Name: 5-Series
Text: -
-h
-.L
a
INT.ROD
5
X N G THE
a*,!-&I--
s
.Ilc
-
-"-
Yq
1
+
c
C
L*r
networks. Designed for defense and (c~,lnW]
y are fully-embedded without mating parts and
ks m8 p m r foaQrintSsi aU ewstc1rnize$"
inutes, they can be configwad and installed'
-,-f existing nefwnrk topotag~.Capabilities include: Keyword, 'RMiUS,
ion identif~ation;Mtering. moditicatian,and injection of packets;
ng collection systems. With this modu!asplakfbrm, Packet forensics
IL-creaksmission packages based on
customet requiwmb.
Bf all, thejre
so cost eR&ve, t
h
e
n
2 dis~mbl.e--tbt
I
4:
'---3
Introduction
The Ei-Series is a turnkey Enterrnpt solution
in an appliance platform. Uffering the most
flexibte approach to network surveillance
and novel approaches to rapid deployment
and stealthy reporting of captured data.
the 5-Series devices are unmatched in the
industry.
An attractive feature of the fi-Seriesis
its ability to passive& discover network
topiogy--this allowz an individual to
depIoy it wlth no prior knwvledge of the
target network. The device can be placed
in-tine and immediately act as a passive
bridge while performing its mission.
As intelligenceis being gathered and
the device has an understandingof the
network. it uses its stealth reparting
techniques to return captured information
or accomplirh a variety of other missions.
tapologicatly behindit. The 5-Series
can be used to intercept and recad
matching d o n s to intentat fktshmemory, or report ttrern upstfegmusing
a variety of fmt(pt&. In the most hostile
environments, this upstream reparting can
be aaccornptishedusing a technique W
makes the 5-Series'presinse undektable
using standard network security mcethods,
The 5-Series is an ideal solution to the
"Internet Caie Pro$lem.' Quick d
e
p
m
e
n
t
and remote control minimize personnet
risk and m
m
ze
axii
~ ~ t b d mpabitities.
on
Small footprint and minimal power
requirements make installation easy,
Solvina the lnternet Cafe Problem
_ _ -.
_.
Key Advantages
The 5-Series has no MAC adbnws or P
ad-;
it dynamically m q u w a d e s
as the most appropriate host that sits
ThelntwnetCafe
-- -. -. -. -. -. -. _ _
Intercepted content is relayed covertly via a "Digital Dead Drop."
somewhere on the Internet, sent out-of-band via 36 network or
sent using the existing lnternet connection directly to the LEA.
WireLessAP
-
I
Customized mission packages
Small form-factor, solid-state [as
small as 4 square inches]
No moving parts, highly reliable
Battery, PoE o r wired power
Hardware bypass, fail-safe
Tamper detection, fail-secure
Up to Gblsec throughput
Deployable with no knowledge of
target network topology
Supports stealth upstream reporting
[practically undetectablel
"Digital Dead Drop" delivery
Triggers intercepts based on
keywords, RADIUS, DHCP, behavior
or other subject criteria
Probe and Mediation capabilities
Performs dialed digit extraction
Packet modification, injection and
replay capabilities
Packet Forensics software stack and
PeerTalkTMtechnology
Advanced firmware-update keeps
software up-to-date
4
z
fikring, remote pcket injection, traffic
teptay and literal&T k o h n d s m m .
Advanced Policy Regime
The Packet Forensics policy regime
allows multiple policies to operate
simultaneously on the entire data
For technical experts, an advanced
stream. This means while you search
policy editor is provided. You can
for thousands of different strings
craft your own applications and take
deep inside each packet, you can also
granular control over a l l packet
processing functions.
intercept VolP calls, extract dialed
a
digits and correlate RADIUS and
DHCP Log-ins with IP addresses. Each
Simple Scalability
policy can have different resulting
With the Packet Forensics multi-
actions, such as forwarding packets
platform graphical user interface,
to another analysis system or writing
scaling an installation is as simple
pen register-type Logs. Packet
as stacking additional equipment,
Forensics provides many powerful
plugging it in, and clicking on a few
applications such as transparent web
buttons authorizing i t to execute your
-m
t0.E fU X 4.5 W
I f X l -75 [M
Custom S i W l a b t e
S i n Flash. Memory
SeridfkmdewithCiJ
S5H Remcrte Managment
Multi-&Ell~
u
,
g&
PACKET FORENSICS
s
~
PACKET FORENSICS
4 2 0 S S M I T H RD
TEMPE, AZ 85281 U S
+lI7571 3 2 0 - 2 0 0 2
WWW.PACKETFORENSICS.COM
-
/"
i
Document Path: ["brochure407.pdf"]