General Information; About The Alarmnet Enterprise Application; About The Alarmnet-I Internet Application; Encryption (Alarmnet-I Application) - Honeywell AlarmNet 7810iR-ent Installation And Setup Manual

Internet/intranet ip alarm receiver
Table of Contents

Advertisement

• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •

About the AlarmNet Enterprise Application

AlarmNet Enterprise is a fully encrypted, secure method of delivering alarm messages from
a protected premise to a local security office in a campus or gated community setting. Up to
225, 7845i-ent Internet/Intranet Alarm Communication Modules can be installed on a
network reporting to a single 7810iR-ent. In a typical system, an installed 7845i-ent routes
status, supervisory, and alarm messages to the security office using a 10-BaseT Ethernet
connection. At the security office, the 7810iR-ent validates and displays incoming messages
and optionally routes the messages to an output device. AlarmNet Enterprise is
implemented using TCP Internet protocol and 1024-bit Key Blowfish or 256-bit AES
encryption. (See Figure 1.)
Figure 1. 7810iR-ent/7845i-ent Intranet/Internet Block Diagram

About the AlarmNet-i Internet Application

AlarmNet-i is a fully encrypted, secure method of delivering alarm messages from a
protected premise to an AlarmNet equipped central station. An Alarm Receiver transmits
status, supervisory, and alarm messages to the AlarmNet Control Center using a broadband
Internet connection (See Figure 1).
The AlarmNet Control Center identifies, validates, and forwards the messages to the
appropriate AlarmNet central station using AlarmNet-A, AlarmNet-M, AlarmNet-i, or 800
plus services. An Internet receiver, 7810iR or 7810iR-ent, is required when receiving
Internet signals from the AlarmNet Control Center. AlarmNet-i has an unlimited account
capacity.
UL

Encryption (AlarmNet-i Application)

The 7845i-ent and 7810iR-ent support private key encryption. Private key encryption means
that both the sender and the receiver know the KEY used to encrypt the data. Each device
produced by Honeywell is loaded with a globally unique identifier called a MAC number, and
a large random number or KEY. This KEY and MAC number are also stored in the
AlarmNet servers. When a device contacts AlarmNet it sends the MAC number in the clear
followed by the message that is encrypted using the KEY data. The server looks up its copy
of the KEY based on the MAC number and uses that KEY to decrypt the message.
The Honeywell AlarmNet products support two forms of encryption. The standard
encryption used is called Blowfish. This encryption uses 1024 bits of the random key to drive
the encryption algorithm. Blowfish requires the least processor overhead, which makes it
the best choice for most installations. The second form of encryption is 256 bit AES
(Rijndael). This encryption option is required for certain government installation, or may be
specified in certain applications. The AlarmNet-i AES Encryption Software Module Version
The 800 PLUS has not been evaluated by UL.

General Information

S E C T I O N
1
1-1

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents