
CRYPTOGRAPHY
Encryption Algorithms
Proprietary/Commercial
Authentication Algorithms
HMAC SHA1 (160 bit), HMAC SHA2 (256 and 512 bit)
Hash Algorithm
SHA, Hash size 160 bit
KEY MANAGEMENT
Key Agreement
IKE, signed Diffie-Hellman key exchange
Session Key
Seamless session key change
User selectable session key life cycle
Key destruction function for session keys
Private Key
Stored on smart card with retrieve access blocked
SECURITY FEATURES
Tamper evident chassis
Emergency Clear of keys and algorithm
Hardware Based True Random Number Generator
Management Channel encrypted using SSL
FUNCTIONAL FEATURES
IPSec Tunnels
Concurrent from 100 to 1024 tunnels
Dead Peer Detection
Private keys
Secure storage on smart cards
Throughput
60Mbps, 600Mbps, and 6Gbps for frame size 1518 bytes