IP BRIDGE ETHERNET LAN IP TUNNEL – LAN to LAN IP Bridge – Ethernet Over IP – Switches – BABA Certified Switches – BABA Switches – Made in USA Switches – Made in America Switches – Engage

$2,466.00

Ethernet Over IP, IP Bridge

AMERICAN TECH will beat any USA based distributor pricing for Engage Products- please call us for updated pricing at (866) 650-3282

Compare
SKU: En-040-1002 Categories: ,

Description

Overview

The IPTube E2 is used to interconnect Ethernet LANs through an IP network. Ethernet frames that are destined for a device located on the remote network are encapsulated into IP packets. The IP packets, with the encapsulated Ethernet frames, are sent to the IP address of the destination network’s IPTube E2 where the IP envelope is removed and the original Ethernet Frames are delivered to the destination network’s Ethernet device.

+SCADA Protocol Transparency Diagram

The Ethernet MAC layer source addresses that are active on the internal LAN are stored in a filtering database. Packets with a MAC destination that do not match a MAC address entry for the receiving port are encapsulated in an IP packet that is forwarded to the remote network.

Service Quality Packet Prioritizing

The IPTube E2  uses the Type of Service byte in the IP packets to prioritize the encapsulated Ethernet frames. The setting of the TOS byte can be used to ensure that real time data from the IPTube E2  is ensured high priority. 

Rack Mount Kit

The IPTube family is ready for your most demanding central office or data center environments. With the Rack Mount Kit, IPTube products are easily installed in 19″ and 23″ racks. Easy access to both front and rear sides facilitates technician maintenance procedures.

Applications

+Applications Diagram

Legacy Protocols Over IP

Enterprises, Education, Government Agencies and Organizations use the IPTube E2 tunnel to transport legacy LAN protocols, such as NetBEUI, IPX, AppleTalk and Decnet, over very cost effective IP only based services. Legacy applications that utilize non routable protocols are able to access services across an IP point to point connection.

Network Security

Security is established with Full On Source, Destination Address; Port and Flag IP Packet filtering. Interconnectivity is selectively controlled at the interface, network, device and application layers.

Brand

Engage