English | Espanol | Francais
VSAT Interception, Monitoring and Logging Infrastructure |Passive GSM Interception systems with A5.1/ A5.2 Online Decoding.|BTS/BSC GSM Link Passive Surveillance, Monitoring and Logging System.|Shoghi Multi Channel Signal Classifier, Demodulator and Decoder System.
Communication Security
Communication Jamming
Communication Intelligence
Signal Intelligence
System Engineering
Research & Development
Software Development
Technical Support
Offset Services
Trainings
Partners' Login


Enter your email address to
get regular updates of our products.
 
 
Become Our Representative
Communication Security
Encryption and Information security has been the core area of Research for Shoghi Communications. Since Inception Shoghi has been involved in Designing and Developing Mil-Grade and Crypto Validated Communication Security Appliances for Government and Defense Information Protection. Today Shoghi offers multiple Crypto solutions to its customers with total freedom from Published algorithms and Key management schemes.
 

Communication Security > IP Encryptor

 
IP encryptor is a reliable and top-secure Virtual Private Network solution. It enables businesses to build top-secure site-to-site communications over any IP-based network (Intranet, Extranet, Internet). The high-quality products integrate easily into existing networks and provide the appropriate scalability to ensure the desired performance, and the user-friendly management tools make setting up a security policy easy. VPN provides a platform to securely exchange e-mail, files and voice over a corporate network or the Internet.
The combination of these products integrates easily into existing IP networks based on third party products (firewall, virus checker, intrusion detector). This provides our customers with the instruments required to tackle the networking future.
Features
Ready for installation into existing IP networks (including
firewalls and routers).
Designed for use as a VPN system.
For encryption networks with up to 5000 partners.
Unique modular standalone platform (applies to IP Encryptor).
Fast Encryptor proprietary block cipher hardware.
Secure Management: Configuration and monitoring of IP
encryptor office are possible from anywhere in the secure
network.
Installation mode offering stepwise integration into the IP
environment.
Two separate 10/100 Base T Ethernet interfaces for private and
public traffic (trusted/untrusted area).
Additional interface for maintenance and monitoring.
Supports up to 500 simultaneous top-secure connections.
Security Architecture with 256-bit key length.
Proprietary authentication, encryption and key management.
Bilateral session Key principle (Once and only once).
Key changes according to amount of encrypted traffic or elapsed
time.
IPsec compliant operation possible.
Central key and network management.
Off-line key distribution.
Remote network management.
Monitoring and logging functions.
Local station management.
Local and remote firmware update.
Boot up self-test.
Remote key management (online key download).
SNMP-based monitoring and logging.
NAT Traversal / Proxy ARP/ RIPv2.
Redundancy and clustering.

 

Virtual Private Network Security

 




 
The Products on the site are strictly for Government and Defense use only.
  © Copyright 2006-2007. All Rights Reserved.