EtherLock software or hardware?
is centrailzed piece of equipment that, as the central component of our
product line, actively monitors the physical
connectivity of Ethernet equipment through the existing xBaseT
wiring of the LAN. EtherLock includes the ability
to convert physical information to logical
information and provide it to software tools.
is that of a closed-loop system, similar in function to door
contact sensors in home alarm systems. EtherLock injects a DC
current signal on xBaseT Ethernet wiring to create a continuous flow of
DC current through the Ethernet Network Interface Card (NIC) of a
computer or other physically connected device. When the Ethernet
end device (DTE) is physically disconnected from the network, there is
a discontinuity in the current flow and EtherLock immediately triggers
an event notification.
does EtherLock install?
installs quickly and easily on a LAN between the
Ethernet hub (e.g., Ethernet switch) and the patch panel, usually located in a data
must I do to each asset? Do I run extra
cables or load some software on each computer?
security applications, EtherLock requires no modification at
the individual asset level. Because EtherLock utilizes existing xBaseT network wiring,
installation is as simple as adding and changing a few cables
connections in your data closet.
My hub is a Ethernet
switch, will EtherLock still
EtherLock is a pass-through device, the EtherLock does not have to operate through the
same hub/switch. A EtherLock can protect widely dispersed computers
physically connected through multiple hubs/switches in a
EtherLock work for any network type?
operates over any xBaseT Ethernet networks e.g., 10BaseT,
100BaseTX or 1000BaseT (Gigabit) utilizing unshielded twisted
pair (UTP) premise cabling such as CAT3 or better cabling.
EtherLock send any packets? Does it
interfere with the network traffic?
operates at the physical layer of the network and
is a pass-through device for data traffic.
It is fully IEEE 802.3 compliant; network
performance is not affected by its use.
does not transmit data packets across the
does not generate excess noise on data
does not intercept or alter existing
happens if I turn the computers off?
provides its own signal to monitor all physically connected
assets, so your computers and peripherals
continue to be protected when they are powered on, logged
off, turned off, or even if the network is
down. As long as power is being supplied to
EtherLock, protection of your computer hardware
is assured. We do recommend the use of an
uninterruptible power supply (UPS) for continuous
power to EtherLock.
mobile users remove their computers without
users may be granted access to protect and
release specific assets through the inControl
browser-based client. The browser interface
avoids training costs and makes access easy from
any platform. The user merely enters their
authorized ID and password to record the transfer
of the asset from EtherLock control to their
top of page.