BlackDoor GIG
Packet Encryptor
Overview & Applications
Gigabit Ethernet - Layer 2/3/VLAN/MPLS Encryption
The Engage Black•Door GIG Encryptor offers customers a new level of Gigabit speeds for securing existing packet based networks. The AES based encryption algorithms offer industry standard security levels at multiple layers of the network OSI while supporting up to Gigabit Ethernet transmission speeds. The Black•Door GIG Encryptor is installed at the edge of the existing network interfaces and means instant security upgrades for customer satisfaction and network invisibility. The Black•Door GIG is used by customers around the world for enterprise network security; it has always offered a reliable, efficient, cost-effective solution for adding encryption to non-secure network interfaces. It provides this level of security without requiring new system software or having to upgrade existing network edge devices. The Black•Door GIG Encryptor gives customers wanting a higher level of network protection a faster network alternative, a Gigabit interface encryption machine. The Black•Door GIG Encryptor enables enterprises to add AES security to Ethernet packet interfaces without having to disrupt their network edge hardware with upgrades, reconfiguration and add-on encryption accelerators. The Black-Door is deployable with basic Internet Protocol knowledge. |
Independently configurable MTUs with 9000 byte JUMBO Ethernet Support |
The Engage Black•Door GIG Encryptor offers customers a new level of Gigabit speeds for securing point to point or multi-point Ethernet networks. The Black•Door GIG Encryptor’s Ethernet interfaces have independently configurable MTUs that are able to handle up to 9000 byte JUMBO Ethernet frames in real-time. The AES based encryption algorithm offer industry standard security levels at Layers: 2/VLAN/MPLS/3. |
Point to Point “Plug-and-Encrypt” Installation |
The Black•Door GIG Encryptor is a plug-and-encrypt installation for the payload of layer 2 and MPLS point to point network connections. The payload of the Ethernet Packets entering the clear text LAN1 are AES encrypted and sent out LAN2 to the Egress Ethernet. Ethernet packets AES decryption requires a unique 256 bit key. |
The Change to Connectionless Networks |
Ethernet networks are being used for larger scale networks and as a replacement for traditional telco data services. Both private enterprises as well as service providers see the proliferation of Ethernet as a backhaul medium as an advantage for their network expansion. However, Ethernet at this scale can also lead to potential issues as the network is no longer as secure as a connection-oriented infrastructure. Security interfaces are required at all network access points to assure data packets as well as address information is encrypted and protected. These interfaces might be less robust software solutions or for a higher level of network security, plug-and-play encryption appliances. These interfaces might be less robust software solutions or for a higher level of network security, plug-and-play encryption appliances. The Engage Black•Door GIG Encryptor offers an effective, easy-to-install solution to solve this problem. The Black•Door GIG Encryptor can be added to existing equipment sites for upgrade of security or it can be installed with new systems to add AES encryption to non-secure equipment. It works in both point-to-point as well as point-to-multi-point configurations at Gigabit access speeds. |
OSI Layer Encryption |
Layer 2 - Bridge Layer 3 - Router Tunnel - Equipment Interface MPLS |
Point-to-Point or Point-to-Multi-point Network ConfigurationsThe Black•Door GIG Encryptor transparently AES encrypts Ethernet networks at Gigabit speeds. Ethernet Voice, Video or Data packets, that are destined for a device located on a remote network or a different local network segment, are AES encrypted at the Link, Network or Transport Layer and then tunneled, bridged or routed to the destination network. At the destination network the packets are decrypted and the original Ethernet packets are securely delivered to the destination Ethernet device. |
Applications
BlackDoor GIG Encryptor Applications | |||||||||||||||
| |||||||||||||||
| |||||||||||||||
| |||||||||||||||
Network to Multiple Network Access Points - Encryption with BLACKDOOR GIG Encryptor | |||||||||||||||
Broadband Interoffice Ethernet Demand for interoffice bandwidth to support applications such as: VOIP, IPTV and Video on Demand, and the aggressive pricing from Ethernet Service providers are pushing Interoffice Ethernet into Multisite Enterprises. Encryption is required at all network access points to assure sensitive payload and address information is encrypted and protected when it traverses service provider networks Wireless Gigabit Ethernet Encryption One of the most economical means to establish Gigabit Ethernet connectivity between line-of-site locations is Wireless Ethernet with Gigabit interfaces. The BlackDoor GIG facilitates encryption of the Egress Ethernet to externally located Wireless Gigabit and offloads encryption from the Radio and supports multi point installations. Connectionless Network Protocol Security Ethernet networks are being used for larger scale networks and as a replacement for traditional telco data services. Both private enterprises as well as service providers see the proliferation of Ethernet as a backhaul medium as an advantage for their network expansion. However, Ethernet at this scale can also lead to potential issues as the network is no longer as secure as a connection-oriented infrastructure. Security interfaces are required at all network access points to assure data packets as well as address information is encrypted and protected. These interfaces might be less robust software solutions or for a higher level of network security, plug-and-play encryption appliances. The Engage BlackDoor GIG offers an effective, easy-to-install solution to solve this problem. The BlackDoor GIG can be added to existing equipment sites for upgrade of security or it can be installed with new systems to add AES encryption to non-secure equipment. It works in both point-to-point as well as point-to-multi-point configurations at Gigabit access speeds.
| |||||||||||||||
OSI Layer Encryption | |||||||||||||||
BLACKDOOR GIG Encryptor Benefits
|
Technical Specifications
Category |
|
Regulatory: |
|
Management: |
|
Power: |
|
Dimensions: |
|
TFTP Online Upgrade Capable (FLASH ROMs) |
|
Environmental: |
|
Encryption Algorithm: |
|
LAN Network Interface: |
|
LAN Network Protocols Supported: |
|
System Architecture: |
|
Performance: |
|
Interfaces: |
|
How to Order
Ordering Information | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|