Chat with Speeka Chat with Speeka
Selected Products: English Version

Gsm-Gprs-Umts
Skype
Hardware
Aero
Tel.satell.
 
Crypto
Acquista
Help
Supporto
Carrello
Dealer
Chi siamo


  XS5
  Telog
  GSM Crypto Enigma
  Satphones
GSM crypto S35i
  -Siemens S35i crypto
  -Authentication
  -Features
  -Tech. specs
  -FAQ
  Crypto ISDN_GSM
  Crypto isdn-gsm
  Features
   
  Crypto ISDN
  Crypto-ISDN
  Characteristics
  Specifications
   
  GSM crypto Pcmcia
  Pcmcia-Sec107
  Pcmcia-features
   
Contacts
   
   

Siemens GSM-ISDN crypto-phone


The Crypto-ISDN 6-2 high-end encryptionsystem consists of the followingcomponents

  • Encryption units
  • Management station for certificate administration
  • Service station for remote administration
  • Logging station for remote monitoring of the encryption units
  • Management Station

The management station assigns the authorization to participate in encrypted operation within a user group. Using a secure protocol, it sends a signed certificate via an ISDN connection to the participating encryption unit. The management station also determines or extends the period of validity of thecertificate.
The management station can be expanded according to the number of encryption units and user groups to be managed; it consists of a workstation with backup system and up to three frontend encryption units and three signature units.

Service Station

In the service station, the operating parameters and the D-channel filter parameters can be set centrally and distributed to the encryption units via anISDN connection, using a secure protocol. The service station consists of a workstation with backup system and a frontend encryption unit.

Signalling channel filter and monitor

The signalling channel is monitored and unwanted protocol elements are filtered out. Specific numbers can be rejected or assigned special privileges. This security function primarily prevents manipulation of PBXs, as well as of other ISDN terminals.

Logging station

The Crypto-ISDN 6-2 encryption system has a logging memory in which all unauthorized attempts to access or manipulate the system, activities of theD-channel filter, etc, are entered. Using a secure protocol, the memory contents are transmitted via an ISDN connection to the logging station for evaluation and archiving. The logging station consists of a workstation with backup system and a frontend encryption unit.

Service PC

As an alternative to the service and logging station, the logging memory of the encryption units can also be configured and read locally on the Crypto-ISDN 6-2 from a standard PC.

Key Facts

  • High-end encryption system for telephone, fax, data and video communication
  • Online transmission of information from UNCLASSIFIED to TOP SECRET
  • Two models available: for Euro-ISDN basic rate access and Euro-ISDN primary rate access

 

 

 

 

 

 

 


 
© 1991-2011 P.Iva 10351030159 - Speeka srl 3490795312 Site Map - e-mail SKYPE