Support for 900 MHz, 2.4, 4.9 and 5.8 GHz WiFi mini-PCI cards from Ubiquiti
Supports dynamic DNS
Set up unit as host or client device
Extensive statistics logging and diagnostic tools
Tunnels multicast and all ethernet protocols
AES-128, AES-192, and AES-256 bit encryption
Ethernet to ethernet
Bridge/Tunnel supports 4,096 MAC addresses
Remote PCs appear to be on the local network
Bridges 802.1Q tagged V-LAN trunks
Extensive filtering on MAC, IP, and Protocols
ET-6602 Front View
ET-6602 Rear View
The ET-6602 was released in 2009 and replaced with the XT family in 2019. We've depleted our inventory.
We recommend the higher performing XT family products as a replacement. The newer XT Family of encrypters offers increased throughput and is 100% compatible with all ET products. click here!
VLAN – Ideal for tunneling multiple VLAN segments through an external IP network
Tunneling multicast voice and video through public and/or private networks
Serving remote offices over tunneled networks to ease network administration, provide remote file and printer access
Utilities – Gas and oil production, pipelines, electric
generation, transmission and distribution
Retail – Stores, kiosks, credit card machines ---
especially those using wireless links
Law Enforcement – Small remote offices
Medical – AES encryption of the ET-6600 meets HIPAA
requirement for securing data over open networks such as the
Internet. The medical industry is mandated by HIPAA to meet
HIPAA privacy and security requirements over open networks.
Real Estate – Connecting to and updating the database of
listed homes.
Field sales personnel working out of the home, hotel rooms
wired for high speed Internet access.
Financial industry – Additional security on internal
corporate links, branch offices, ATM machines, key personnel
remote secure access.
Remote office with more than one device, with the ET-6600
shared with switch or hub.
The ET-6602 creates an encrypted tunnel through IP networks. It features three Ethernet LAN ports, 2 USB ports and a serial port which is used for initial setup.
The ET-6602 encrypts data between private networks using the public Internet or any other TCP/IP network as the transport. The ET-6602 also supports USB cellular broadband modems and Ubiquiti mini-PCI Wifi cards. The ET series products operate in server-client pairs (or using multiple clients and servers in a system). The ET-6602 can be a server unit for other ET-6602s, ET-6600s or ET-3302s. The ET-6602 can also be a client device bridging it's local LAN to another ET-6602, ET-6604 or ET-6620 configured as a server. The ET-6602 supports up to 50 clients, the ET-6604 and ET-6620 support 100 or more remote ET client locationss.
The ET series uses AES encryption. AES is the US Government standard, selected using an open selection process, to replace DES and 3DES encryption.
The ET-6602 trusted port is ethernet 10/100BaseT. The WAN, or untrusted, data port is an ethernet port, internal Wifi, or USB cellular broadband. WAN port data can be sent encrypted or unencrypted. The serial port is used only for setup.
The ET series operates through firewalls with only one IP port of your choice opened. It bridges all ethernet protocols including IPX, IP, NetBEUI, VOIP, and other proprietary protocols as well as multi-cast. The ET series is straight-forward, easy to configure and maintain. The ET series has state-of-the-art AES encryption security without the configuration complexity of typical VPN equipment. One ET encrypts a location for 100s of PCs and other devices.
The server typically has a fixed IP address. Clients may have fixed IP addresses or obtain a dynamic address. Dynamic DNS is also supported for server locations that do not have a fixed address available. For larger host installations with 100's or 1000's of clients, Radius servers may be used for client authentication.
For encryption of serial RS-232 links not involving ethernet or IP, see our SE-6600 product line.
Due to the encryption employed in these products, ET series products are export controlled items and are regulated by the Bureau of Industry and Security (BIS) of the U.S. Department of Commerce. The ET-6600, ET-6602, ET-6690, and ET-3302 are classified as mass market encryption devices and may not be exported or shipped for re-export to restricted countries in Country Group E:1. They are shippable to most other countries.
The ET family products create an encrypted tunnel which passes Ethernet packets
between two trusted LAN segments. All ethernet protocols are bridged between the ET
units. The ET only operates in conjunction with other ET units. One unit is
required for each location. Multiple client units may be connected to the same host
unit, and a client may be connected to multiple host units (daisy-chained operation). A host unit may be configured to block client-unit to client-unit connections, or to allow them. All ET series units are compatible.
This guide steps through the process of adding a self-signed web certificate to a Windows computer certificate store. The purpose is to eliminate the security warning, displayed by the web browser, when connected to the device. Once the certificate is installed, it can serve as verification that you are communicating with your device and not an impostor device.
This application note guides the new XT user from opening the boxes to having a working encrypted tunnel between two XT units on a test bench. Step-by-step instructions make it quick and painless to learn the configuration process. Uses the XT-hEX as an example, but also covers other XT products.
Most people won't need this, but if you want to use the third LAN port on the XT-hEX, this information will help you configure it.
All DCB ethenet encryptors operate similarly, with differences being in the protocols, capabilities, and authentication methods. Since the topology is comparable for all of them, we show application notes for all these products together.
Some of our encryption products are export controlled items and are regulated by the Bureau of Industry and Security (BIS) of the U.S. Department of Commerce. Some are classified as mass market encryption devices and may not be exported or shipped for re-export to restricted countries in Country Group E:1. They are exportable to most other countries. Read our Encryption Product Export Statement here for more specifics.
Radio installers rely on DCB tunnel products to implement secure networks for mission critical applications. DCB Encryptors (XT, UT, and ET roducts) enable IP dispatching across multiple networks. They remove the multi-cast problem faced in many IP network installations so are frequently used along with Telex, Motorola, Kenwood, Harris, Zetron, AVTEC, and other two-way radio consoles. This document describes some of those techniques with examples we've seen at PSAPs and other dispatch centers.
Our encrypted tunnel appliances provides a LAN -to- LAN encrypted tunnel between locations. It employs a layer three (UDP/IP or TCP/IP) connection between two or more tunnel devices to create a secure, AES encrypted tunnel. For export purposes, the Some models are considered a Mass Market Encryption Device by the Department of State Bureau of Industrial Security and are export limited.
This product line meets HIPPA and most government standards for non-classified data transfer. However, it is not NIST FIPS 140-2 approved. For a FIPS 140 approved product, the (more expensive) FT line of encryption appliances is required. This note discusses the security implications of using our encrypted tunnels.
Users have come to rely on DCB tunnel products to implement secure networks for mission critical applications in which downtime must be kept to a minimum. Thus it is not unusual for customers to ask questions about techniques that may be applied to make the tunnel network more robust. This document describes some of those techniques with examples.
This application note guides the new XT-3306 user from opening the boxes to having a working encrypted tunnel between two XT-3306 units on a test bench. Step-by-step instructions make it quick and painless to learn the configuration process. One difference between the XT and the UT/ET families is that the XT allows the selection of TCP and UDP protocols for the tunnel path.
This application note guides the new UT-3302 user from opening the boxes to having a working encrypted tunnel between two UT-3302 units on a test bench. Step-by-step instructions make it quick and painless to learn the configuration process.
An application note describing an appliance-like installation that allows the Tunnel to be located anywhere on the local LAN. Known around DCB as the "Single-Port Installation".
Discusses applying the UT products to transport VOIP multicast via non-multicast wide area networks. Examples showing IP voice dispatch radios for public service agencies. The UT supports multi-cast IP over normal uni-cast networks and allows a private multi-cast network to span multiple IP networks. The UT-SOFT software client allows any PC to be a securely connected node on a remote network
This Motorola produced MIP 5000 VoIP Radio Console VPN Solution Guide features a virtual private network (VPN) solution that has been tested with MIP 5000 VoIP Radio Console. The VPN solution uses a pair of encrypted Ethernet bridges to provide a secure Ethernet tunnel between the dispatch center and a remote MIP 5000 console. The secure Ethernet tunnel supports a remote console operator receiving audio from and transmitting audio to radio channels and other MIP 5000 consoles using AES encryption.
This short application note summarizes the options and requirements for directly connecting the untrusted interface of UT encrypted tunnels to the Internet. Yes, the UT tunnels may be safely living on the wild side of your firewalls and if properly configured appear to be a "black hole" to your adversaries!
Using the UT for Remote Management Applications Since the UT along with UT-Soft enables a remote workstation to have a virtual presence on a remote LAN segment, it's quite useful for network monitoring and analysis, similar to a RMON without the headaches. Download an application note that discusses using UT-Soft and our UT servers for remote LAN network montoring.
An application note describing an appliance-like installation that allows the ET to be located anywhere on the local LAN. Known around DCB as the "Single-Port Installation".
Discusses configuring the ET products to handle 801.Q VLAN traffic. The ET supports 801.Q VLAN tagged packets, and allows a VLAN to span multiple IP networks.
Discusses applying the ET products to transport VOIP multicast via non-multicast wide area networks. Examples showing IP voice dispatch radios for public service agencies. The ET supports multi-cast IP over normal uni-cast networks and allows a private multi-cast network to span multiple IP networks.
An application note that details one common method of automating the use of IP-6600 routers and ET-6600 bridges to dial multiple remote locations on a scheduled or automated basis.
Questions? Phone us toll free at 800-432-2638
Due to the nature of this product, we prefer that you phone us and discuss your application prior to ordering this product.
Data Comm for
Business Inc.
2949 County Road 1000 E
Dewey, Il 61840