Skip to main content

Introduction

The DD500E and DD500E-R models are compact, IP-capable Data diodes, designed specifically for industrial installations. Utilizing internal optical technology to provide a physically enforced one-way data flow, both models securely exports data from critical networks, enabling automated data collection without compromising network security and maintaining the air-gap's protective characteristics.

The DD500E-R model is rail trackside-certified, specifically designed for deployment in railway infrastructure environments. It retains the full functionality, performance characteristics, and feature set of the DD500E, while incorporating the mechanical, environmental, and electromagnetic robustness required for rail trackside installations. The device may be installed in railway trackside equipment cabinets or other environmentally protected enclosures, provided that the installation complies with EN 50125‑3:2004 Climate Class TX and that the temperature inside the shelter remains within the defined operating limits.

note

Throughout this instruction, DD500E is used to represent both the DD500E and DD500E-R models. The information is valid for both models, unless specifically stated otherwize.

Key features are:

  • Physically separated networks - the source and destination networks are physically separated, ensuring robust security.
  • Compact design - its small form factor is optimized for tight spaces in industrial environments.
  • Native UDP support - uses UDP for efficient data transmission.
  • Separate configuration interface - a dedicated interface for easy configuration and management.
  • DIN Rail mounting - designed for easy installation on DIN rails, fitting into industrial set-ups.
  • PoE (Power over Ethernet) - simplifies power supply needs, reducing wiring complexity.
  • Industrial certifications - certified to meet industrial standards for exposed environments.

Security recommendations

Before installing and taking the DD500E into operation, any impact according to organisational security policies should be considered.

note
  • The device should only be configured while disconnected from the intended operational environment.
  • Make sure the Configuration Application laptop is handled according to organisational security policies applicable for the intended operational environment.
  • Firmware should never be updated while the device is connected in an operational environment.
  • Further information on security recommendations can be found in Recommended Security Management.
Loading...