T H E C O N T I N U O U S P O W E R C O M P A N Y

SIGNALS AND INTERFACING

At the rear of the unit are two DB-9, subminiature, female connectors. These are provided for communications links to a computer or sophisticated monitoring device.

SIGNAL PORT DB-9provides open collector type closures that typically signal Utility Interrupt, Low Battery and Inverter Active conditions. A system shutdown feature is also available on this port. Applying a +5-12V signal across the appropriate pins will cause the system to shutdown in battery mode.

SIGNAL PORT-(DB9) OPEN COLLECTOR

2- UTILITY INTERRUPTED SIGNAL

3- INVERTER ACTIVE SIGNAL

4- COMMON SIGNAL RETURN

5- LOW BATTERY SIGNAL

6- + UPS SHUTDOWN

7- - UPS SHUTDOWN

RS232 CONNECTOR

2-

TRANSMITTING DATA (TX)

3-

RECEIVING DATA (RX))

5-

GROUND

6-

DATA SET READY (DSR)

8-

REQUEST TO SEND (RTS)

This conserves the battery life once an orderly shutdown has been accomplished. The system may be configured to shutdown by simply shorting pins 6 and 7. Contact the factory for configuration details.

RS232 DB-9 is a true RS232 communications signal port. On rackmount units, this port is on a removable plate, which can be substituted with an optional SNMP card. Below is the pin out of the two connectors with their default assignments:

Page 12

Page 12
Image 12
HSM CMN4000R, CMN3000R manual Signals and Interfacing

CMN4000R, CMN3000R specifications

The HSM CMN3000R and CMN4000R are advanced data security solutions designed for organizations that require high levels of data protection and compliance. Both models are part of HSM's larger portfolio of hardware security modules (HSMs) that ensure the confidentiality, integrity, and availability of sensitive information.

One of the most notable features of the CMN3000R and CMN4000R is their robust encryption capabilities. These devices support a variety of encryption algorithms including AES (Advanced Encryption Standard), RSA (Rivest-Shamir-Adleman), and ECC (Elliptic Curve Cryptography). This flexibility allows organizations to choose the encryption standards that best meet their security needs, ensuring strong data protection against unauthorized access.

Both models are equipped with HSM's cutting-edge key management technology. This includes secure key generation, distribution, storage, and destruction, ensuring the lifecycle of cryptographic keys is managed securely. The modules are designed to comply with global security standards such as FIPS 140-2 Level 3, ensuring they meet stringent regulatory and industry requirements.

Another prominent feature of the HSM CMN3000R and CMN4000R is their high availability options, which support redundant setups and failover capabilities. This ensures that critical security operations can continue uninterrupted, even in the event of hardware failure. This is particularly important for organizations that rely on real-time data encryption and decryption for operational continuity.

The devices also boast impressive performance metrics. The CMN4000R, in particular, is designed to handle high throughput, with the ability to process thousands of cryptographic operations per second, making it ideal for large-scale applications where speed is essential.

In terms of connectivity, both models feature multiple interfaces including USB, Ethernet, and serial options, allowing them to integrate seamlessly with existing infrastructures. This adaptability enables organizations to deploy the HSMs in a variety of environments, whether on-premises or in cloud-based systems.

Additionally, the CMN3000R and CMN4000R provide strong physical security features such as tamper-evident sealing and hardware-based protection against physical attacks, safeguarding against unauthorized access to the device itself.

In conclusion, the HSM CMN3000R and CMN4000R represent cutting-edge solutions for organizations determined to bolster their data security posture. With their comprehensive encryption capabilities, advanced key management, high availability options, impressive performance, and robust physical security features, these HSMs stand out as essential tools in the fight against data breaches and cyber threats.