along with Telex, Motorola, Kenwood, Harris, Zetron, AVTEC, and other two-way radio consoles. This document describes some of those techniques with examples we've seen at PSAPs and other dispatch centers.
Our encrypted tunnel appliances provides a LAN -to- LAN encrypted tunnel between locations. It employs a layer three (UDP/IP or TCP/IP) connection between two or more tunnel devices to create a secure, AES encrypted tunnel. For export purposes, the Some models are considered a Mass Market Encryption Device by the Department of State Bureau of Industrial Security and are export limited.
This product line meets HIPPA and most government standards for non-classified data transfer. However, it is not NIST FIPS 140-2 approved. For a FIPS 140 approved product, the (more expensive) FT line of encryption appliances is required. This note discusses the security implications of using our encrypted tunnels.
Users have come to rely on DCB tunnel products to implement secure networks for mission critical applications in which downtime must be kept to a minimum. Thus it is not unusual for customers to ask questions about techniques that may be applied to make the tunnel network more robust. This document describes some of those techniques with examples.
This application note guides the new XT-3306 user from opening the boxes to having a working encrypted tunnel between two XT-3306 units on a test bench. Step-by-step instructions make it quick and painless to learn the configuration process. One difference between the XT and the UT/ET families is that the XT allows the selection of TCP and UDP protocols for the tunnel path.
This application note guides the new UT-3302 user from opening the boxes to having a working encrypted tunnel between two UT-3302 units on a test bench. Step-by-step instructions make it quick and painless to learn the configuration process.
Discusses applying the UT products to transport VOIP multicast via non-multicast wide area networks. Examples showing IP voice dispatch radios for public service agencies. The UT supports multi-cast IP over normal uni-cast networks and allows a private multi-cast network to span multiple IP networks. The UT-SOFT software client allows any PC to be a securely connected node on a remote network
This Motorola produced MIP 5000 VoIP Radio Console VPN Solution Guide features a virtual private network (VPN) solution that has been tested with MIP 5000 VoIP Radio Console. The VPN solution uses a pair of encrypted Ethernet bridges to provide a secure Ethernet tunnel between the dispatch center and a remote MIP 5000 console. The secure Ethernet tunnel supports a remote console operator receiving audio from and transmitting audio to radio channels and other MIP 5000 consoles using AES encryption.
This short application note summarizes the options and requirements for directly connecting the untrusted interface of UT encrypted tunnels to the Internet. Yes, the UT tunnels may be safely living on the wild side of your firewalls and if properly configured appear to be a "black hole" to your adversaries!
Using the UT for Remote Management Applications Since the UT along with UT-Soft enables a remote workstation to have a virtual presence on a remote LAN segment, it's quite useful for network monitoring and analysis, similar to a RMON without the headaches. Download an application note that discusses using UT-Soft and our UT servers for remote LAN network montoring.
Discusses applying the ET products to transport VOIP multicast via non-multicast wide area networks. Examples showing IP voice dispatch radios for public service agencies. The ET supports multi-cast IP over normal uni-cast networks and allows a private multi-cast network to span multiple IP networks.