interceptor optical network security system design guide · optical network security system design...

58
Interceptor Optical Network Security System Design Guide Chapter 6: Network Architectures !

Upload: dotruc

Post on 02-Apr-2018

221 views

Category:

Documents


1 download

TRANSCRIPT

Interceptor™ Optical Network Security System

Design Guide

Chapter 6: Network Architectures!

Copyright © 2010 Network Integrity Systems, Inc.

All rights reserved.

The information in this document is subject to change without notice. The statements, configurations, technical data, and recommendations in this document are believed to be accurate and reliable, but are presented without express or implied warranty. Users must take full responsibility for their applications of any products specified in this document. The information in this document is proprietary to Network Integrity Systems, Inc. The software described in this document is furnished under a license agreement and may be used only in accordance with the terms of that license. The software license agreement is included in this document.

TrademarksNetwork Integrity Systems, Inc., the Network Integrity Systems, Inc. logo, and Interceptor are trademarks of Network Integrity Systems, Inc. Other brands and product names are trademarks or registered trademarks of their respective holders.

Statement of ConditionsIn the interest of improving internal design, operational function, and/or reliability, Network Integrity Systems, Inc. reserves the right to make changes to the products described in this document without notice. Network Integrity Systems, Inc. does not assume any liability that may occur due to the use or application of the product(s) or circuit layout(s) described herein.

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 39

Chapter 6 | Network Architectures

This section of the Design Guide details the various network architectures that can be deployed using an INTERCEPTOR alarmed carrier PDS solution for inside and outside plant SIPRNet and JWICS networks. Selecting the correct network architecture can dramatically impact the long­term flexibility and scalability of a network, and it can also reduce both the cost and complexity of deployment. The goal of this section is to present several reference architectures for any of the following possible uses:

1. As a benchmark or a reference architecture for your own particular deployment;

2. As a repository of architectures from which to select in order to satisfy the requirements and scope of your deployment; or

3. As a source of ideas or technical approaches to assist in the development of your own custom architecture.

If your deployment scope is fairly large, you may find that you have to mix and match components from two or more architectures to develop an optimal fit for your deployment. Doing so, however, is often an indication that your deployment scope may still be too large, and that you could benefit from further seg­menting your deployment scope or requirements. See Section on Deployment Scope, Chapter 5.

The network architectures are divided into two primary categories:

Outside Plant Architectures (OSP) – Between Buildings Inside Plant Architectures (ISP) – Inside of Buildings

The remainder of this section thoroughly reviews each type of architecture within each category and provides a summary of the key benefits and applications in order to help assist with selecting an appropriate architecture.

This section provides information pertinent to making the following key decisions:

Key Decision:

Selecting a network architecture or architectures that will support your deployment requirements and scope; and

Determining whether the selected architecture effectively balances deployment cost and complexity with future network growth and scalability.

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 40

Chapter 6 | Network Architectures

Outside Plant (OSP) Architectures

For years, deploying SIRPNet or JWICS between facilities was predominantly accomplished using in­line network encryp­tors or by installing a hardened carrier PDS system such as a concrete­encased duct bank. Since legacy alarmed carrier PDS systems required a rigid metallic conduit to be installed in order to detect intrusion attempts, there was not an ap­plication for alarmed carrier PDS systems in the outside plant network.

Now, by utilizing INTERCEPTOR technology, both new and existing outside­plant fiber optic cables can be protected by the INTERCEPTOR’s intrinsic monitoring capabilities. The following network architectures could each be used with INTERCEPTOR to protect SIPRNet/JWICS networks.

1. Building­to­Building Connectivity/Trunk Cable2. Centralized Switch3. High Fiber Count Trunk Cable/Optical Ring

By the nature of PDS deployments, information security concerns typically limit unencrypted outside­plant networks to LCAs (Limited Control Access Areas) such as gated government campuses or military installations, or between buildings where there are other compensating security measures, such as guards and cameras, among others.

For any outside plant deployment, it is critical to have close interaction with your respective DAA and CTTA to ensure that any proposed PDS system–hardened or alarmed–provides the necessary protection for unencrypted, classified national security information based upon your specific deployment.

Figure 1: Typical OSP Environment

Considerations for Any OSP INTERCEPTOR Alarmed Carrier PDS Deployment

1. It is recommended that OSP cables be buried a minimum 1 meter deep.2. With buildings separated by significant distances, potential distance limitations must be factored.3. The requirement to inspect and clear alarms within fifteen minutes must be planned for.4. Careful planning must take place to access logical PDS deployment (example: clustering of facilities).

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 41

This architecture is utilized to protect the building­to­building trunk cable that is providing unencrypted SIPRNet or JWICS traffic.

Primary Applications

Many end user buildings receive SIPRNet or JWICS network traffic directly from the primary or secondary point­of­presence (POP) on a government campus or military installation.

For commercial buildings, several deployments also exist in which an agency or contractor has expanded from its current building to one or two other buildings in the same business park that also require secure network connectivity.

Figure 2: OSP Building­to­Building Trunk Cables

Chapter 6 | Network Architectures–Outside Plant OSP­1: Building­to­Building Connectivity/Trunk Cable

Underground fiber optic cables

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 42

Design Considerations

The near­term and long­term secure connectivity requirements for the new buildings or facilities are the key consider­ations for implementing this type of deployment, as well as whether there will be a red/black equipment room in the new building or buildings or if the users or workcenters will be serviced off of the SIPRNet/JWICS switch in the current facility. If there will not be a red/black equipment room or information processing systems (IPS) in the new building or buildings, please refer to discussion of the Centralized Switch architecture.

For many outside­plant networks, the de facto standard is to use singlemode fiber; however, the cost of the LX elec­tronics that are used to transmit optical signal on singlemode fiber is more than two or three times the cost of the SX electronics that are used on multimode fiber. Recent developments in 50µm laser­optimized multimode fiber now allows 10gbps transmission out to 500 meters. Therefore, it may be possible to leverage multimode fiber between buildings. For deployments where there will be a red/black equipment room or IPS vault, the fiber optic cables will serve as the trunk or uplink cable for every user in that facility. This can drastically increase the bandwidth demands over time on the SIPRNet/JWICS switch and the resulting trunk network or uplink back to the POP–especially considering that there will be close to 100% utilization of the network during crises or combat operations. As a result, it may be necessary to provide multiple optical circuits (pairs of fibers) that can be used to scale the bandwidth capacity of the network based on the type of network electronics used.

Deployment Example

Today 3 Years 5 years

SIPRNET Users 4 10 15

End User NIC Card 100MB 100 MB 1 GB Max. Trunk Bandwidth Req. 400MB 1 GB 15 GB

Network Equipment Speed 1 GB 1 GB 10 GB

Max Optical Circuits 1 1 2

Table 1: Bandwidth utilization

As evidenced by the example above, building­to­building bandwidth requirements almost double each year, and if the SIPRNet/JWICS uplink does not keep up with the bandwidth requirements, the users will experience significant perfor­mance and reliability issues at the times the network is needed the most: crises and combat operations. Furthermore, the calculations shown are only for a primary SIPRNet/JWICS connection or uplink. Many mission­critical facilities re­quire redundant connectivity, which would double these requirements.

Chapter 6 | Network Architectures–Outside Plant OSP­1: Building­to­Building Connectivity/Trunk Cable

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 43

INTERCEPTOR Alarmed Carrier PDS Components/Options

See Section 4 for more guidance on choosing INTERCEPTOR or INTERCEPTOR+Plus.

As long as there is sufficient dark fiber for both near­term requirements and long­term bandwidth growth, a basic INTERCEPTOR unit and a fiber loopback could be installed to protect the outside­plant SIPRNet/JWICS cable or cables.

Figure 3: Dark fiber connections

If there are not sufficient dark fibers in the optical cable or cables, or for future scalability then an INTERCEPTOR+Plus unit should be used. When there are dark fibers available during initial installation, then a fiber loopback can be used until all of the fibers have been lit. An RTU can be purchased on a port­by­port basis and installed in the connector hous­ing in each of the end user buildings.

Figure 4: Active fiber connections

Minimum Number of INTERCEPTORs Required per Building Link

Each port on an INTERCEPTOR unit can be used to protect individual building­to­building cables; thus, a four­port INTERCEPTOR unit can provide secure connectivity for four separate cables or end­user buildings.

Number of INTERCEPTORS Required: INTERCEPTOR INTERCEPTOR INTERCEPTOR 1­Port 2­Port 4­PortTotal Number ofBuilding­to­Building Links

1 1 0 0

2 0 1 0

4 0 0 1

6 0 1 1

8 0 0 2

10 0 1 2

Table 2: Scalability of Interceptor Equipment

Fiber Optic Loopback

Optical Cable

INTERCEPTOR™

INTERCEPTOR Alarmed Carrier PDS Equipment

INTERCEPTOR+Plus Alarmed Carrier PDS Equipment

Fiber Optic Loopback

Optical Cable

INTERCEPTOR™ +PLUS INTERCEPTOR™RTU

RTU

Fiber Optic Loopback

Optical Cable

INTERCEPTOR™

INTERCEPTOR Alarmed Carrier PDS Equipment

INTERCEPTOR+Plus Alarmed Carrier PDS Equipment

Fiber Optic Loopback

Optical Cable

INTERCEPTOR™ +PLUS INTERCEPTOR™RTU

RTU

Chapter 6 | Network Architectures–Outside Plant OSP­1: Building­to­Building Connectivity/Trunk Cable

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 44

Chapter 6 | Network Architectures–Outside Plant OSP­1: Building­to­Building Connectivity/Trunk Cable

Building BBuilding A

Patch Panel

Manhole

Building A

Manhole

Patch Panel

INTERCEPTOR

INTERCEPTOR™

Outdoor CableIndoor Cable Outdoor CableOutdoor CableSplice Case Splice Case

Cable 1Cable 1

Cable 2

Cable 3

Cable 4

Optical Cables

Building B

Patch Panel

INTERCEPTOR™

WARNING: If the total distance that the INTERCEPTOR signal will travel exceeds two kilometers for mul­timode fiber or twelve kilometers for singlemode fiber, Network Integrity Systems should be contacted for additional assistance.

In the case that multiple optical cables are installed between two buildings, a single INTERCEPTOR port can be concatenated using two fibers from each cable to provide protection for the entire building­to­building network, thereby minimizing the cost of protection and maximizing the use of each INTERCEPTOR port.

Figure 5: Concatenating fibers to protect multiple cables from one point

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 45

This architecture leverages an incoming SIPRNet/JWICS trunk to an end­user building to service secure network require­ments in that facility. Additionally, it fulfills other low­density, end user access requirements in surrounding facilities that only have near­term needs for a few access points. In this scenario, the end­user building serves as a consolida­tion point or transport node also supplying low­density, secure network access requirements to remote facilities such as guard shacks, maintenance or service utilities, temporary or contingency trailers, for example, that are in close proximity. This approach eliminates the immediate need for costly facility modifications or the purchase of expensive IPS vaults in the remote facilities, and it provides rapid deployment and scalability of SIPRNet/JWICS connectivity. If secure network access requirements increase over time in the remote facilities, then the network architecture is read­ily adaptable on a facility­by­facility basis using the outside plant architecture #O­1: Building­to­Building Connectivity / Trunk Cable.

INTERCEPTOR is used to protect the incoming building­to­building trunk cable that is providing unencrypted SIPRNet or JWICS traffic from the POP, as well as the indoor/outdoor optical cables that are used to provide direct SIPRNet/JWICS connectivity to the users in the remote facilities (assuming there is not a red/black equipment room in the facilities). This drastically reduces complexity of the traditional approach of installing a SIPRNet/JWICS switch in each building, along with a network encryptor and an IPS vault.

Figure 6: Example of centralized switch architecture

Chapter 6 | Network Architectures–Outside Plant OSP­2: Centralized Switch

POP

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 46

Primary Applications

In many cases, secure network access requirements are concentrated on mission­critical or combat­support facilities where there is a medium­ to high­density requirement for SIPRNet/JWICS access. Often, there are also requirements to provide SIPR/JWICS access to senior decision makers, support personnel, or communications room users, access to buildings that are in close proximity to the primary, mission­critical or combat­support facility.

Some organizations cannot justify the high cost of a network encryptor and an IPS vault. As a result, these users are typically forced to access SIPRNet/JWICS in other facilities, which greatly increases the latency and complexity of com­munication and collaboration.

Design Considerations

Some important considerations for this type of deployment are as follows:

1. the number of buildings requiring SIPRNet/JWICS access that are in close proximity to the primary facility where the SIPRNet/JWICS switch and uplink is located; 2. the number of users requiring the secure network access in each of those buildings; 3. the distance of the buildings from the primary facility; and 4. the distance of the users requiring access from the indoor/outdoor demarcation point in each of the buildings.

For the cable that runs between the primary facility and the surrounding buildings, using armored, plenum­rated, indoor/outdoor cable is highly recommended. It can be deployed point­to­point from the SIPRNet/JWICS switch in the primary facility directly to the end user locations in the surrounding facility. By doing so, there is no need to have a demarcation point that transitions between outside­plant and indoor cabling.

INTERCEPTOR can also make use of existing optical cables between the primary facility and the surround­ing buildings if there are sufficient dark fibers and the ability to separate red/black traffic in the cable (e.g., a separate buffer tube or subunit in the cable). Interlocking armored cables can then be installed from each building’s black equipment room to the end user locations. Since there is no network equip­ment being installed, and the SIPRNet/JWICS traffic is being optically transmitted, the outdoor cables can simply be patched over to the new interlocking armored cables without the need for an IPS vault or added security. However, we recommend that the transmission point (ex: patch panel) be secured in a NSTISSI 7003 approved lock box. INTERCEPTOR will protect the entire optical path–from the existing outside­plant cables to the newly installed interlocking armored cable. Once the cables are installed at the end user locations, a hardened workstation lock box can be installed and secured by a GSA approved padlock to provide the necessary protection for the SIPRNet/JWICS access points and to ensure that end users are authenticated by knowing the combination of the lock in order to get SIPRNet/JWICS access.

Chapter 6 | Network Architectures–Outside Plant OSP­2: Centralized Switch

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 47

Deployment Comparison Example

Switch + INTERCEPTOR Switch + Encryptor + IPS

in only Primary Facility in Each Building

Number of buildings 4 4

Users in surrounding buildings 2 each 2 each

Cost of SIPRNet switch(es) $4,000 $16,000 ($4,000 x 4)

Cost of 4­port INTERCEPTOR $20,000 ­

Cost of inline encryptors ­ $36,000 ($9,000 x 4)

Cost of IPS vaults $12,000 (1 for Primary Facility) $48,000 ($12,000 x 4)

Cost of cabling $6,250 $5,000

TOTAL $42,250 $105,000

Avg. per Bldg. $10,562 $26,250

Table 3: Deployment Comparison Example

As you can see from the example above, the Centralized Switch architecture leverages the INTERCEPTOR to drastically reduce the cost of deploying SIPRNet/JWICS. Another key component to consider is that the lead time for encryptors and IPS vaults could be between six and nine months.

INTERCEPTOR Alarmed Carrier PDS Components/Options

Depending on the security threat level and compensating security measures in each facility, the responsible DAA/CTTA my require that traffic to the remote users is immediately disrupted upon any detected tampering or intrusion. There are a variety of ways in which the INTERCEPTOR, either alone or in conjunction with ancillary equipment, can be configured to automatically disrupt network traffic.

In order to minimize potential accreditation issues, especially if there is potential for higher classifica­tion requirements, Network Integrity Systems highly recommends using INTERCEPTOR+Plus units for this architecture. If the DAA/CTTA eventually requires immediate traffic disruption, the network can easily be reconfigured so that the SIPRNet/JWICS traffic and the INTERCEPTOR alarm signal use the same pair of fibers for remote user connectivity in the surrounding buildings.

Chapter 6 | Network Architectures–Outside Plant OSP­2: Centralized Switch

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 48

INTERCEPTOR

INTERCEPTOR™

Lock Box

Lock Box

Lock Box

INTERCEPTOR Alarmed Carrier PDS Components/Options

Figure 7: Centralized switch network Design

As long as there are sufficient dark fibers that can be dedicated to INTERCEPTOR monitoring in any and all of the optical cables between the SIPERNET/JWICS switch in the primary facility and the end user locations in the surrounding build­ings, a fiber loopback can be installed in the workstation lock box to minimize initial deployment costs.

Photo 1: Loopback in Workstation Box

The fiber loopback can be replaced by an RTU if and when the ability to immediately terminate traffic to the remote users upon INTERCEPTOR alarm becomes required, or if the dark fibers need to be lit up for other secure network require­ments, such as adding ports, for example.

Scalability of INTERCEPTOR Equipment

At least one INTERCEPTOR port per every incoming SIPRNet/JWICS cable will be required to protect the uplink. Addition­ally, since each remote user or end user location in the surrounding facilities has a dedicated cable drop installed, there must be one INTERCEPTOR port for every remote end user being serviced from the centralized switch in the primary facility.

Additional INTERCEPTOR ports may be required in order to protect the distribution of the SIPRNet/JWICS traffic to the end users in the primary facility.

Chapter 6 | Network Architectures–Outside Plant OSP­2: Centralized Switch

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 49

This architecture protects a high­fiber count optical trunk cable or ring that is used to provide SIPRNet/JWICS connec­tivity from a single POP to multiple buildings—i.e., point to multipoint. The key difference between this architecture and #O­1 (Building­to­Building Connectivity /Trunk Cable) is that this architecture employs only one trunk cable to connect all of the buildings, via lateral cables and splice cases, as compared to the O­1 architecture’s which have a dedicated cable running to each building. This architecture also supports any deployment involving an optical ring or bus type of topology.

Figure 8: High fiber count trunk cable/optical ring network design

Primary Applications

The traditional telecommunications networking approach for outside plant fiber optic networks is to use a single, high­fiber count trunk cable (e.g., 72­288F) that “passes“ each building requiring access. Each building then has a low­fiber count (e.g., 12­24F) drop cable installed that is fusion spliced or patched to a subset of the fibers in the trunk cables, usually in twelve­fiber increments; for example,. one or two of the buffer tubes or subunits inside the trunk cable.

Figure 9: Detail of cable splicing and drops to buildings

Protecting not only the entire trunk cable but also each individual building drop cable so that the SIPRNet/JWICS traffic is being protected all the way from the POP to the end user building is the main challenge associated with using this architecture.

Chapter 6 | Network Architectures–Outside Plant OSP­3: High Fiber Count Trunk Cable/Optical Ring

POP

48-Fiber Cable

12-Fiber Drop

Splice Point Splice Point Splice Point Splice Point

12-Fiber Drop 12-Fiber Drop 12-Fiber Drop

High-Fiber Count Fiber Optic Cable

Buffer Tubes

12-Fiber Drop Cable

Building A Building B Building C Building D

Splice Point(in splice closure)

Dark Fibers past the Splice Points...

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 50

Design Considerations

Key considerations for deployment in this architecture are the length of the optical trunk cable and the clustering, or close proximity, of end user buildings to one another. Typically, end­user buildings can easily be clustered together in groups of two or four buildings.

Rather than developing or altering the trunk / drop cable fusion splice plan to factor in dedicated fibers for alarmed car­rier PDS, it is simpler to treat each twelve­ or twenty­four­fiber building connection as a point­to­point network, and simply cross­ or inter­connect the necessary fibers together in the various equipment or telecommunication rooms for trunk cable (usually at the POP) and the drop cable or cables for the end­user buildings. Using this approach, an INTER­CEPTOR can be dedicated to each building–point­to­point protection–or a single INTERCEPTOR port can be shared by all of the buildings in a cluster as long as they are in close proximity to one another.

When conducting fiber planning, it is best to define the requirements at the end points of the network (e.g., the end user buildings) and work backwards. In order to calculate how many fibers to deploy in the building drop cables, you first must determine how many fibers you will need for SIPRNet traffic at each building–both near­term and long­term. Re­member that it is standard practice for fibers to be spliced or connected from the trunk cable to the building drop cables or laterals in counts of six or twelve fibers. Once you identify how many fibers are needed for SIPRNet requirements, and factor in growth at each building, add two dark fibers to that calculation for INTERCEPTOR monitoring. In order to plan for spares and future growth, it is prudent to add 20% to 25% more fibers, and then round this number up to the nearest multiple of 12. This results in a determination of the fiber count needed for your building drop cables.

To calculate the fiber count required for the trunk cable, multiply the drop cable fiber count by the number of buildings that will be passed by the high­fiber count trunk cable and add–between 24 and 48 spare fibers. This way, you not only have enough fibers to meet current requirements, you also have enough for any future requirements or to counteract the possibility that some buffer tubes or sub­units become damaged over time. Rounding this number up to the next multiple of 72 produces the number of fibers needed in the trunk cable.

Keep in mind that the most expensive part of any deployment is the labor and installation, especially for outside plant deployments. Planning for future growth through dark fibers or spare ducts is absolutely critical.

Chapter 6 | Network Architectures–Outside Plant OSP­3: High Fiber Count Trunk Cable/Optical Ring

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 51

Deployment Example

A high­fiber count trunk cable is to be installed on a military installation to serve as the primary SIPRNet distribution for several mission­critical or combat­support facilities.

Today 3 Years 5 years

Total Buildings Passed by Trunk Cable 10 10 12 (2 new constr ???)

Buildings Requiring SIPRNet Connectivity 4 8 10 Fibers Required per Building 4F 4F 8Ffor SIPRNet Network

Fibers Required per Building 2F 2F 2Ffor INTERCEPTOR

Drop Cable Fiber Count 12F 12F 12F (4F+2F+20%*)<12F (4F+2F+20%*)<12F (8F+2F+20%*)<24F

Trunk Cable Fiber Count Required 144F 144F 216F (120F+24F)=144F (120F+24F)=144F (144F+48F)<216F

*Standard optical network design calls for 20% spare optical fibers.

Table 4: Deployment Example

Based on the calculations above, the military installation should install a trunk cable with at least 216 fibers, and use building drop cables with at least twelve fibers each.

INTERCEPTOR Alarmed Carrier PDS Components/Options

Whenever INTERCEPTOR units are deployed as part of a optical trunk cable or ring, it is highly recommended that INTERCEPTOR+Plus units are used; thus, if one or two buildings need to light up all the fibers in the drop cable, you can simply install an RTU at one end instead of needing a new INTERCEPTOR unit.

Figure 10: High fiber count trunk cable optical ring network design

Chapter 6 | Network Architectures–Outside Plant OSP­3: High Fiber Count Trunk Cable/Optical Ring

P1

P2

P3

P4

Splice Case

Splice Case

Splice Case

Splice Case

Building A Building B Building C Building D

Patch Panel with Loop Back

Patch Panel with Loop Back

Patch Panel with Loop Back

48 Fiber Trunk Cable

INTERCEPTOR+Plus Alarmed Carrier PDS Equipment

INTERCEPTOR™ +PLUS

RTUINTERCEPTOR™RTU

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 52

INTERCEPTOR Alarmed Carrier PDS Components/Options

As long as there are dark fibers in the building drop cable, a fiber loopack can be installed behind the bulkhead of the connector housing where the fibers are terminating. It is ideal to simply loop those fibers using an adapter coupler be­hind the bulkhead rather than plugging the alarmed fibers into the connector panel. By doing so, patching activities do not cause false alarms and the INTERCEPTOR circuit is totally transparent.

WARNING: Realize that you will have multiple alarmed circuits—one per building—traversing the trunk cable at any point along the cable route; thus any tampering or attempted intrusion of the trunk cable will result in multiple alarms. The building drops that did not alarm will need to be compared to those that did in order to isolate what part of the trunk cable needs the most attention. If a single INTERCEPTOR alarm is received, then most likely the activity is limited to that particular building’s drop cable.

When two to four buildings are in close proximity to each another in a cluster, it is possible to daisy­chain the building drops for these buildings so that they are all protected by a single INTERCEPTOR port (i.e., point­to­multipoint protec­tion). As the diagram below depicts, instead of each pair of fibers dedicated to the alarmed carrier PDS system plugging into the INTERCEPTOR, only the first fiber for the first building plugs into the SEND port, and the last fiber from the last building plugs into the RECEIVE port on the INTERCEPTOR. All of the other fibers from the buildings in the cluster are cross­connected together (e.g., building 1–fiber 2 cross­connected to building 2–fiber 1; building 2–fiber 2 cross­connected to building 3–fiber 1, etc.). This can drastically reduce the number of INTERCEPTOR ports required and the initial deployment cost, while also providing a comparable protection level to each building that has a dedicated INTER­CEPTOR port.

Figure 11: Fiber Loopback in Connector Housing

Chapter 6 | Network Architectures–Outside Plant OSP­3: High Fiber Count Trunk Cable/Optical Ring

INTERCEPTOR+Plus

Building A

Building B

Building C

Building D

Patch Panel

INTERCEPTOR™ +PLUS

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 53

Scalability of INTERCEPTOR Equipment

As long as two fibers for each building are being monitored by an INTERCEPTOR, no additional INTERCEPTOR equipment or configuration is required, even if additional fibers to some of the buildings are lit up. Additional INTERCEPTOR ports are only necessary if additional buildings are constructed along the trunk cable, thus requiring the installation of a new drop cable, or if some of the buildings required additional drop cables to be installed in addition to the one already pro­tected by the INTERCEPTOR. If a drop cable is damaged and a new drop cable is installed in its place, then the existing INTERCEPTOR equipment can simply be reconfigured to ensure that the new cable is being protected, and the old cable can be abandoned as long as no SIPRNet/JWICS traffic is still being transmitted over it.

In the rare case that multiple drop cables are installed to a building, a single INTERCEPTOR port can be concatenated using one fiber from each cable to provide protection for both drop cables, which minimizes the cost of protection and maximizes the use of each INTERCEPTOR port.

WARNING: It is important to make sure that the total distance that the INTERCEPTOR signal will travel will not exceed two kilometers for multimode fiber or twelve kilometers for singlemode fiber. INTERCEP­TOR can support much longer distances, but doing so requires careful application engineering. Please contact Network Integrity Systems for additional assistance.

Chapter 6 | Network Architectures–Outside Plant OSP­3: High Fiber Count Trunk Cable/Optical Ring

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 54

Five years ago, SIPRNet or JWICS deployments inside of a facility were extremely rare. In fact, most deployments were either to command and control centers, intelligence areas, or senior leadership offices and quarters. With the impact of netcentricity and the increased utilization of the Global Information Grid for enhanced communication and collaboration, there has been an explosion of SIPRNet and other SECRET and above level network deployments across both the DOD and civilian agencies.

For years, the traditional method of deploying SIPRNet for in­building requirements was either by installing a hardened carrier PDS system, such as a rigid metallic conduit along the wall, for example, or deploying an IPS vault with an inline network encryptor and a dedicated laptop for a single seat solution. Both of these approaches required dedicated, home­run cables to be installed directly from the equipment room of the facility to the workstation or end user area, and did not adequately support the flexibility and scalability required by current secure network deployments. With the high cost of network encryptors and the operational burden of Public Key Infrastructure (PKI), many government agencies and military installations have already transitioned to the use of a PDS system inside of facilities to distribute unencrypted SECRET and above information. Now, with the explosion in the number of users in each facility, many agencies and installations are looking for new options to further reduce the cost and complexities of secure network deployments and provide a more flexible and scalable solution.

INTERCEPTOR’s intrinsic monitoring technology is designed to protect fiber optic cables within buildings. In fact, many CONUS and OCONUS deployments can even leverage interlocking armor cable in place of the EMT or rigid metallic con­duit that was once required by older alarmed carrier solutions (see page 29). The following architectures could be used with INTERCEPTOR to protect inside SIPRNet/JWICS networks.

For any deployment leveraging the armored cable option, it is critical to have close interaction with your respective CTTA. Every PDS system–hardened or alarmed–must be evaluated on its own merits and characteristics to ensure that the secure network receives adequate protection against both internal and external threats.

Figure 12: Typical inside plant environment

Chapter 6 | Network Architectures–Overview of Network Architectures for In­Building SIPRNET/JWICS Deployments

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 55

Key Considerations for Any INTERCEPTOR Alarmed Carrier PDS Deployment

When planning for an indoor alarmed carrier PDS deployment, the following considerations should be taken:

1. Number of access points or drops per building

2. Need to inspect and clear within 15 minutes of alarm

3. Number of cables protected by each INTERCEPTOR port (point­to­point versus point­to­multipoint protection)

4. Ability to secure SIPRNet/JWIC Network Equipment or Cyptographic Equipment in CAA or IPS Container

5. Red/Black separation

6. Ability to provide cable management (i.e. J­hooks, D­rings etc.) and/or conveyance (conduit, wire basket, etc.) for LAN cables

Figure 13: Typical inside plant network design

Chapter 6 | Network Architectures–Overview of Network Architectures for In­Building SIPRNET/JWICS Deployments

1st Floor

2nd Floor

User 2

POP

Red/ClassifiedTelecom Room

Telecom Enclosure

SCIF 1

Horizontal Cabling

Non-Classified SIPRNet Users

3rd Floor

Building Riser

Red/ClassifiedEquipment Room

User 1

User 1

User 1

User 1

Red/ClassifiedTelecom Room

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 56

This architecture is the traditional deployment approach to providing a dedicated, low fiber count SIPRNet/JWICS drop to individual users, workstations, conference rooms, or offices. In this architecture, the workstations or offices that need SIPRNet/JWICS access are not located inside of a SCIF or CAA, so access points must be protected in a hardened enclosure that is secured by the GSA­approved high­security padlock.

Typically, a PDS is required when dedicated SIPRNet/JWICS cables are being routed through an LCA or UAA (Uncontrolled Access Area), or traversing a general use hallway.

Figure 14: Dedicated home­run architecture

Primary Applications

SIPRNet/JWICS access requirements for many buildings or facilities usually include only a small number of offices or workstations initially. These preliminary needs are easily supported by installing a dedicated fiber optic cable point­to­point between the telecommunications closet—or SIPRNet/JWICS switch–and the end user workstation. Alternatively an IPS can be used in place of the Telecom Room.

This architecture is ideal for voice­over­SIPRNet deployments that require separate, dedicated network drops to comply with the DISA Security Technical Implementation Guidance (STIG) for real­time voice/video network services.

Chapter 6 | Network Architectures–Indoor Architecture ISP­1: Dedicated Home­Run

Office 1Office 2

HallwayTelecom Room

Equipment Rack

Hardened Enclosure

Fiber Optic Cable

Controlled Access Area (CAA)

Limited Control Area (LCA)

Photo of Lock Box with Splice Closure (inside?)

Lock Box

Product Photography is only about 900k, and im­age reproduces blurry....reshoot photo?

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 57

Design Considerations

When designing a network using this Dedicated Home­Run architecture, there are three primary design considerations:

1. Protecting the SIPRNet/JWICS network equipment

2. Determining the fiber count of the workstation cables

3. Protecting the SIPRNet/JWICS access points

Consideration 1: Protecting the SIPRNET/JWICS Network Equipment

Many facilities do not have a red/black equipment room or even any areas that meet CAA criteria. For these scenarios, the use of an IPS container is highly recommended as a quick and cost­effective way to provide SIPRNet/JWICS network access without having to undergo costly and intrusive facility modifications. For those facilities that do have existing red/black equipment rooms or CAAs, the SIPRNet/JWICS and INTERCEPTOR equipment should be installed in them.

Consideration 2: Determining the Fiber Count of the Workstation Cables

In addition to the number of fibers required for data transmission, two dark fibers in each workstation cable should be allocated and dedicated to the INTERCEPTOR for alarmed monitoring. This can be accomplished be either (1) adding two additional fibers to the number of lit and spare fibers, thus allowing you to use a regular INTERCEPTOR unit and simply loop the fibers inside of the workstation lockbox, or (2) using some of the spare fibers for INTERCEPTOR monitoring in order to reduce the fiber count of the workstation cables and the initial deployment cost, but at the same time accepting the risk that you may need to purchase RTUs for the workstation enclosures if you ever need to light up the spare fibers initially used by INTERCEPTOR. (The latter approach also requires an INTERCEPTOR+Plus unit for future scalability).

Adding a few extra fibers to each workstation cable adds only pennies per foot to the cost of material, and it also reduces deployment costs by enabling the use of regular INTERCEPTOR units.

Keep in mind that the most expensive part of any network deployment is the labor and installation. Planning for future growth through dark or spare fibers is absolutely critical.

Consideration 3: Protecting the SIPRNET/JWICS Access Points

The home­run workstation cables must be terminated in a hardened enclosure according to NSTISSI 7003 requirements. An important decision is whether to have one enclosure per workstation, or alternatively to have multiple workstations using a single hardened enclosure, such as in the context of adjacent cubicles or open area workcenters, for example.

Chapter 6 | Network Architectures–Indoor Architecture ISP­1: Dedicated Home­Run

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 58

Deployment Cost Analysis Example

A military unit needs to deploy SIPRNet to four offices in its operations facility, each with 3 SIPR workstations. The offices are not inside of a SCIF or CAA. Each office needs a minimum of four fibers for SIPRNet connections, and the military unit expects that other SECRET level networks (e.g., CITRIX, COALITION, etc) may be required in the future. Further, it would like to have 50% spare fibers for future requirements.

Based on the requirement of four fibers for SIPR and another four fibers for future growth, the workstation cables will either be an 8­fiber or 12­fiber cable. The table below highlights the differences between adding dedicated fibers as op­posed to using spare fibers

Adding Dedicated Fibers Using Spare Fibers

Interlocking Armored Cable Fiber Count 12 8

Interlocking Armored Cable Cost Per Foot $1.30 $1.20 Total Cost for Workstation Cables $2340 $2160(150 ft. per Drop)

4 Port INTERCEPTOR Unit $19,000 X

4 Port INTERCEPTOR+Plus Unit X $27,000

May Require Future Purchases or RTUs X $30,000

INTERCEPTOR Equipment Cost $21,340 $59,160

Total Installed cost for 12 Workstations $1,800/drop $2,400/drop today (without RTUs)

Total Installed cost for 12 Workstations when RTUs are required: $4,900/drop

Table 5: Deployment cost analysis example

INTERCEPTOR Alarmed Carrier PDS Components/Options

As evidenced by the table above, even after adding the extra fibers to the workstation cables, dedicating fibers for the INTERCEPTOR system remains the cheapest solution and negates the need for the future potential purchase of RTUs for the workstation enclosures. As long as it is certain that two fibers will always be dedicated to INTERCEPTOR monitoring, standard INTERCEPTOR units can be deployed. However, if there is any uncertainty or concern that those fibers may be needed in the future, then investing in an INTERCEPTOR+Plus unit future­proofs your network and negates the need to buy a new INTERCEPTOR+Plus unit to replace your originally purchased unit. Therefore, if all of the fibers in the drop cable feeding a workstation need to be activated an RTU can be installed at that time eliminating the need to replace the INTERCEPTOR with a new INTERCEPTOR+Plus.

Chapter 6 | Network Architectures–Indoor Architecture ISP­1: Dedicated Home­Run

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 59

INTERCEPTOR Alarmed Carrier PDS Components/Options

If there are dark fibers in the workstation drop cable, a fiber loopback can be installed behind the faceplate at the work­station. By doing so the SIPRNet/JWICS fibers terminate into the faceplate, but the alarmed fibers are looped behind the faceplate, thus making the INTERCEPTOR system completely transparent to the end users. By also leveraging the CTTA approval to use interlocking armored cable as part of an INTERCEPTOR system, the dedi­cated workstation drops can be run above the ceiling or below a raised floor. The armored cables can be deployed from the telecommunications closet by using j­hooks or wire basket for cable management and support.

Since the workstations are located in an LCA, the INTERCEPTOR alarmed PDS cables must be terminated into a hardened enclosure that meets NSTISSI 7003 requirements; therefore, a GSA approved padlock must secure the enclosure.

In order to streamline installation, you can make use of a pre­fabricated hardened workstation enclosure with a one­inch conduit chimney as depicted in the diagram below. This makes routing the armored cables from the ceiling or floor to the hardened workstation enclosure less difficult and drastically reduces the complexity of trying to fish the cables through walls or other obstacles, as well as adds to the aesthetics of the workstation.

Figure 15: Dedicated workstation drop from ceiling using armored cable

Chapter 6 | Network Architectures–Indoor Architecture ISP­1: Dedicated Home­Run

Photo of Lock Box with Splice Closure (inside?)

Photo of Lock Box with Splice Closure (inside?)

False/Drop Ceiling

Armored Cable Alarmed by INTERCEPTOR Chimney to

Lock Box

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 60

Figure 16: Dedicated workstation drop from floor using armored cable

Chapter 6 | Network Architectures–Indoor Architecture ISP­1: Dedicated Home­Run

Photo of Lock Box with Splice Closure (inside?)

Raised Floor

Armored Cable Alarmed by INTERCEPTOR

Lori to add cables showing in wire baskets:Optional Deployment shwing cable tray conveyance when armored cable is used outside of conduit....

Chimney to Lock Box

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 61

Figure 17: Dedicated home­run architecture design example

Scalability of INTERCEPTOR Equipment

In this architecture, one INTERCEPTOR port is used to protect one workstation cable. Thus, as new workstation re­quirements emerge, an equal number of INTERCEPTOR ports will need to be added to protect those new cables. (A 4­port INTERCEPTOR unit will protect 4 workstation drops).

If INTERCEPTOR+Plus units were initially deployed, and you currently need to light up all of the fibers in your worksta­tion cables, you can purchase RTUs on a workstation­by­workstation basis to eliminate the need to pull in higher fiber­count cables.

Chapter 6 | Network Architectures–Indoor Architecture ISP­1: Dedicated Home­Run

Office 2Office 1

Hallway

Dedicated Cable Run

Limited Access Area

SIPRNetTelecom Room

NIPRNet Telecom Room

Lock Box

INTERCEPTOR

ControlledAccess Area

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 62

This architecture is used to provide multiple workstations or cubicles located in close proximity to one another in an LCA with secure network connectivity via a single SIPRNet/JWIC access point secured in a hardened enclosure. At the beginning of each day, the hardened enclosure must be unlocked and opened in order for the multiple workstation patch cables to be plugged into the SIPRNet/JWICS access point. At the end of the day, the workstation cables must be un­plugged, and the access point re­secured.

Figure 18: Multiple user access point architecture

Primary Applications

As office space increasingly becomes a premium, the use of cubicles and other high­density workstations increases across both civilian and military agencies. Due to the impact of network­centric operations, many workstations and cubicles now require access to SIPRNet, JWICS, and other classified networks. Rather than deploying a hardened work­station enclosure to each cubicle, many agencies and departments provide one access point for multiple workstations or cubicles to unlock, open, and plug into on a daily basis. This approach significantly reduces the cost and complexity of deployment by minimizing the (1) number of classified network cables that have to be deployed, (2) the number of hardened enclosures, and (3) the number of INTERCEPTOR ports required.

This architecture is commonly used in SIPRNet Cafés, especially in DOD Reserve Centers and National Guard units. SIPRNet Cafés provide multiple users the ability to plug into a single access point with individual laptops.

Chapter 6 | Network Architectures–Indoor Architecture ISP­2: Multiple User Access Point

Lock Box

LCA

CAA

CubiclesHallway

Telecom Room

Equipment Rack

Alarmed Fiber Optic Cable

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 63

Two other applications for this architecture are conference rooms and contingency or back­up command and control areas. Since accessing classified networks is only required periodically, the Multiple User Access Point provides a very streamlined and easy­to­secure solution that does not require any periodic visual inspection thanks to the INTERCEPTOR Alarmed PDS system.

The advantages of utilizing this architecture rather than the Dedicated Home­Run architecture include the fact that mul­tiple cubicles or workstations can be serviced out of a single access point, and also that a single, high­fiber count cable is installed in the place of several individual workstation cables. Further, the entire trunk cable feeding the multiple user access point is protected by a single INTERCEPTOR port. This significantly reduces the initial deployment cost and com­plexity, and it also enables the use of pre­terminated cables for the consolidation point trunk cable and standard patch cords or optical assemblies for the workstation assemblies.

Figure 19: Multiple user access point design example

Chapter 6 | Network Architectures–Indoor Architecture ISP­2: Multiple User Access Point

Office 2Workcenter 1

Hallway

CAA LCA

SIPRNetTelecom Room

NIPRNet Telecom Room

INTERCEPTOR

Telecom Enclosure

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 64

Figure 20: Alarm circuit ends at the distribution box

Design Considerations

In the Multiple User Access Point architecture, the single most critical design element is properly sizing the optical trunk cable that connects the access point to the SIPRNet/JWICS equipment in the closet. The following procedure assists with that undertaking.

The first component of sizing the optical trunk cable is determining the fiber count. This is a three­step process. Step one is to determine the number of data fibers required for each workstation and multiply by 1.5 to calculate the fiber count of the workstation cable assemblies, and to provide 50% spare fibers for future scalability of the workstation cables. The second step is to multiply this number by the number of workstations, which calculates the number of fibers required to meet today’s workstation or cubicle connectivity requirements. Finally, multiply the fiber count from step two by be­tween 1.25 to 1.5 based on anticipated growth in the case of secure workstations; the higher the growth expectation, the higher the number that should be used as the multiplier. This step calculates the number of fibers needed in the optical trunk cable.

For example, suppose that twelve workstations will utilize the Multiple User Access Point architecture in a back­up com­mand post during exercises and deployments. Each workstation requires 4F for SIPRNet and COALITION networks. Us­ing the steps above, the calculation is as follows:

1. 4 fibers x 1.5 = 6 fibers for the workstation cables; 2. 6 fibers x 12 workstations = 72 fibers required in the trunk cable for current workstation connectivity; 3. 72 fibers x 1.5 = 108 fibers required in the trunk cable for current and future requirements.

The second component of sizing the optical trunk cable is to size the hardened enclosure accurately in order to accom­modate the total number of connections using the trunk cable’s fiber count; i.e., the number of fibers calculated in step three above. If you are unable to find an enclosure large enough, then you simply have to divide the access point into smaller increments.

Chapter 6 | Network Architectures–Indoor Architecture ISP­2: Multiple User Access Point

Lock Box Workstation Cables

Alarmed Not Alarmed

Passive Interconnect

Trunk CableTelecom Enclosure

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 65

This architecture is ideal for using armored pre­terminated cables for the trunk cable and patchcords for the workstation assemblies. This is highly cost­effective in terms of minimizing installation charges, and enabling rapid deployment of the network by eliminating ALL of the field terminations.

Photo 2: Pre­terminated flexible Interlocking armored optical cables: Photo courtesy of Tyco Electronics

INTERCEPTOR Alarmed Carrier PDS Components/Options

It is strongly recommended that an INTERCEPTOR+Plus unit be used for any Multiple User Access Point deployments in order to maximize the network’s future scalability and flexibility in servicing new cubicle or workstation connectivity requirements. As long as there are sufficient dark fibers initially, the two fibers dedicated to the INTERCEPTOR system can be looped in the back of the access point. However, if these fibers each need to be lit up at any point in the future, then a micro RTU can be purchased at that time for the specific enclosures that need them.

In most cases, the multiple user access point is located in an LCA, thus requiring the enclosure to be hardened and meet security requirements specified in NSTISSI 7003.

By leveraging the CTTA approval to use the interlocking armored cable, the SCIF trunk cables can be run above the ceiling or below a raised floor out to each SCIF or CAA. The armored cables can be deployed using j­hooks or wire baskets for cable management and support. Otherwise dielectric fiber optic cables will still need to be installed in metallic conduit.

Chapter 6 | Network Architectures–Indoor Architecture ISP­2: Multiple User Access Point

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 66

This architecture is used to provide one or more SCIFs with secure network connectivity via a high­fiber count cable. Once inside of the SCIF, one or more workstations could be serviced using a simple PDS, such as a Panduit surface­mount, plastic raceway; exposed cabling, among others.

This architecture can also be used to link two or more SCIFs or CAAs together. With the growth of datacenters and storage area networking, this architecture provides a very scalable, high­speed solution for 10­gigabit and beyond, without requiring inline network encryptors that could limit bandwidth.

Figure 21: SCIF trunk architecture

Chapter 6 | Network Architectures–Indoor Architecture ISP­3: SCIF Trunk

Hardened Enclosure

Cables into standard faceplates at individual cubicles

Cubicles in SCIF

Office 1

Office 2

Hallway

SIPRNet Telecom Room

Equipment Rack

Hardened Conduit

Fiber Optic Cable

LCA

CAA

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 67

Primary Applications

For many facilities, the SIPRNet/JWICS network equipment is not located in the same SCIF or CAA as the offices or workstations requiring access. In other facilities, multiple, disparate SCIFs or CAAs have been accredited over the last few years, each requiring its own SIPRNet/JWICS connectivity. In both of these scenarios, the SCIF Trunk architecture provides a very flexible and scalable solution for SCIF connectivity.

Many new military construction or BRAC projects are leveraging this architecture due to both the require­ment for multiple SCIFs in each building and also the extensive use of raised flooring in the facilities, which distributes the network cables in wire baskets underneath the floor.

Figure 22: Multiple SCIF trunk architecture

Chapter 6 | Network Architectures–Indoor Architecture ISP­3: SCIF Trunk

SCIF #2

Office 1

Office 2

Hallway

SCIF #1

Hardened Enclosure

Cables into standard faceplates at individual cubicles

SIPRNet Telecom Room

Equipment Rack

Hardened Conduit

Alarmed Fiber Optic Cable

Hardened Enclosure

Cables into standard faceplates at individual cubicles

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 68

Design Considerations

When designing a network using this architecture, there are only two primary design considerations: (1) ensuring that the SIPRNet/JWICS network equipment is protected, and (2) determining the fiber count of the SCIF trunk cables. The alarmed SCIF trunk cables will terminate inside of the SCIFs or CAAs.

Consideration 1: Ensuring the SIPRNET/JWICS Network Equipment is Protected

For facilities with one or more SCIFs or CAAs, the SIPRNet/JWICS network equipment is often located in either one one of the primary SCIFs or inside an independent red/black equipment room that is not attached to any SCIF. In both of these circumstances, the SIPRNet/JWICS network equipment can be installed without any additional protec tion. However, in some other facilities where SCIFs are only now being accredited, the SIPRNet/JWICS equipment may be installed inside of an IPS container near or inside of the LAN equipmentr or telecommunications closet.

Consideration 2: Determining the Fiber Count of the SCIF Trunk Cables

In addition to the number of fibers required for SIPRNet/JWICS workstation connectivity and future growth, two dark fibers in each SCIF trunk cable should be allocated and dedicated to INTERCEPTOR Alarmed PDS monitoring. This can be accomplished by adding two additional fibers to the total number of fibers required for initial workstation connectivity as well as future growth. This can usually be between two and twelve fibers per workstation depending on the number of networks and ports required for each workstation or office. By dedicating two fibers, you can make use of a basic INTERCEPTOR unit and loop the fibers inside of the SCIF zone box or enclosure.

By leveraging the CTTA approval to use the interlocking armored cable, the SCIF trunk cables can be run above the ceiling or below a raised floor out to each SCIF or CAA. The armored cables can be deployed using j­hooks or wire baskets for cable management and support underneath the floor.

WARNING: If the potential exists in the future to activate the dark fibers originally dedicated to the INTERCEPTOR for monitoring, then it is recommended that an INTERCEPTOR+Plus unit be installed. RTUs can be added at the time the dark fibers are activiated.

Chapter 6 | Network Architectures–Indoor Architecture ISP­3: SCIF Trunk

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 69

Fiber Count Calculation Example

A facility recently had two new SCIFs (SCIF B and SCIF C, e.g.) accredited and wants to provide SECRET connectivity to both of these from the SIPRNET switch located in the facility’s original SCIF (e.g., SCIF A). Each of the two new SCIFs have different workstation connectivity requirements, and the facility intends on having fifty percent growth over the current requirement.

SCIF B Trunk Cable SCIF C Trunk Cable

SIPRNET Ports Required per Workstation 6 ports (total: 12F) 2 ports (total: 4F)

Number of SCIF Workstations x10 (total: 120F) x15 (total: 60F)Requiring SIPRNET Access 50% Fiber Spares for Future Workstations x60F (total: 180F) x30F (total: 90F)Plus Growth

Dedicated Fibers for INTERCEPTOR xMinimum 2F (Total: 182F) xMinimum 2F (Total: 92F)

Round­up SCIF Trunk Cable Fiber Count 182F to 216F Cable needed 92F to 96F Cable neededto Standard Cable Size

Total Number of Fiber 432 Connectors 192 ConnectorsTerminations Required

Table 6:Fiber Count Calculations

Pre­terminated cables are an optimal choice for this SCIF Trunk Cable architecture. These cables are cut to length and pre­terminated in the factory with a variety of connector types (e.g., SC, ST, LC, MTP, Keyed LC, among others). Rather than trunk cables taking two or three days to terminate, pre­terminated cables can be easily installed and plugged into panels or modules in less than a day. For buildings with accredited SCIFs, the use of pre­terminated cables minimizes the disruption to on­going operations, and it eliminates the need to dedicate personnel to escorting the installers. Often, pre­terminated cables can be pulled in by contractors, but plugged into panels or modules by government personnel.

Chapter 6 | Network Architectures–Indoor Architecture ISP­3: SCIF Trunk

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 70

Figure 23: SCIF trunk network design example

Chapter 6 | Network Architectures–Indoor Architecture ISP­3: SCIF Trunk

Office 2Office 1 Workcenter 1

Hallway

Telecom Room

Office 2Office 1

Hallway

Workcenter 1

Telecom Room

Limited Access Area

Alarmed PDS

Controlled Access AreaControlled Access Area

ZONE Box

INTERCEPTOR

INTERCEPTOR Zone

Zone

Not Alarmed SCIF

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 71

INTERCEPTOR Alarmed Carrier PDS Components/Options

If you are positive that two fibers will always be dedicated to INTERCEPTOR monitoring, you are able to deploy basic INTERCEPTOR units, simply loop back the dedicated fibers in the zone box installed in the SCIF (see top diagram in Figure 26). However, if there is uncertainty or concern that those fibers may be needed in the future, then making an initial investment in an INTERCEPTOR+Plus unit “future­proofs” your network and negates the need to buy a new INTERCEPTOR+Plus unit to replace your basic unit. Thus, if one or two SCIF trunk cables exhaust all of their fibers, you only need to buy an RTU at that point in time rather than having to swap out the entire INTERCEPTOR unit (see figure 26 for example).

Figure 24: Dark fiber vs. active fiber deployment

Chapter 6 | Network Architectures–Indoor Architecture #ISP­3: SCIF Trunk

4 fiber cable, 2 fibers dedicated to INTERCEPTOR

How to scale the network if you need to light up all fibers in the SCIF Trunk Cable

4 fiber cable, all fibers dedicated to INTERCEPTOR

Telecom RoomControlled Access Area

Two fibers carry data

4 Fiber Cable

Zone Box

Zone Box

Dark Fibers dedicated to Alarm

Switch

PatchPanel

PatchPanel

INTERCEPTOR+Plus

INTERCEPTOR™ +PLUS

HallwayLimited Control Area

SCIFControlled Access Area

RTU: Loops Alarm Signal while allowing data to pass through untouched

Telecom RoomControlled Access Area

Four fibers carry data

4 Fiber Cable

Switch

INTERCEPTOR+Plus

INTERCEPTOR™ +PLUS

LCALimited Control Area

SCIFControlled Access Area

the network ibers in the SCI

Data

Fiber Optic Loopback

RTU

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 72

As long as there are dark fibers in the workstation drop cable, you can install a fiber loopack behind the bulkhead in the SCIF zone box or enclosure. This way, the SIPRNet/JWICS fibers terminate into the bulkhead, but the alarmed fibers are looped beind it, thus preventing any potential alarms caused by end users moving their patch cables around.

Figure 25: Examples of typical zone boxes and enclosures

WARNING: Depending on the existing physical security and/or compensating measures, the DAA may require a hardened enclosure to be installed and may alter the use of a commercial zone box instead.

Scalability of INTERCEPTOR Equipment

In this architecture, one INTERCEPTOR port is used to protect all of the fibers in the SCIF trunk cable. Therefore, new INTERCEPTOR ports will only be required if new cables need to be installed to existing SCIFs, such as when adding CO­ALITION or other network, or if new SCIFs are constructed.

If INTERCEPTOR+Plus units were initially deployed, and currently there is a need to light up all of the fibers in the SCIF trunk cables, you can purchase RTUs on a case­by­case basis if your SCIF trunk cables exhaust all of their dark fibers (as shown in Figure 26).

Chapter 6 | Network Architectures–Indoor Architecture #ISP­3: SCIF Trunk

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 73

This architecture is used to provide a group of offices or workstations located in close proximity to one another with secure network connectivity via separate, home­run, low­fiber count cables protected by a single INTERCEPTOR port. In most cases, the workstations or offices that need SIPRNet/JWICS access are not located inside of a SCIF or CAA, so access points must be protected in a hardened enclosure secured by the GSA approved padlock.

Figure 26: Point­to­Multipoint architecture

Office 1

Office 2

Office 3

Office 4

Hallway

Lock Box

Fiber Optic Cables

Chapter 6 | Network Architectures–Indoor Architecture #ISP­4: Point­to­Multipoint

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 74

Primary Applications

With the explosion in SIPRNet and JWICS requirements, many DOD services and government agencies have begun to deploy secure networks throughout their organizations. As a result, there are several buildings that have multiple and disparate users, such as separate workstations or offices that require access to SIPRNet/JWICS.

The advantage that this architecture has over the Dedicated Home­Run architecture is that multiple offices or worksta­tions are all protected by a single INTERCEPTOR port, rather than each office or workstation requiring its own port. This can significantly reduce the initial deployment cost from several thousands of dollars per workstation to less than $1,000 per workstation.

The disadvantage of this approach is that there is no longer alarm granularity—i.e., knowing exactly which workstation cable is in alarm. However, for workstations or offices in close proximity to each another, it is highly likely that all of the network cables are using the same conveyance (conduit, wire baskets, innerduct, pathway, etc.). So if there is an alarm to any of the cables, the inspection route from the INTERCEPTOR through the building would follow exactly the same route.

WARNING: It is critical that this architecture be designed so that any INTERCEPTOR alarm circuit inspec­tion can be completed within the fifteen minutes required in NSTISSI 7003. For example, it is not recom­mended that four offices located in separate areas of a building using different conveyances to distribute cables be daisy­chained together. In that case, it would be difficult to respond to an alarm and inspect all four areas within fifteen minutes.

Figure 27: Point­to­Multipoint nework design example

Chapter 6 | Network Architectures–Indoor Architecture #ISP­4: Point­to­Multipoint

Hallway

Office 1 Office 2 Office 3 Office 4

INTERCEPTOR

CAA LCASIPRNetTelecom Room

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 75

Design Considerations

In designing a network using the Point­to­Multipoint architecture, each workstation or office is serviced by its own dedi­cated, low fiber­count fiber optic cable similar to the Dedicated Home­Run architecture. It is critical, however, to ensure that there will always be two dark fibers dedicated to the INTERCEPTOR Alarmed PDS system.

First, you need to determine the total number of fibers required for each workstation (see Architecture #I­2 Design Considerations, page 64, for step­by­step calculations). Second, you need to ensure that the offices, workstations, or conference rooms are clustered together based on their proximity to one another and whether or not the network cables are distributed along the same cable route and/or conveyance. Each cluster of offices or workstations will be protected by a single INTERCEPTOR port; thus, it is important to ensure that the entire cable route can be checked upon alarm within fifteen minutes.

Figure 28: Point­to­Multipoint nework design example

Up to six different offices or workstations can be daisy­chained to a single INTERCEPTOR port. Doing so with more than six runs the risk of exceeding your optical link loss budget.

Once you have designed all of your office or workstation clusters, you must then count the number of clusters serviced out of each closet or equipment room in order to determine how many INTERCEPTOR ports are needed. Here as else­where, it is prudent to plan for growth accordingly (e.g., increase a one­port INTERCEPTOR to a two­port INTERCEPTOR).

It is also quite helpful if all of the network cables in a given cluster are serviced out of the same connector housing or patch panel. By doing so, all the cables can be easily daisy­chained together behind the bulkhead or in a separate en­closure. Rather than plugging both dedicated alarmed PDS fibers in each workstation cable into an INTERCEPTOR, only the first fiber of the first workstation cable and the last fiber of the last workstation cable in each cluster plug into the INTERCEPTOR. The rest of the fibers are daisy­chained together using an interconnect.

Chapter 6 | Network Architectures–Indoor Architecture #ISP­4: Point­to­Multipoint

INTERCEPTOR(only one port used)

Workstation 1

Workstation 4

Workstation 2

Workstation 3

INTERCEPTOR™

T R

T R

Data Fibers

AlarmFibers

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 76

Workstation Cluster Fiber Plan Example

In one INTERCEPTOR deployment, multiple division offices are being consolidated in the operations area. Upon evaluat­ing the structured cabling plan, it is determined that four offices can easily be clustered together to be protected by a single INTERCEPTOR port. Each office needs a minimum of two fibers for SECRET level networks. Since two additional fibers are required for INTERCEPTOR, the network manager decides to use a six­fiber interlocking armored cable to each office so that the cables can be run below the raised floor. The following table shows how the fibers in each cable are daisy­chained together in order to create a single, protected optical circuit.

Optical Fibers in 6­Fiber Network Cables

SECRET Data INTERCEPTOR Alarmed PDS

1 2 3 4 5 6

Office #1 (O1) Tx Rx Sp Sp INTERCEPTOR­Tx O2­Fiber 5

Office #2 (O2) Tx Rx Sp Sp O1­Fiber 6 O3­Fiber 5

Office #3 (O3) Tx Rx Sp Sp O2­Fiber 6 O4­Fiber 5

Office #4 (O4) Tx Rx Sp Sp O3­Fiber 6 INTERCEPTOR­Rx

Note: Tx = Data Transmission, Rx = Data Reception, Sp = Spare

Table 7: Fiber Patch Plan

As you can see from the diagram and table above, daisy­chaining multiple offices or workstations together is a very effective way to reduce deployment costs and minimize the number of INTERCEPTOR ports required.

Whenever possible, it is recommended that the daisy­chaining of fibers be done behind a bulkhead or in a separate enclosure to minimize the possibility of alarms being caused by technicians moving patch cords or patching in new equipment.

Chapter 6 | Network Architectures–Indoor Architecture #ISP­4: Point­to­Multipoint

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 77

Figure 29: Point­to­Multipoint fiber daisy chaining

Chapter 6 | Network Architectures–Indoor Architecture #ISP­4: Point­to­Multipoint

Patch Panels / BulkheadPatch Panels / Bulkhead

Daisy-Chaining of multiple fibers

Telecom RoomControlled Access Area

6 Fiber Cable to Office 1

6 Fiber Cable to Office 2

6 Fiber Cable to Office 3

Switch

INTERCEPTOR+Plus

INTERCEPTOR™ +PLUS

LCALimited Control Area

Loopback

Loopback

SCIFControlled Access Area

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 78

INTERCEPTOR Alarmed Carriers PDS Components/Options

Whenever optical cables are daisy­chained together to make use of a single INTERCEPTOR port, those fibers must be dark and 100% dedicated to the INTERCEPTOR system. In most cases, a basic INTERCPETOR unit can be used. How­ever, if other architectures are going to be supported out of the same INTERCEPTOR, then an INTERCEPTOR+Plus unit may be used.

WARNING: Information security guidance specifically prohibits the transmission of classified national security information to anyone other than the intended recipient. Therefore, Micro RTUs may not be used in this architecture.

Since dark fibers in the workstation cables are being daisy­channed, you must install a fiber loopback behind both the faceplate in the workstation enclosure and also the bulkhead in the connector housing for those fibers not connecting to the INTERCEPTOR (see the fiber map exercise above). This way, the SIPRNet/JWICS data fibers terminate into the bulkhead, but the alarmed fibers are looped behind it, thus preventing any potential alarms caused by end users moving their patch cables around.

Depending on the security classification of the offices, either a hardened enclosure (for LCAs) or a standard faceplate (for CAAs) must be installed in the offices.

Scalability of INTERCEPTOR Equipment

In this architecture, one INTERCEPTOR port is used to protect multiple workstation cables. So, if new requirements emerge for additional workstations or offices, either add the new workstation or office to an existing cluster by daisy­chaining the fibers in the cable into the existing fiber map, or start a new cluster, which would require an additional INTERCEPTOR port. Consider the design criteria for clustering workstations and offices.

If at some point in time you need more fibers per workstation, you cannot use a micro RTU in this architecture. A larger fiber count cable will have to be installed for those workstations where fiber exhaust is an issue in order to maintain the dedicated fibers for the INTERCEPTOR system.

Chapter 6 | Network Architectures–Indoor Architecture #ISP­4: Point­to­Multipoint

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 79

This architecture is used to provide one or more clusters of offices or workstations located in close proximity to each another with secure network connectivity via a single high­fiber count trunk cable. As in the Point­to­Multipoint architec­ture, each individual cluster is protected by a single INTERCEPTOR port. The consolidation point serves as a permanent interconnect between the high­fiber count trunk cable and the disparate, low­fiber count workstation cables in this ar­chitecture. The INTERCEPTOR protects the entire network link from the closet to each individual workstation.

For offices or workstations in close proximity to the SIPRNet/JWICS equipment room, the Point­to­Mul­tipoint architecture may be a more cost efficient option.

In most cases, neither the consolidation point nor the workstations or offices that need SIPRNet/JWICS access are located inside of a SCIF or CAA. If so, hardened enclosures secured with the GSA approved high­security padlock (as mentioned previously) must be used.

Figure 30: Consolidation point architecture

Chapter 6 | Network Architectures–Indoor Architecture #ISP­5: Consolidation Point

LCA

CAA

Office 1

Office 2

Office 3

Hallway

Lock Box

ConsolidationPointEnclosure

Fiber Optic Cables

SIPRNet Telecom Room

Equipment Rack

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 80

Primary Applications

With the explosion in SIPRNet and JWICS requirements, many DOD services and government agencies have begun to deploy secure networks throughout their organizations’ facilities. As a result, there are several buildings that have mul­tiple, disparate users (e.g., separate workstations or offices) that require access to SIPRNet/JWICS networks. For those offices that are not located near the servicing telecommunications closet or equipment room, the Consolidation Point architecture minimizes the total linear footage of fiber optic cables that INTERCEPTOR must monitor by relocating the daisy­chaining of the workstation cables from the telecommunications closet to the Consolidation Point(s) located much closer to the workstation/offices.

Figure 31: Comparison of point­to­multipoint (I­4) and consolidation point (I­5) architectures

The advantages of the Consolidation Point architecture over the Point­to­Multipoint architecture are that multiple clus­ters of offices or workstations can be serviced out of a single Consolidation Point. The advantage, as illustrated in the example above, is that more than half of the network is comprised of a single, high fiber count cable that is intercon­nected to several individual workstation cables in the Consolidation Point. All of the offices or workstations in a cluster are still protected by a single INTERCEPTOR port, but this architecture reduces the linear footage of cable that needs to be installed by up to 60%. This drastically reduces the initial deployment cost and complexity and at the same time enables the use of pre­terminated cables for the Consolidation Point trunk cable and standard patch cords or optical as­semblies for the workstation assemblies.

The Consolidation Point architecture is ideal for supporting cubicle furniture located in the same room, or multiple offices located along the same hallway.

Chapter 6 | Network Architectures–Indoor Architecture #ISP­5: Consolidation Point

Patch Panel Patch PanelPatch Panel

Telecom Room

Total Linear Feetof Cable: 1500

Total Linear Feetof Cable: 800Patch Panel

Telecom Room

Consolidation Point

INTERCEPTOR INTERCEPTOR

CAA LCA

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 81

Figure 32: Consolidation poing architecture ­ under floor

Design Considerations

In the Consolidation Point architecture, each workstation or office is serviced by its own dedicated, low fiber count cable similar to that of the Point­to­Multipoint architecture; however, instead of the workstation cables terminating in the telecommunications closet or equipment room, they terminate in the Consolidation Point which is located in close proximity to the workstations or offices. Rather than daisy­chaining the workstation cables in the equipment room, it is done in the Consolidation Point, where the workstation cables are interconnected to the high­fiber count trunk cable. Therefore, it is critical to ensure that there will always be two dark fibers dedicated to the INTERCEPTOR system in both the workstation cables as well as the Consolidation Point trunk cable.

The first step is to determine the total number of fibers required for each workstation (i.e., SIPRNet/JWICS requirement plus future growth plus two INTERCEPTOR fibers; see the detailed explanation in the SCIF Trunk architecture discus­sion above). The second step is locating the consolidation point in close proximity to the cluster or clusters of offices or workstations. Since one consolidation point can serve multiple clusters of offices or workstations, it may be necessary to place the consolidation point at the same distance from each of the clusters. The final step is to calculate the fiber count for the consolidation point trunk cable (i.e., the sum of the fiber count from all of the workstation cables plus 50% future growth plus two INTERCEPTOR fibers for each cluster).

Chapter 6 | Network Architectures–Indoor Architecture #ISP­5: Consolidation Point

Office 1Office 2

Office 3Office 4

Hallway

Lock BoxFiber Optic Cable

Telecom Room

Equipment Rack

ConsolidationPoint

5 10 15 ... 100 110 120 130 140 150 160...

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 82

Figure 33: Fiber Daisy­Chaining Through Consolidation Point

Workstation Cluster Fiber Plan Example

In an existing intelligence facility, twenty­four workstation cubicles are being installed on a newly renovated floor. Cu­bicles are being deployed in sets of six, so a total of four clusters are created, with each servicing six workstations. Each cubicle needs a minimum of eight fibers for TS level networks. Since two additional fibers are required for an INTERCEPTOR, the network manager decides to use a twelve fiber interlocking armored cable to each cubicle so that the cables can be run from the consolidation point in the center of the room, under the raised floor, and up inside of the cubicle furniture. The consolidation point is serviced by a high fiber count, interlocking armor cable. The table below shows how to calcu­late the fiber requirements for the Consolidation Point architecture:

Number of workstations per cluster 6 Total number of clusters per consolidation point 4 Workstation cable fiber count 12 Total fibers per cluster 72 Total fibers serviced by the consolidation point 288 Recommended spare fiber count for trunk cables (50%) 144 Maximum fiber count for interlocking aarmor cable 144 Number of consolidation point trunk cables required 3 (all with 144 fibers) Number of INTERCEPTOR ports required 4 (1 per cluster) Number of fibers dedicated to INTERCEPTOR 8

Table 8: Workstation cluster fiber plan

By incorporating between twenty­five and fifty percent spare fibers for future growth, any new work­stations or offices that are near a Consolidation Point can easily be provisioned with SIPRNet or JWICS connectivity by either integrating these new offices or workstations into existing clusters or servicing them using a dedicated, home­run cable from the consolidation point, which would also require an extra INTERCEPTOR port.

Chapter 6 | Network Architectures–Indoor Architecture #ISP­5: Consolidation Point

Fiber Optic Loopback

Telecom Room

2 Fibers toINTERCEPTOR

144 Fiber Cable

Consolidation Point

72 Fibers

72 Fibers

SCIF 1

SCIF 2

INTERCEPTOR™

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 83

Multiple consolidation point trunk cables may be required depending on the number of fibers serviced out of the consolidation point and the maximum fiber count in which the interlocking armored cable is available, either 72 or 144 fibers (depends on manufacturers of armored cable).

WARNING: It may be necessary to split or reduce the number of workstations or offices or clusters ser­viced out of a single consolidation point due to the physical dimensions that may be required to provide the interconnection of the trunk and workstation cables. Up to 288 fibers can be interconnected in a single 4RU or wall­mount housing using LC connectors. Consolidation point sizing should be done based on the total number of fibers in the trunk cables—rather than the workstation cables—in order to ensure that there is enough scalability of the consolidation point to meet future requirements.

Just as in the Point­to­Multipoint architecture, the fibers in each cluster’s workstation cables are concatenated together and then connected to the two dedicated fibers in the consolidation point trunk cable that provide the incoming and out­going alarmed PDS signal from a single INTERCEPTOR port (see the diagram below). Thus, you need one INTERCEPTOR port and two dedicated fibers in the trunk cable for each cluster.

Figure 34: Consolidation Point Servicing 4 Daisy­Chained Clusters

Chapter 6 | Network Architectures–Indoor Architecture #ISP­5: Consolidation Point

SCIF 4

SCIF 1

Fiber Optic Loopback

Consolidation Point

SCIF 2

SCIF 3High Fiber Count Trunk Cable

Telecom Room

Out to SCIF 1

INTERCEPTOR™

TelecomRoom

INTERCEPTO

In from SCIF 4

2 Fibers toINTERCEPTOR

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 84

Chapter 6 | Network Architectures–Indoor Architecture #ISP­5: Consolidation Point

One of the primary benefits of the Consolidation Point architecture is a significant reduction in the total linear footage of cables required for the network. The table below shows the Consolidation Point architecture compared to the Point­to­Multipoint architecture using the parameters from the example shown on the previous page, and assuming both that the average distance from the cubicles to the telecom closet is approximately 250 feet, and that the distance from the consolidation point to each cubicle is approximately fifty feet.

Consolidation Point Point­to­Multipoint

Architecture (Page 79) Architecture (Page 73)

Number of Trunk Cables 3 0

Total Footage of Trunk Cable 600 (3 x 200 ft. each) 0

Number of Workstation Cables 24 24

Total Footage of Workstation Cables 1,200 (24 x 50 ft. each) 6,000 (24 x 250 ft. each)

Total Linear Footage of Cable to Install 1,800 ft. 6,000 ft.

Table 9: Consolidation Point vs. Point­to­Multipoint

Whenever possible, it is recommended that the daisy­chaining of fibers be done behind the bulkhead of a patch panel in order to minimize the possibility of alarms being caused by technicians moving patch cords or patching in new equipment.

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 85

INTERCEPTOR Alarmed Carrier PDS Components/Options

Even though workstation or offices are being initially clustered together out of a consolidation point, it is strongly recom­mended that an INTERCEPTOR+Plus unit be used for any Consolidation Point architecture so as to maximize the future scalability and flexibility of servicing new offices or cubicles directly out of existing consolidation points.

WARNING: Information security guidance specifically prohibits the transmission of classified national security information to anyone other than the intended recipient. Micro RTUs thus may not be used in this architecture.

Since the dark fibers in the workstation cables are being daisy­chained, you must install a fiber loopback behind the faceplate in the workstation enclosure as well as behind the bulkhead in the consolidation point for those fibers not con­necting to incoming or outgoing INTERCEPTOR fibers in the trunk cable or cables. By doing so, the SIPRNet/JWICS data fibers terminate into the bulkhead of the consolidation point, but the alarmed fibers are looped behind it, which prevents any potential alarms caused by end users moving patch cables around or the addition of a new workstation or office.

Assuming that the cubicles or offices are not located inside of a SCIF or LCA, a hardened enclosure would be required in the offices.

Scalability of INTERCEPTOR Equipment

In this architecture, one INTERCEPTOR port is used to protect multiple workstation cables. Therefore, if new require­ments emerge for additional workstations or offices, you can either attempt to add the new workstation or office to an existing cluster by daisy­chaining the fibers in the cable into the existing fiber map, or install a dedicated workstation cable for the new workstation or office which would also require an additional, dedicated INTERCEPTOR port.

WARNING: If more fibers are ever needed per workstation, you cannot use a Micro RTU in this architec­ture. A larger fiber count cable will have to be installed for those workstations where fiber exhaust is an issue in order to maintain the dedicated fibers for the INTERCEPTOR.

Chapter 6 | Network Architectures–Indoor Architecture #ISP­5: Consolidation Point

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 86

Indoor Architecture #I­6: Hybrid

This architecture leverages both hardened carrier and alarmed carrier PDS technology to deliver SIPRNet/JWICS connectivity to a set of workstations, cubicles, or offices. From the SIPRNet/JWICS network equipment, an INTERCEPTOR Alarmed PDS would protect the network out to a consolidation point, but rather than the workstation cables being alarmed, they are instead protected inside of a hardened carrier.

Figure 35: Hybrid Architecture

Chapter 6 | Network Architectures–Indoor Architecture #ISP­6: Hybrid

Hallway

ConsolidationPoint

Hardened Enclosure

Alarmed Fiber Optic Cables

Telecom Room

Equipment Rack

Lock Box

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 87

Primary Applications

In situations where a hardened PDS is already in place or is the desired approach for delivering SIPRNet/JWICS to the workstations or offices, the use an alarmed carrier PDS solution can still significantly reduce the cost and complexity of deployment, especially for work centers not in close proximity to the SIPRNet/JWICS network equipment. Rather than deploying all of the PDS system as a hardened carrier, an INTERCPETOR Alarmed PDS system can be used along with a high­fiber count trunk cable to establish a consolidation point that is located very close to the equipment room, workstation or office. Doing so significantly reduces the amount of EMT or engineered raceway needed to be custom engineered to the building, ordered, shipped, staged, and installed. It also signicantly reduces the burden of performing periodic visual inspections for the owning organization, since the majority of the network is protected by the INTERCEPTOR Alarmed PDS.

This architecture can also be used in SIPRNet Cafés, most notably in DOD reserve centers and National Guard units. Rather than having just a single access point for multiple users to plug into, the Hybrid architecture provides multiple access points using a hardened carrier PDS system to distribute the SIPRNet/JWICS network from a consolidation point located inside of the SIPRNet Café to multiple workstations.

Figure 36: Hybrid architecture network design

This architecture works well in support of small workgroup switches deployed in an active zone architec­ture close to the workstation or offices requiring SIPRNet access. The switches are typically fed by fiber optic cables from the telecommunications closet but provide copper connectivity to each workstation.

Chapter 6 | Network Architectures–Indoor Architecture #ISP­6: Hybrid

Office 1

Hardened PDS

Alarmed Cable Consolidation Point

Office 2

Office 3

Office 4

Office 5

SIPRNetTelecom Room

SIPRNetTelecomRoom

INTERCEPTOR

User 1 User 1

User 1

User 1

User 1

CAA LCA

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 88

Design Considerations

In the Hybrid architecture, the first design element to consider is the proper sizing of the optical trunk cable that con­nects the consolidation point to the SIPRNet/JWICS equipment in the closet. The process defined above in #I­2: Multiple User Access Point, can be used to determine the fiber count required.

By leveraging the CTTA approval to use the interlocking armored cable with the INTERCEPTOR system, the trunk cables can be run above the ceiling or below a raised floor out to the consolidation point. The armored cables can be deployed using j­hooks or wire baskets for cable management and support.

Inside the consolidation point, the high­fiber count trunk cable is interconnected to the individual workstation cables. The enclosure must be sized according to the maximum number of fiber connections that the trunk cable can support. Because the INTERCEPTOR system ends and the hardened carrier system begins at the consolidation point, the enclo­sure must be located below the ceiling using the criteria for a hardened carrier PDS system specified in NSTISSI 7003.

From the consolidation point to the workstations, a hardened carrier PDS system is used to protect the network drops. The network terminates in a hardened workstation enclosure that must be secure with the GSA approved padlock.

INTERCEPTOR Alarmed Carriers PDS Components/Options

Either an INTERCEPTOR or an INTERCEPTOR+Plus unit can be used for Hybrid deployments. As long as there are suf­ficient dark fibers included in the trunk cable and two fibers can be dedicated to the INTERCEPTOR system, a standard INTERCEPTOR unit may be used and the alarmed fibers can be looped in the consolidation point. However, if there is any concern that the fibers may eventually need to be activated, then an INTERCEPTOR+Plus unit should be installed so that a micro RTU can be purchased if needed.

In almost all cases, a hybrid consolidation point is located in an LCA, thus requiring the enclosure to be hardened and meet the security requirements specified in NSTISSI 7003.

Scalability of INTERCEPTOR Equipment

In this architecture, one INTERCEPTOR port is used to protect the trunk cable out to the hybrid consolidation point. Therefore, if new requirements emerge for additional work centers or areas of the building, a new hybrid consolidation point can be created, connected to a new trunk cable, and protected with an open or additional INTERCEPTOR port.

Chapter 6 | Network Architectures–Indoor Architecture #ISP­6: Hybrid

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 89

The Contingency/Temporary Facility architecture combines the “SCIF­in­a­box” approach of an IPS container with the flexibility of an INTERCEPTOR system, using armored cables, to provide SIPRNet/JWICS connectivity to contingency or temporary complexes comprised of trailers, modular facilities, or tents, for example.

Figure 37: Contingency/temporary facility architecture

WARNING: The Contingency/Temporary Facility architecture provides a flexible and easily deployed solu­tion. It is imperative, however, that the armored cables used to distribute the SIPRNet/JWICS network are adequately secured along the entire cable route. In contingency deployments, tactical cables are sometimes deployed on top of the ground and prone to accidental abuse by personnel or vehicles. This is not a good environment for an INTERCEPTOR system; the cables must first be installed in a duct bank or conveyance.

Primary ApplicationsAn ideal application for this architecture is the situation in which facility construction or modernization projects force government agencies or military units to reorganize and persevere. During these activities, a temporary facility is of­ten established using several trailers or other modular facilities to provide a “swing space,” or temporary work area for personnel to utilize while waiting for the construction or reorganization to be completed. Because of the nature of the temporary buildings that are used, it can be extremely challenging to satisfy all of the security requirements in order to cost­effectively provide SIPRNet/JWICS access to personnel working out of such facilities. This architecture can also be used for contingency deployments and facilities in which tents are employed to provide for communications or command and control of military forces, disaster recovery, or other such activities.

Chapter 6 | Network Architectures–Indoor Architecture #ISP­7: Contingency/Temporary Facility

Office 1Office 2

Hallway

Telecom Room

IPS

Hardened Enclosure

Fiber Optic Cable

Lock Box

LCA

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 90

Design Considerations

Typically, temporary facilities and complexes are rated as LCAs. SIPRNet/JWICS connectivity for the contingency or temporary facility will be provided using a network encryptor, which must be secured in an IPS located inside one of the trailers or tents. This creates the point of presence for the rest of the complex, and the INTERCEPTOR system will be used to distribute the network to all work centers, offices, and meeting rooms throughout the facility. In this context, the INTERCEPTOR would be located in the IPS along with the crypto device and the SIPRNet/JWICS network equipment.

The first design element to consider is the size and type of the IPS container required. The size of the IPS will largely depend on the amount of network equipment to be housed in the IPS. This should be fully discussed with the IPS manu­facturer to ensure that an adequately sized container is purchased. When choosing the type of IPS to buy, the most important aspect to consider is the method by which the IPS cools the equipment. IPS containers currently use either fan­cooling of closed­loop cooling systems. Since most temporary facilities have limited air conditioning capacity, and usually must contend with an already loud work environment, it is highly recommended that an IPS with closed­loop cooling be used.

WARNING: It is critical to evaluate any floor loading issues to ensure that the IPS will not damage or fall through the floor. Also, it is important to carefully consider the dimensions of the doorway to ensure the IPS can be easily installed. Otherwise, the IPS may need to be put in place during construction of the temporary facility.

The second design element to consider is the number of access points that need to be provided throughout the tempo­rary or contingency facility. Doing so will determine the number of INTERCEPTOR ports required to provide dedicated home­run (#I­1) or point­to­multipoint (#I­4) connections out to the various access points.

By leveraging CTTA approval for use of the interlocking armored cable with an INTERCEPTOR, the SIPR­Net/JWICS cables can be easily run below the floor or above the ceiling of the trailer or along the support stringers used to construct the tent facility. The armored cables can be deployed using j­hooks, ladder racks, or wire baskets for cable management and support.

At the access points, the SIPRNet/JWICS network terminates in a hardened workstation enclosure that must be secure with the GSA padlock 8077AD padlock.

Chapter 6 | Network Architectures–Indoor Architecture #ISP­7: Contingency/Temporary Facility

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 91

INTERCEPTOR Alarmed Carrier PDS Components/Options

Either an INTERCEPTOR or an INTERCEPTOR+Plus unit can be used for Contingency/Temporary Facility deployments. As long as there are sufficient dark fibers included in the access point cables and two fibers can be dedicated to the INTERCEPTOR system, a basic INTERCEPTOR unit can be used, and the alarmed fibers can be simply looped in the workstation enclosures. However, if there is any concern that the fibers may eventually need to be activated, then an INTERCEPTOR+Plus unit should be installed, and a micro RTU can be purchased if needed on a case­by­case basis.

Scalability of INTERCEPTOR Equipment

In this architecture, one INTERCEPTOR port is used to protect the armored cable out to each access point in the trailers or tents. Thus, if new requirements emerge for additional access points to be installed or new tents or modular facilities are added to the complex, then you can create a new access point with a new armored cable and protect it with an open or additional INTERCEPTOR port.

Chapter 6 | Network Architectures–Indoor Architecture #ISP­7: Contingency/Temporary Facility

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 92

The Distributed Datacenter architecture is designed to provide high­security connections between multiple, disparate datacenter zones or storage area networks in a single building or campus without requiring the interconnecting network traffic to be encrypted. Eliminating encryption maximizes bandwidth and network performance. Unlike previous archi­tectures, each set of active fibers is monitored by an INTERCEPTOR for maximum protection, which allows the network traffic on any fiber to be disrupted if an alarm is received.

Figure 38: Distributed datacenter architecture

Primary Applications

With the increasing popularity of datacenters and storage area networking, many agencies and military installations are faced with the dilemma of either having their datacenters out­grow their existing facilities, or expanding beyond the confines of their original SCIF space. Often, this results in the datacenter being spread between multiple CAAs or SCIFs in the same building. Because the datacenter is no longer totally located inside of a single SCIF, the interconnecting classified data must then be protected or encrypted since the red traffic is now traveling through a non­SCIF space, such as a hallway, break room, office, or meeting room, for example.

The challenge with protecting datacenter traffic is that bandwidth limitations can have a dramatic impact on the overall performance and scalability of the datacenter, especially if the bottleneck exists between the MDA and the switches or servers. Unfortunately, when a datacenter has to be divided between multiple rooms in a building, it typically results in a single MDA being located in one room feeding datacenter zones or equipment in other rooms. Therefore, all datacenter traffic flows between and through the MDA to the rest of the datacenter. Because of the amount of data that datacenter interconnects carry, however, it is also critical that these links receive a high level of protection.

Chapter 6 | Network Architectures–Indoor Architecture #ISP­8: Data Centers

Original Data Center Expanded/New Data Center

Controlled Access Area

Main Distribution Area

INTERCEPTOR

INTERCEPTOR™

LCA Limited Control Area(Hallway, Breakroom, etc.)

SCIFControlled Access Area

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 93

When it is not necessary to disrupt network traffic (i.e., not every fiber needs to be protected by an IN­TERCEPTOR), then the SCIF Trunk architecture can be used instead to monitor a few fibers in each of the cables linking the disparate areas of the datacenter.

Design Considerations

In this architecture, it is important to ensure that all applicable connections are adequately documented and protected. In TIA­942, several datacenter architectures leverage both primary and secondary connections for redundancy. It is critical to ensure that all connections are included in INTERCEPTOR deployment planning.

The first design element to consider is the number of fibers that must be protected by the INTERCEPTOR. The easiest way to calculate this is to include all of the fibers in the cable that connects the CAAs or SCIFs. Thus, if the connection between two datacenter rooms or floors is a 144­fiber cable, then there will be a need for seventy­two INTERCEPTOR ports.

By leveraging CTTA approval to use interlocking armored cable with the INTERCEPTOR, the SIPRNet/JWICS cables can be easily run below the floor or above the ceiling of the datacenter. The armored cables can be deployed using j­hooks, ladder racks, or wire baskets for cable management and support.

Typically in this datacenter architecture, the SIPRNet/JWICS network cabling only traverses an LCA, but each end ter­minates in a SCIF; thus, padlock­secured hardened workstation enclosures are not required.

INTERCEPTOR Alarmed Carrier PDS Components/Options

Since the Distributed Datacenter architecture provides a high level of security by protecting every lit fiber, only Interceptor+Plus units can be used. A micro­RTU will be required for each pair of fibers protected by the Interceptor+Plus in order to minimize the number of ports required.

For example, a new datacenter expansion required a twelve­fiber cable to be installed between the first floor datacen­ter and the third floor SAN equipment. Eight of the twelve fibers will be lit initially with four fibers available for future growth. A single, four­port INTERCEPTOR+Plus unit would meet the minimum requirements. The facility will also need four micro­RTUs to be deployed at the far end of the cable in the SAN area.

Scalability of INTERCEPTOR Equipment

In this architecture, one INTERCEPTOR port is used to protect a pair of fibers between disparate areas of the datacenter. Therefore, if new requirements emerge for additional fiber optic cables to be installed or for the datacenter to be ex­panded into new areas, an equivalent number of INTERCEPTOR ports would need to be added.

Chapter 6 | Network Architectures–Indoor Architecture #ISP­8: Data Centers

INTERCEPTOR™ Design Guide

© 2010 Network Integrity Systems, Inc. – All Rights Reserved – Issue DG.9.2010 94

INTERCEPTOR Alarmed Carrier PDS Components/Options

Although this Design Guide represented each possible architecture as separate and independent from the others, it is very likely that any medium to large deployment of INTERCEPTORs will require the use of multiple architectures in order to optimize the protection provided by the INTERCEPTOR system, while at the same time reducing the cost and complex­ity of deployment. Essentially, all medium to large INTERCEPTOR deployments should be divided into several individual deployment scopes in order to account for differing requirements or deployment conditions. An INTERCEPTOR architec­ture should then be selected for each such deployment scope on its own merit and to meet its particular requirements.

Combining Architectures to Optimize INTERCEPTOR Deployment

In addition to using multiple INTERCEPTOR architectures to meet the requirements of the various deployment scope areas, you may also find it necessary to combine elements of two or more different INTERCEPTOR architectures to arrive at a novel architecture. There are potentially limitless deployment scenarios at your disposal. Rather than accounting for every such option, this Design Guide is primarily intended to increase your understanding and awareness of INTERCEP­TOR architectures and deployment criteria in order to allow you to develop your own individual solution set that will work best for your particular requirements.

If you develop a new architecture, we encourage you to send an overview to Network Integrity Systems for possible inclusion in future Design Guide revisions.

Chapter 6 | Network Architectures–Indoor Architecture #ISP­9: Combining Architectures to Optimize INTERCEPTOR Deployment