Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

SecureLogix Encore: Page 3 of 5

RSA key exchange occurs during handshake, and two security associations are used for each call. Session keys are destroyed after every call.

ETM-to-ETM Calling

Any phone extension on a span covered by the PMC is enabled for TeleVPN. Just place a normal call to another ETM-equipped site, and as soon as the receiving end answers, the two ETMs sync up and the call is encrypted. We discerned a short negotiation tone during "handshake" (SecureLogix says the handshake takes 16 ms), but it was not disruptive to the call.

TeleVPN function complements the firewall functionality of the core ETM suite. The TeleVPN Call Shield rules are managed in parallel with the standard telephony-firewall capabilities of the ETM. VPN Call Shield rules based on source numbers, destination numbers and HA (high assurance) determine if a call should be permitted, terminated and/or logged. HA is used to guarantee confidentiality--ensuring a 56- or 64-Kbps encrypted channel can be created, maintaining acceptable call quality.

For example, by combining the TeleVPN rules with the suite's standard TeleWall rules to protect a confidential medical report faxed between offices, the rules would be set on calling number, destination number, type of call and a "quality" 64-Kbps line connection for encryption. If all the specified criteria were not met, the call would not be allowed. If something happened midstream to jeopardize the call--say, line quality dropped below 64 Kbps--the connection would be dropped.