Comtech EF Data CDM-625A User Manual

Page 278

Advertising
background image

CDM-625A Advanced Satellite Modem

MN-CDM625A

Ethernet-based Remote Product Management

Revision 3

7–48

Configuration | Managed Switch’ page (see Sect. 7.5.4.3.4) when the modem is in

Managed Switch Mode.

• When the AES Encryption FAST feature has not been purchased and is therefore disabled,

the Encryption section of this page appears as follows:

While the AES Encryption FAST feature itself is disabled, the this page may still be used to

program the Encryption and Decryption keys in anticipation of future use.

For situations where, for example, export restrictions prohibit the availability of the AES

Encryption option, the CDM-625A runs an FPGA chipset that does not allow encryption

operations. The ‘Configuration | WAN | Encryption’ page is therefore disabled: The page, when

accessed, notes the operational restriction by hiding the Encryption Key and Decryption Key

programming sections and displaying the following message in the Encryption section:

EncryptionUnencrypted Rx Traffic

Use the drop-down list to select Allow (default) or Drop. Note the following:

• Under the default Allow setting, the local modem allows receipt of unencrypted (plain text)

packets from the remote modem over the WAN, even when encryption is enabled.

• Under the Drop setting, the modem drops all unencrypted traffic received over the WAN

interface when encryption is enabled. The remote modem may therefore transmit only

encrypted data.

Encryption / Decryption Keys

A typical encryption or decryption key consists of a string of 32 characters, using any

combination of the numbers ‘0’ through ‘9’ and the letters ‘a’ through ‘f’ / ‘A’ through ‘F’.

To program a key, enter the desired 32-character string in the appropriate key row, and then

click [Set]. Any previously programmed key may be overwritten in this manner. Alternately, click

[Clear] to reset a previously programmed entry to all zeroes, and then re-enter the new key

string as instructed here.

Up to eight keys may be programmed for each function; once set, you may then select a

specified Encryption Key for active use via the ‘Configuration | Routing | Routes page (Sect.

7.5.4.3.3.1).

The user must program all eight encryption and decryption keys before selecting

Random Key operation on the Configuration | Routing | Routes page. Otherwise,

Advertising