Cisco Model D-PCG1000 PowerKEY CAS Gateway Ficha De Dados

Página de 5
 
 
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. 
Page 1 of 5 
Data Sheet 
Cisco Transaction Encryption Device IV 
Now you can allow selective access to secured services such as broadcast video, 
impulse pay-per-view (IPPV), reservation pay-per-view (RPPV), and video-on-demand 
(VOD). The Cisco
®
 Transaction Encryption Device IV (TED IV) server provides 
PowerKEY
®
 Conditional Access, a security feature for the Cisco Digital Network 
Control System (DNCS) that helps ensure the delivery of secure and authenticated 
services within service provider networks. Using the Cisco TED IV and PowerKEY 
encryption techniques, service providers can secure the transmission of the content 
throughout the network and allow only authorized subscribers to access the service. 
PowerKEY is initialized on the Cisco DNCS and the Cisco TED IV server to validate access to secured services. 
Platform and application security are enhanced by the following features: 
● 
Cisco TED IV does not deploy with a keyboard or monitor. 
● 
It is directly connected to the Cisco DNCS because Cisco TED IV has no network access. 
● 
It is not designed as a multiuser platform. 
● 
It is accessible only by gaining an administrator or security role on the Cisco DNCS. At power up, the Cisco 
TED IV boots and runs its application without user intervention. 
The Cisco TED IV is built from a Cisco Unified Computing System
 (Cisco UCS
®
) C200 M2 or C220 M4 server and 
includes the nCipher nShield 6000e hardware security module (HSM). Cisco TED IV servers run on the Red Hat 
Enterprise Linux operating system (Figures 1 through 3). 
Figure 1.    Cisco TED IV on Cisco UCS C200 M2 and Cisco UCS C220 M4 (Image May Vary from Actual Product 
and Specification)