Welcome to the NIS Blog. Today’s entry contains FAQs Part 2:
Q. Does the Interceptor have an impact on the bandwidth of the network? A: Interceptor is a physical layer device, and does not touch, process or verify the network data or the National Security Information, therefore no bandwidth bottlenecks are created allowing full utilization of the network – up to 10Gbps and beyond.
Q. Is it necessary to perform an auto-configuration before Interceptor can start protecting a network? A: The Interceptor is set at the factory with a default profile that enables it to be placed into service and protect the network immediately. Once installed, performing an autoconfiguration while the unit continues to monitor optimizes the protection profile.
Q. Which organizations have approved Interceptor? A: As an alarmed carrier hardened Protected Distribution System (PDS) compliant with the requirements of NSTISSI 7003, the instruction that governs the transmission of unencrypted National Security Information, INTERCEPTOR™ is a fully approved PDS option. INTERCEPTOR also complies with requirements AFI 33-201 (Air Force), AR 25-2 (Army) and NAVSO P-5239-22 (Navy). It is also listed on the US Air Force CTTA Approved Product List for PDS Alarm Systems as well as the US Navy TEMPEST PDS Approved Product list. INTERCEPTOR has been reviewed by the DISA DSAWG and confirmed as a viable tool for SIPRNet protection subject to approval by local approval authorities.
If you have specific questions you would like us to address, feel free to email me at Amanda@networkintegritysystems.com.
Friday, January 29, 2010
Friday, January 22, 2010
Fact Friday #1
We get a lot of the same questions from our customers and partners about how Interceptor works. My next few blog posts will attempt to address some of the most commonly asked questions. Here’s FAQs Part 1:
Q. How does Interceptor™ detect an intrusion into a fiber optic cable?
A: Interceptor launches a monitoring signal into a pair of fibers of the optical cable being protected, which turns the entire cable (up to 144 fibers) into a sensor. When any component of the cable is abnormally handled, for instance during an intrusion attempt, the monitored fibers sense the disturbance and Interceptor reports the event.
Q. How does Interceptor distinguish between true intrusions and everyday events that may cause nuisance alarms?
A: Interceptor incorporates a patented Smart Filtering™ technology to “auto-configure” itself and learn a baseline of normal, routine, benign, non-threatening affects upon the cable system. These normal events are thereafter ignored resulting in the elimination of false alarms.
Q. What type of fiber does Interceptor require for monitoring?
A: Interceptor uses the standard communications fibers inside the cable to perform the monitoring, and models are available for dark (unused) or active (transmitting data) fibers.
Q. Does Interceptor protect the cable or just individual fibers?
A: For most cable designs, monitoring as few as 2 fibers within the cable can protect an entire 144-fiber cable. If ingress into the cable is attempted, the protected fibers will sense the disturbance and issue an alarm.
Q. Is an Interceptor required at both ends of the cable run being protected?
A: In the case of dark fiber monitoring, a single Interceptor is required at one end of the cable. For monitoring active fibers, a single Interceptor Plus™ is required at one end of the cable along with a small passive device (Remote Termination Unit) at the far end.
Q. To how many separate buildings or drops can a single Interceptor provide a secure connection?
A: A single Interceptor can provide a secure connection to a minimum of four locations and typically, based upon the network architecture, to as many as sixteen and sometimes up to thirty-two.
If you have specific questions you would like us to address, feel free to email me at Amanda@networkintegritysystems.com.
Q. How does Interceptor™ detect an intrusion into a fiber optic cable?
A: Interceptor launches a monitoring signal into a pair of fibers of the optical cable being protected, which turns the entire cable (up to 144 fibers) into a sensor. When any component of the cable is abnormally handled, for instance during an intrusion attempt, the monitored fibers sense the disturbance and Interceptor reports the event.
Q. How does Interceptor distinguish between true intrusions and everyday events that may cause nuisance alarms?
A: Interceptor incorporates a patented Smart Filtering™ technology to “auto-configure” itself and learn a baseline of normal, routine, benign, non-threatening affects upon the cable system. These normal events are thereafter ignored resulting in the elimination of false alarms.
Q. What type of fiber does Interceptor require for monitoring?
A: Interceptor uses the standard communications fibers inside the cable to perform the monitoring, and models are available for dark (unused) or active (transmitting data) fibers.
Q. Does Interceptor protect the cable or just individual fibers?
A: For most cable designs, monitoring as few as 2 fibers within the cable can protect an entire 144-fiber cable. If ingress into the cable is attempted, the protected fibers will sense the disturbance and issue an alarm.
Q. Is an Interceptor required at both ends of the cable run being protected?
A: In the case of dark fiber monitoring, a single Interceptor is required at one end of the cable. For monitoring active fibers, a single Interceptor Plus™ is required at one end of the cable along with a small passive device (Remote Termination Unit) at the far end.
Q. To how many separate buildings or drops can a single Interceptor provide a secure connection?
A: A single Interceptor can provide a secure connection to a minimum of four locations and typically, based upon the network architecture, to as many as sixteen and sometimes up to thirty-two.
If you have specific questions you would like us to address, feel free to email me at Amanda@networkintegritysystems.com.
Subscribe to:
Posts (Atom)