ROHDE & SCHWARZ, Inc. Datasheets for Network Equipment

Network equipment is used to split, switch, boost, or direct packets of information along a network. This product area includes network hubs, switches, routers, bridges, gateways, multiplexers, transceivers and firewalls. In addition to device type, network equipment is defined by protocol (e.g., Ethernet).
Network Equipment: Learn more

Product Name Notes
TrustedVPN The unique characteristics The TURAYA.TrustedVPN solution has been developed with two principal design goals in mind: Hard-edged security Foolproof administration. TURAYA. TrustedVPN provides a comprehensive state-of-the-art security infrastructure as a...
CryptoGateway Illegal wiretapping poses ever larger risks when it comes to the confidentiality of voice communication, especially since the technical effort involved has become even less complex with the rise of...
SecureGateway Insufficient protection leading to industrial espionage, loss of sensitive data and sabotage causes substantial financial damage to companies and public authorities. Communication via Fax is especially vulnerable for cyber attacks...
Ethernet Encryption -- SITLine ETH50 The R&S®SITLine ETH50 is an exceptionally robust, compact (7.6“) Ethernet encryptor, and is the only device of its kind on the market today that has been approved by Germany‘s Federal...
Ethernet Encryption -- SITLine ETH4G The SITLine ETH4G provides network administrators with more flexibility concerning the planning of their infrastructures. For the first time worldwide, a single device simultaneously encrypts four lines in existing 100...
Specialized Line Firewall We designed the next-generation firewalls of the Specialized Line for complex IT environments requiring a high level of protection. They can be perfectly integrated into industrial process networks or very...
Unified Line Firewall We developed the Unified Line for the specific requirements of small companies which need an easy-to-use solution to protect their office IT against cyberthreats from the Internet. These firewalls provide...
Extended Line Firewall With the number of cyberattacks constantly on the rise, IT administrators in small and medium-sized companies have to implement increasingly elaborate security measures. At the same time, the growing number...