Home > Products > Bloombase Ethernet Encryptor

Bloombase Ethernet Encryptor - High Performance Network Security

Overview | Specifications

Technical Specifications


Bloombase Ethernet Encryptor works as a network gateway to provide a secure private network for site to site enterprise data communications and real-time replication across wide area network (WAN) and/or metro area network (MAN).

Download Specifications

You need Adobe Acrobat Reader to read our digital product brochure.


  • IETF IPSec
  • IPv4 and IPv6 support*
  • 1GbE/1000BASE-T, 10GbE/1GBASE-T ready and beyond*
  • IEEE 802.3ad link aggregation control protocol ready*
  • IEEE 802.1Q VLANs ready*
  • IEEE 802.3 2005 flow control ready*
  • IEEE 802.1p ready*
  • Encapsulating security payload (ESP) support
  • Authentication header (AH) support
  • Internet key exchange (IKE) support


  • Industry-proven cryptographic processing engine
  • NIST FIPS-197 AES encryption and decryption
  • Japan NTT/Mitsubishi Electric Camellia encryption and decryption
  • Chinese National SCB2(SM1), SSF33, SSF28 encryption and decryption
  • NIST FIPS-46-3 3DES and DES encryption and decryption
  • RC2, RC4, RC5 and RC6 encryption and decryption
  • CAST5 encryption and decryption
  • Twofish and Blowfish encryption and decryption
  • IDEA encryption and decryption
  • Serpent and Skipjack encryption and decryption
  • Pluggable cipher architecture for future cipher upgrade or custom cipher support
  • 128, 256, 512, 1024 and 2048 bit public key cryptography
  • RSA and DSA public key cryptography
  • SHA-1, MD5 and Chinese National SCH(SM3) hash generation
  • Shared secret authentication
  • RSA signature authentication
  • Hardware ASIC cryptographic acceleration (optional)

Key Management

  • Manual keying or automatic keying
  • Diffie-Hellman key negotiation
  • Multiple certificate authority (CA) support
  • Hardware true random (optional) or software pseudo-random key generation, inquiry and deletion
  • Built-in certificate request and revocation check (CRL/OCSP)
  • X.509 and PKCS#12 DER and PEM key import and export
  • Key Usage Profiling
  • RDBMS and Generic LDAP Support and Integration
  • Industry Standard PKCS#11
  • NIST FIPS-140-1 level 2 cryptographic module support (optional)
  • Automatic Certificate Retrieval via HTTP or LDAP
  • Certificate Validity Check
  • Certificate Revocation Check via HTTP or LDAP
  • Certificate Revocation List (CRL)
  • Certificate Revocation List Distribution Point (CRLDP)
  • Online Certificate Status Protocal (OCSP)
  • CRL scheduled download, caching and automatic retry
  • OCSP scheduled request, caching and automatic retry


  • Web based management console with SSL protection
  • Central administration and configuration
  • User security
  • Serial console
  • SNMP v1, v2c, v3
  • syslog, auto log rotation and auto-archive
  • Heartbeat and keep alive


  • Fully transparent to all TCP/IP communication protocols
  • Function as a gateway to encrypt data for uplink and decrypt for downlink

Disaster Recovery

  • Configurations backup and restore
  • FIPS-140 hardware security module recovery key or software recovery key vault for settings restoration
  • Customer-defined recovery quorum (e.g. 2 of 5)
  • FIPS-140 hardware security module operator key or operator pin for daily Bloombase KeyCastle operation
  • High-availability option for active-active or active-standby operation

Platform Support

  • Proprietary Bloombase OS
  • Supports all x86, PowerPC, SPARC, StrongARM architecture hardware

The specification and outlook of the model may vary and is for reference only

Secure Your Data Now

Protect your data with Bloombase transparent encryption.

Bloombase Demonstrations

See how Bloombase protects your digital assets.

Bloombase SupPortal

Get technical support from Bloombase Supportal and Knowledgebase.