Centralized Management
KEYNET provides centralized key and device management of a global network of Cipher X family of Network Security Devices. All device configurations including security policies are intuitively managed with a user-friendly interface. Automatic polling of alarms and logs monitor device status. KEYNET also securely generates, stores and distributes middle and high-layer encryption keys to ensure the critical security of the network.
Cipher X Encryption
The wire speed Cipher X 7210, 7211, and 7220 devices provide strategic-level communications security for global networks. They integrate seamlessly into existing or new networks without impacting network performance. The Cipher X family provides performance from 100 Mb/s to 10 Gb/s and is highly flexible, supporting a vast number of network configurations and a wide range of network security requirements.
Multiple Layers of Protection
The KEYNET Network Security Manager consists of a Windows 7 ultimate rack mount server and 1RU tamper-proof hardware-based security vault. The security vault is outside the Windows environment and generates and deploys the middle and upper level keys used in TCC’s three-tier symmetric key management hierarchy.
KEYNET securely communicates with all Cipher X Network Security Devices using SNMP with TCC’s secure extensions. Additionally, device management is user authenticated to provide control and traceability of changes. Two levels of role-based security are provided: crypto officers have full control capabilities, while operators are restricted to monitoring privileges.
Flexible Network Configurations and Security Policies
KEYNET configures and monitors the robust Cipher X Family security policy enforcement engine. Policies indicate how data is treated in the encryptors, including: pass through, cipher or block. Policies are based on a wide range of configurable parameters such as VLAN tags, L2/3 source and destination addresses, L3/4 protocol and port numbers. The flexibility of the Cipher X’s security policy engine provides wide-ranging support of network configurations and security requirements, while KEYNET simplifies their provisioning and management. Simple policy entries in KEYNET establish the policies without complex router reconfiguration required.
KEYNET Network Security Manager Providing Central In-Band Management of Cipher X Family Encryptors