background image

Preface 

This manual describes the specifications and installation procedure for the network data encryption 
modules.

 

This preface includes the following topics about the documentation:

 

 

Audience

.

 

 

Conventions

.

 

 

Documentation feedback

.

 

Audience 

This documentation is intended for: 

 

Network planners. 

 

Field technical support and servicing engineers. 

 

Network administrators working with network data encryption modules. 

Conventions 

The following information describes the conventions used in the documentation. 

Command conventions 

Convention 

Description 

Boldface 

Bold

 text represents commands and keywords that you enter literally as shown. 

Italic

 

Italic

 text represents arguments that you replace with actual values. 

[ ] 

Square brackets enclose syntax choices (keywords or arguments) that are optional. 

{ x | y | ... }

 

Braces enclose a set of required syntax choices separated by vertical bars, from which 
you select one.  

[ x | y | ... ]

 

Square brackets enclose a set of optional syntax choices separated by vertical bars, 
from which you select one or none.  

{ x | y | ... } *

 

Asterisk marked braces enclose a set of required syntax choices separated by vertical 
bars, from which you select a minimum of one. 

[ x | y | ... ] *

 

Asterisk marked square brackets enclose optional syntax choices separated by vertical 
bars, from which you select one choice, multiple choices, or none.  

&<1-n> 

The argument or keyword and argument combination before the ampersand (&) sign 
can be entered 1 to n times. 

A line that starts with a pound (#) sign is comments. 

 

GUI conventions 

Convention 

Description 

Boldface

 

Window names, button names, field names, and menu items are in Boldface. For 
example, the 

New User

 window opens; click 

OK

Multi-level menus are separated by angle brackets. For example, 

File

 > 

Create

 > 

Folder

 

Summary of Contents for SecPath NS-HTIM-GMG2A

Page 1: ...H3C SecPath Firewall Network Data Encryption Modules Manual New H3C Technologies Co Ltd http www h3c com Document version 6W101 20201210 ...

Page 2: ...respective owners Notice The information in this document is subject to change without notice All contents in this document including statements information and recommendations are believed to be accurate but they are presented without warranty of any kind express or implied H3C shall not be liable for technical or editorial errors or omissions contained herein Environmental protection This produc...

Page 3: ...s or arguments that are optional x y Braces enclose a set of required syntax choices separated by vertical bars from which you select one x y Square brackets enclose a set of optional syntax choices separated by vertical bars from which you select one or none x y Asterisk marked braces enclose a set of required syntax choices separated by vertical bars from which you select a minimum of one x y As...

Page 4: ...as a Layer 2 or Layer 3 switch or a router that supports Layer 2 forwarding and other Layer 2 features Represents an access controller a unified wired WLAN module or the access controller engine on a unified wired WLAN switch Represents an access point Represents a wireless terminator unit Represents a wireless terminator Represents a mesh access point Represents omnidirectional signals Represents...

Page 5: ...Documentation feedback You can e mail your comments about product documentation to info h3c com We appreciate your comments ...

Page 6: ...SQM1F5KGMC 6 NS HTIM GMG2A 6 NS HTIM GMG2B 7 Installing the encryption modules 7 Installing an NSQM1F1KGM0 encryption module 7 Installing an NSQM1F1KGMB or NSQM1F1KGMC encryption module 8 Installing an NSQM1F5KGM0 or NSQM1F5KGMC encryption module 9 Installing an NS HTIM GMG2A or NS HTIM GMG2B encryption module 10 Functionalities 10 Application scenarios 11 ...

Page 7: ...algorithm and SM2 public key encryption algorithm Provide rich security features including key management digital signature and verification data encryption and decryption and data integrity protection Offers high performance and reliable data encryption for the IPsec module Specifications Figure 1 NSQM1F1KGM0 1 Captive screw 2 Ejector lever 3 LED READY Figure 2 NSQM1F1KGMB 1 Captive screw 2 Eject...

Page 8: ...ctor lever 3 LED READY Figure 5 NSQM1F5KGMC 1 Captive screw 2 Ejector lever 3 LED READY Figure 6 NS HTIM GMG2A 1 Captive screw 2 LED READY 3 Ejector lever Figure 7 NS HTIM GMG2B 1 Captive screw 2 LED READY 3 Ejector lever 1 3 2 1 3 2 1 2 3 1 2 3 ...

Page 9: ... 1 150 172 9 mm 1 58 5 91 6 81 in 4 14 W 0 64 kg 1 41 lb NSQM1 F1KGM B 19 8 150 172 9 mm 0 78 5 91 6 81 in 3 7 W 0 36 kg 0 79 lb NSQM1 F1KGM C 19 8 150 172 9 mm 0 78 5 91 6 81 in 5 7 W 0 38 kg 0 84 lb NS HTI M GMG 2A 40 1 189 0 212 4 mm 1 58 7 44 8 36 in 7 W 0 6 kg 1 32 lb NS HTI M GMG 2B 40 1 189 0 212 4 mm 1 58 7 44 8 36 in 7 W 0 6 kg 1 32 lb LED The encryption modules each provide a LED to show...

Page 10: ... GM AK370 F1000 AI 20 F1000 AI 30 F1000 AI 50 F1000 920 AI F1000 930 AI F1000 950 AI F1000 960 AI F1000 970 AI F1000 980 AI F1000 990 AI F1000 E VG F1000 V70 F100 A G3 F100 E G3 F100 A80 WiNet Slot 1 R9333 or higher F1000 AI 60 F1000 C G3 Slot 1 E8601P07 or higher F1090 F1000 AI 70 F1000 AI 80 F1000 AI 90 F1000 S G3 F1000 A G3 F1000 E G3 F1000 AK1414 F1000 AK1424 F1000 AK1434 F1000 AK1514 F1000 AK...

Page 11: ...00 AK1514 F1000 AK1524 F1000 AK1534 F1000 AK1614 Slots 1 to 4 NSQM1F1KGMC Table 5 Compatible hardware and software for the NSQM1F1KGMC encryption module Compatible firewalls Compatible slots Software version F1020 F100 A G2 F100 A EI F1000 AK130 F1020 GM F1000 920 AI F100 A G3 F100 A80 WiNet Slot 1 R9345P14 or higher F1030 F1050 F1060 F1070 F1080 F100 E G2 F100 A SI F100 E EI F1000 C G2 F1000 C EI...

Page 12: ...M0 Table 6 Compatible hardware and software for the NSQM1F5KGM0 encryption module Compatible firewalls Compatible slots Software version F5010 F5020 F5040 F5000 S F5000 C F5020 GM Slot 1 R9320 or higher NSQM1F5KGMC Table 7 Compatible hardware and software for the NSQM1F5KGMC encryption module Compatible firewalls Compatible slots Software version F5010 F5020 F5040 F5000 S F5000 C F5020 GM Slot 1 E...

Page 13: ...nd occupies two interface module slots To install an NSQM1F1KGM0 encryption module 1 Face the rear panel of the device and identify the target slots 2 Use a Phillips screwdriver to loosen the captive screws on the filler panels and then remove the filler panels from the slots Keep the removed filler panels secure Figure 8 Removing the filler panels 3 Open the ejector levers of the encryption modul...

Page 14: ...r panel of the device and identify the target slot 2 Use a Phillips screwdriver to loosen the captive screws on the filler panel and then remove the filler panel from the slot Keep the removed filler panel secure Figure 10 Removing the filler panel 3 Open the ejector levers of the encryption module and then gently push the module into the slot along the guide rails 4 Close the ejector levers Make ...

Page 15: ...the device and identify the target slot 2 Use a Phillips screwdriver to loosen the captive screws on the filler panel and then remove the filler panel from the slot Keep the removed filler panel secure 3 Open the ejector levers of the encryption module and then gently push the module into the slot along the guide rails 4 Close the ejector levers Make sure the module is seated securely in the slot ...

Page 16: ... slots Keep the removed filler panels secure Figure 13 Removing the filler panels 3 Open the ejector levers of the encryption module and then gently push the module into the slots along the guide rails 4 Close the ejector levers Make sure the module is seated securely in the slots 5 Use a Phillips screwdriver to fasten the captive screws on the module Figure 14 Installing an NS HTIM GMG2A encrypti...

Page 17: ...f security application systems Application scenarios The encryption modules are used to provide secure encrypted transmission mainly in the power finance transportation and industrial control sectors They can be used on an IPsec VPN as shown in Figure 15 and other scenarios to encrypt and verify data by using the GM encryption algorithms enhancing transmission security and data integrity When usin...

Reviews: