Encrypted Ethernet Tunnel Software Client



UT / XT Family Encrypted Ethernet Tunnel Software Client

  • Creates encrypted or non-encrypted tunnels using UDP/IP
  • Tunnels all Ethernet protocols, including multi-cast
  • AES 128, 192 or 256 bit encryption
  • Compatible with all modern versions of Windows
  • Works with Windows emulation on Apple computers
  • Apears on the PC as an MS Windows Ethernet Adapter
  • The PC looks like a node on the server network
  • Ideal for voice and video transport
  • The PC network connection can be wired or wireless
  • Easy to setup and maintain
  • A PC may have multiple client instances running simultaneously
  • Protocol is NAT friendly
  • Connects only with host end UT /XT hardware products
img

Features
Description
Specifications
How To Order
General
Performance
Installation
Protocol Features
Application Notes and Manual


Common Applications

  • Tunneling multicast voice and video through public and/or private networks using efficient UDP/IP
  • Serving remote laptop users over tunneled networks to ease network administration, provide remote file and device access
  • Utilities – Gas and oil production, pipelines, electric generation, transmission and distribution
  • Retail – Stores, kiosks, credit card machines --- especially those using wireless links
  • Law Enforcement – Individual remote workstations
  • Medical – AES encryption of the UT/XT family meets HIPAA requirement for securing data over open networks such as the Internet. Ideal for emergency and portable medical operations.
  • Field sales personnel working out of the home, hotel rooms wired for high speed Internet access or cellular broadband.
  • Financial industry – Additional security for key personnel remote secure access.
  • Secure remote network monitoring via the Internet

DESCRIPTION

The UT PC client software works in conjuction with a UT or XT fmaily of encryption servers. It allows a PC to participate in the encrypted network without additional hardware at the client location.

The UT PC Client software creates a layer 2 tunnel, which sets it apart from other VPN software. In practical application terms, this feature allows all protocols to pass between the PC and the network on the server side. The protocols include multi-cast, which is often used for VOIP and video applications.

The UT and XT server hardware is available in models that host from 8 to hundreds of clients

The UT/XT series uses AES encryption which is replacing DES/3DES encryption. The encryption can be 128, 192 or 256 bit, or encryption can be turned off.

The UT/XT series operates through firewalls requiring only one UDP/IP port, which can be any port. All Ethernet protocols are bridged, including multi-cast, IPX, IP, NetBEUI, etc. The UT/XT series is straight-forward, easy to configure and maintain.

The UT/XT series has state-of-the-art AES encryption security without the configuration complexity of VPN.

The server typically has a fixed IP address. Clients can have fixed IP addresses or use DHCP to obtain their address. Dynamic DNS is supported in UT ans XT hardware servers.

If you need to attach an entire subnet at a location to the encrypted network, see our complete hardware product line.

For encryption of serial RS-232 links not involving ethernet or IP, see our SE-6600 or SSE product line.

Due to the encryption employed in these products, UT/XT series products are export controlled items and are regulated by the Bureau of Industry and Security (BIS) of the U.S. Department of Commerce. The UT and XT series products may be classified as mass market encryption devices and may not be exported or shipped for re-export to restricted countries in Country Group E:1. They may be shipped to most other countries.


SPECIFICATIONS

General


Protocol Features


Performance




Installation


The UT-SOFT software is suppliled on a CDROM. Each user client instance is configured using a unique software key supplied with the CDROM. The software is installed on a PC using a Windows installer program. When installing the software, the user/administrator enters the software key as part of the installation process. A PC may have more than one instance of the PC Client software operating at the same time. There must be one license purchased for each instance of the software running on a PC.



APPLICATIONS

How it works

The UT-SOFT client software is installed on a Windows PC. Installation is similar to the installation of a network driver. It allows the Windows PC to participate in a UT/XT encrypted tunnel network without requiring UT/XT hardware at the PC site. The UT/XT family products create an encrypted tunnel which passes Ethernet packets between two trusted LAN segments. All ethernet protocols are bridged between the UT/XT units. The UT/XT only operates in conjunction with other UT/XT units. One unit is required for each location. Multiple client units may be connected to the same host unit, and a client may be connected to multiple host units (daisy-chained operation). A host unit may be configured to block client-unit to client-unit connections, or to allow them. All UT/XT series units are compatible.

Download a copy of the manual.

Download the UT-Soft Quick Start Guide.

Download an application note with instructions on matching network adapter settings between XP Windows, UT-Soft, and Telex CSoft.

Download an applications note with instructions on configuring UT-Soft for multiple UT hardware server connections.


The Facts, Please.

Read the encryptor FAQ for quick answers to questions others have asked. Just click here.


All DCB ethenet encryptors operate similarly, with differences being in the protocols, capabilities, and authentication methods. Since the topology is comparable for all of them, we show application notes for all these products together.

UT Product Security In Perspective
This document provides an overview of the UT security perspective as well as best practices for configuring UT encryptors.

Redundancy Techniques Using DCB Tunnel Devices and Software.
Users have come to rely on DCB tunnel products to implement secure networks for mission critical applications in which downtime must be kept to a minimum. Thus it is not unusual for customers to ask questions about techniques that may be applied to make the tunnel network more robust. This document describes some of those techniques with examples.

Quick-start guide to the XT-3306.
This application note guides the new XT-3306 user from opening the boxes to having a working encrypted tunnel between two XT-3306 units on a test bench. Step-by-step instructions make it quick and painless to learn the configuration process. One difference between the XT and the UT/ET families is that the XT allows the selection of TCP and UDP protocols for the tunnel path.

Troubleshooting guide for the above Quick-start.
If it didn't go well and doesn't immediately work, this guide offers some troubleshooting hints. Most people won't need this, but it's here if you do.

Encrypted Bridge Installation Option
An application note describing an appliance-like installation that allows the Tunnel to be located anywhere on the local LAN. Known around DCB as the "Single-Port Installation".

Using the UT Encrypted Bridges and UT-SOFT with IP Multicast.
Discusses applying the UT products to transport VOIP multicast via non-multicast wide area networks. Examples showing IP voice dispatch radios for public service agencies. The UT supports multi-cast IP over normal uni-cast networks and allows a private multi-cast network to span multiple IP networks. The UT-SOFT software client allows any PC to be a securely connected node on a remote network

Motorola MIP 5000 VoIP Radio Console VPN Solution Guide
This Motorola produced MIP 5000 VoIP Radio Console VPN Solution Guide features a virtual private network (VPN) solution that has been tested with MIP 5000 VoIP Radio Console. The VPN solution uses a pair of encrypted Ethernet bridges to provide a secure Ethernet tunnel between the dispatch center and a remote MIP 5000 console. The secure Ethernet tunnel supports a remote console operator receiving audio from and transmitting audio to radio channels and other MIP 5000 consoles using AES encryption.

UT Tunnel Installation Note - "Living On a Wild Feed... Safely"
This short application note summarizes the options and requirements for directly connecting the untrusted interface of UT encrypted tunnels to the Internet. Yes, the UT tunnels may be safely living on the wild side of your firewalls and if properly configured appear to be a "black hole" to your adversaries!

Using the UT for Remote Management Applications Since the UT along with UT-Soft enables a remote workstation to have a virtual presence on a remote LAN segment, it's quite useful for network monitoring and analysis, similar to a RMON without the headaches. Download an application note that discusses using UT-Soft and our UT servers for remote LAN network montoring.

The UT series operates similarly to our ET series encrypted tunnel. The main difference between the two product lines is that the UT uses UDP/IP protocol for the tunnel link while the ET uses TCP/IP for the tunnel link protocol. The following ET application notes apply to the UT as well as the ET series.

ET Encrypted Bridge Quick-Start Installation Guide
A cookbook style quick start guide to installing the ET Encrypted Bridges. Illustrates common usage examples with fill-in-the-blank instructions.


ET-3302/6600 Encrypted Bridge Applications
Some ways the ET products are being used to tunnel IP traffic in the real world.


ET Encrypted Bridge Installation Option
An application note describing an appliance-like installation that allows the ET to be located anywhere on the local LAN. Known around DCB as the "Single-Port Installation".


Using the ET Encrypted Bridges with 801.Q VLANs
Discusses configuring the ET products to handle 801.Q VLAN traffic. The ET supports 801.Q VLAN tagged packets, and allows a VLAN to span multiple IP networks.


Using the ET Encrypted Bridges with IP Multicast.
Discusses applying the ET products to transport VOIP multicast via non-multicast wide area networks. Examples showing IP voice dispatch radios for public service agencies. The ET supports multi-cast IP over normal uni-cast networks and allows a private multi-cast network to span multiple IP networks.

Automating Dial-Up Router and Bridge PPP Connections
An application note that details one common method of automating the use of DCB routers and bridges to dial multiple remote locations on a scheduled or automated basis.


Applications Drawing


Questions? Phone us toll free at 800-432-2638

Due to the nature of this product,
we prefer that you phone us and discuss your application prior to ordering this product.
Each instance of UT-Soft requires a license.

Item Number Description Price Each Buy Now!
UT-SOFT Encrypted Ethernet Tunnel Client Software, Price is per unit, 1 to 5 units $ 199 Qty:
UT-SOFT Encrypted Ethernet Tunnel Client Software, Price is per unit, 6 to 9 units $ 180 Qty:
UT-SOFT Encrypted Ethernet Tunnel Client Software Higher Quantities $ Call

img
Data Comm for Business Inc.
2949 County Road 1000 E
Dewey, Il 61840
Voice: 217-897-6600
Toll Free: 800-4-DCB-NET
Toll Free: 800-432-2638
Email: Contact Page
Web: www.dcbnet.com
Fax: 217-897-8023
All DCB web pages copyright ©1995--2017 Data Comm for Business, All rights reserved.
EtherPath®, EtherSeries®, EtherPoll®, EtherBridge® and EtherModem® are Registered Trademarks of Data Comm for Business, Inc.