slaider
Communication network

card product

» Products » Communication network » SEC-34 IP Encryptor (VPN)
SEC-34 IP Encryptor (VPN)

1. Overview
VPN encryptor adopts self-designed security operating system and provides comprehensive security functions to meet data security protection needs in various network environments.
Besides data encryption, VPN encryptor can also provide some traditional security functions such as packet filtering, DDOS anti-attack, anti-virus and hot standby etc.

 

2. Typical Application

2.1 Encryption for Satellite Communication Network

In a typical satellite communication network, VPN encryptor can be deployed in front of IDU of each network node to provide encryption protection for the data being transmitted in the satellite communication channel.

And Security Management Center (SMC) can be placed in the center communication node to carry out various security management functions such as key generation, key distribution and certificate issue etc., as shown in the following figure.

 

Fig. Encryption Protection for Typical Satellite Communication Network

 

 

2.2 Encryption for IP Network

In a typical governmental or corporate IP network, VPN encryptor can be deployed at the LAN egress to provide encryption protection for the data being transmitted cross the IP network. And SMC can be placed in the headquarters LAN to carry out various security management functions such as key generation, key distribution and certificate issue etc., as shown in the following figure.

Fig. Encryption Protection for Typical IP Communication Network

 

 

3. Product Structure

3.1 VPN Encryptor

 

 

1) Interfaces: 6 Gigabit Ethernet ports,1 RJ45 serial port

2) Size: 430*320*44.4mm

3) Weight: 3KG

 

3.2 Security Management Center (SMC)

 

 

1) Interfaces: 6 Gigabit Ethernet ports, 1 RJ45 serial port, 2 USB;

2) Size: 482*430*44.5mm

3) Weight: 6KG

 

4. Features

 

4.1 High-strength security

VPN encryptor integrated various security functions such as data packet filtering, anti-attack and anti-virus etc.. It can construct safe network of kinds of topological structure with other encryptor and security access suite to provide confidentiality and integrity for enterprise network communication, availability and controllability for user intranet.

 

4.2 High reliability

To provide excellent availability for corporate users, the encryptor adopts multiple mechanisms such as hot standby and multilink. These mechanisms can also avoid single point of failure and recover normal communication rapidly and automatically.

 

4.3 High scalability

The encryptor provides extendable secured connection (between subnet and subnet, subnet and end user) for corporation users, thus to improve flexibility and help subnet and end user have better access to corporation network.

 

4.4 Flexible deployment mode

1)Routing mode: Ipsec mode, Encryptor mode (payload encryption);

2)Transparent mode: (Ipsec mode, Encryptor mode (payload encryption);

 

4.5 Flexible encryption strategy

1)based on destination address

2)based on service

 

5. Functions and Technical Specifications

VPN encryptor can provides comprehensive security functions such as key management, key distribution, message authentication, data encryption, signature generation and verification etc., which ensures the data are of safety, correctness, integrity and non-repudiation during transmission.

 

5.1 VPN Encryptor

 

 

 

5.1.1 Crypto Specifications

1) Data Encryption/Decryption

  • Symmetric Algorithms: DES, 3DES, AES128, AES256 (optional);
  • Asymmetric Algorithm: RSA (optional);

2) Integrity Verification

  • MD5, SHA1

3) Digital Signature / Verification:

  • RSA

4) Random number generated by hardware

 

5.1.2 Performance Specifications

1) AES encryption throughput: >800 Mbps

2) 3DES encryption throughput: >400 Mbps

3) SHA1 rate of HASH calculation: >600 Mbps

4) MD5 rate of HASH calculation: >700 Mbps

5) RSA signature rate: > 10000/s

6) RSA verification rate: > 5000/s

7) Data forwarding throughput: > 2 Gbps

8) VPN encryption forwarding throughput: > 900 Mbps

 

5.1.3 Reliability Specification

1) MTBF: 45000 hours

 

5.1.4 Data Capacity Specification

1) Maximum VPN tunnels:10000

2) Maximum Concurrent connections :3 million

 

5.1.5 Environmental Specifications

1) Power Supply: ~220V±25%, 50HZ

2) Power consumption: <170W

3) Working temperature: 0℃ ~ 50℃

4) Storage temperature: -10℃~45℃

5) Humidity: 20% ~ 80%

 

5.2 Security Management Center (SMC)

Security management center is mainly used to carry out various centralized security management functions such as certificate issue, key distribution and identity authentication etc.

 

5.2.1 Crypto Specifications

1) Data Encryption/Decryption

  • Symmetric Algorithms: DES, 3DES, AES128, AES256 (optional);
  • Asymmetric Algorithm: RSA;

2) Integrity Verification

  • MD5, SHA1 (optional);

3) Digital Signature / Verification:

  • RSA

 

5.2.2 Reliability Specification

1) MTBF: 45000 hours

 

5.2.3 Data Capacity Specification

1) Disk Capacity: 1T

2) Certificate Capacity: >10000 pairs

3) Certificate Revocation List: >10000

 

5.2.4 Environmental Specifications

1) Power Supply: ~220V±25%、50HZ

2) Power consumption: <170W

3) Working temperature: 0℃ ~ 50℃

4) Storage temperature: -10℃~45℃

5) Humidity: 20% ~ 80%

SEC-34 IP Encryptor (VPN)
Write the E-Mail, we will contact you within days.



Write the E-Mail, we will contact you within days.