VCL-2143

NETWORK MOUSETRΑPTM AN ADVANCED HONEYPOT (NETWORK INTRUSION DETECTOR)

VCL Network-MouseTrαpTM is an essential network security tool that sits behind the firewall in a secure environment to detect firewall breaches and unauthorized intrusions in an network. VCL Network-MouseTrαp™ is an advanced “honeypot” / “decoy server” that can be programmed by the user to emulate various types of IEDs such as Protection Relays, RTUs or Payment Gateways etc. and forms an essential part of the digital forensics kit that may be installed in secure critical infrastructure such as in Sub-Stations, Smart Grid Distribution Systems, Airport and Railway IT Networks as well as Financial Infrastructure such as Banks and Payment Processing Gateways to “alert” the network administrator of hostile intrusions and firewall breaches.

Download Brochure
Category:

Description

Security Features and Highlights:

  • Emulations: May be programmed by the user to emulate various types of targets such as a Protection Relay, RTU or Payment Gateway etc. to lure an unsuspecting intruder.
  • White List option: Sends an alert when the IP address or IP Domain are accessed by any entity not in the user programmed White List.
  • Black List option: Sends an alert when the IP address or IP Domain are accessed by any entity originating from the user programmed Black List.
  • User Programmed Filters: Port (Soft) Based, IP Address based and IP Domain based.
  • SNMP trap generation for transmitting security alerts over a secured network.
  • Out-of-Band Security Alerts transmitted over a serial RS485 interface. May be wired to the VCL-2702, Network Isolation Switch for disconnecting the Local Area Network from the Wide Area Network in the event of a network-security breach.
  • Dry contact alarm output.
  • Integrated audio and visual alarms with alarm acknowledgment button
  • Non-volatile Access Log with capability to “fingerprint” all access attempts and keep a log of the IP addresses and Domain for forensic analysis by the network administrator
  • Resistance to Denial of Service (DoS) Attacks

Universality of Purpose and Ease of Use:

  • Seamless scalability
  • Infrastructure neutral
  • Transparent to network and applications
  • Easy installation and management

Interfaces:

  • Total Number of System Interfaces: 2
    • 1 x 10/100 RJ45 Network-MouseTrαpTM “Decoy-Server / Honey-Pot” Network Interface
    • 1 x 10/100 RJ45 Network-MouseTrαpTM Secured Network Management Interface
  • Dry-Contact Relay Output.
  • RS485 Output that may be wired to a VCL-2702, Network Isolation Switch for transmitting out-of-band security alerts.
  • USB serial port for local access and configuration.

Monitoring and Access Control:

  • Password Strength Monitor
  • Device Management and Alarm Monitoring
  • Command Line Interface – Telnet, SSH with clear text disable function
  • SNMPv2 Alarms
  • Alarm condition detection and reporting (traps and SNMP alarm table)
  • Alarm Relay for connecting External Audio / Visual Alarms
  • Syslog
  • Audit Log
  • Secure Boot
  • Encrypted Firmware Updates
  • Password Protection with password strength monitor
  • RADIUS Password Authentication
  • SSH (Secure Access Control) with encrypted Password Protection

LED Indicators:

  • System Status LED
  • Power LED

Power:

  • Power: 15V DC to 60V DC.
  • Power consumption: 9W at maximum load
  • 100~240VAC, 50/60Hz (external adapter)
  • 85VDC ~ 250VDC (external adapter)

Regulatory:

  • Emissions: As per CISPR 22 / EN55022 Class A
  • FCC: Part 15 Subpart A
  • Immunity: EN55024, EN61000
  • RoHS
  • CE

Physical and MTBF:

  • DIN-Rail Industrial (IP50) Chassis.
  • Optional, 1U, Ruggedized Industrial 19-Inch Chassis.
  • Height x Depth x Width: 40 mm x 170mm x 168 mm
  • Weight: <1 Kg
  • MTBF: ≥ 280,000 hours

Applications:

  • The VCL-2143, Network MouseTrαp™ may be used to secure critical infrastructure such as Sub-Stations, Smart Grid Distribution Systems, Airport and Railway IT Networks as well as Financial Infrastructure such as Banks and Payment Processing Gateways.

May be used to secure:

  • Utilities: Power generation, power transmission and power distribution systems
  • Smart Grid: Power Distribution Systems
  • Oil & Gas pipelines and production facilities
  • Remote nodes in a SCADA networks
  • Railway and Airport Infrastructure
  • Financial Infrastructure such as Banks and Payment Processing Gateways
  • IT Networks of Law Enforcement Agencies

To detect network breaches / network intrusion in real-time Typical Network Management System (NMS) Architecture