Quick Contact Links

Security Simplified.

The Packet Forensics 5B 3rd Generation Device (5BG3) is a purpose-built active defense and complex network surveillance platform designed to meet your most rigorous security requirements. This energy efficient, small form factor platform integrates two pairs of inline 10/100/1000 network interfaces, built in span port, a management interface, two 802.11 low-profile directional antennas and a power supply that uses less than 25W of power. It is an ideal platform when space is limited, but the need is great.

Introducing the 5BG3

The 5BG3 is tailored toward specific needs in the areas of active cyber defense, lawful intercept, network intelligence collection, and communications policy enforcement.

• Deploy darknets, sinkholes, and security overlay networks
• Enforce communications policies with an extensible policy language
• Record network traffic with intelligent ring buffering
• Perform stealth packet filtering and transparent redirection
• Prevent threats from entering the network at the packet level

This comprehensive system is designed for flexibility. System options provide enhancements to network defense and surveillance capabilities.

Key Advantages:

• Advanced capabilities allow for packet-level manipulation
• Small form-factor, solid-state
• Triggers intercepts based on IP, MAC, keywords, RADIUS, DHCP, VoIP calls, behavior or other subject criteria
• Probe and Mediation capabilities
• Deploy it with no prior knowledge of the target network
• Passively discover network topology
• In-line use is safe with the 5BG3’ s hardware bypass circuitry and intelligent software
• Easy to manage with graphical software on Windows, Mac and Linux
• Supports multiple VoIP protocols
• CALEA compliant

Advanced Policy Regime

The Packet Forensics policy regime allows multiple policies to operate simultaneously on the entire data stream. This means while you search for thousands of different strings deep inside each packet, you can also intercept VoIP calls, extract dialed digits and correlate RADIUS and DHCP log-ins with IP addresses. Each policy can have different resulting actions, such as forwarding packets to another analysis system or writing pen register-type logs. For technical experts, an advanced policy editor is provided. You can craft your own applications and take granular control over all packet processing functions.

Simple Scalability

With the Packet Forensics multi-platform graphical user interface, scaling an installation is as simple as plugging-in additional equipment and clicking on a few buttons authorizing it to execute your existing policies. Packet Forensics platforms can go from bare-metal to fully-operational in under five minutes. Our graphical user interface is available on Windows, Mac OS X and Linux platforms and allows you to manage thousands of devices in the field, even those behind NAT and firewalls. Most intercepts can be set up in just a few clicks of a wizard and even the wizards themselves can be customized to follow your specific workflow.

Specs at a Glance

  • Feature Highlights
    Ethernet, IP & MPLS Probe
    Dialed Digit Extraction
    Integrated Mediation Server
  • Network Interfaces
    6x GE Copper with 2 bypass
    Need something faster?
  • Storage Capacity
    Solid state OS/industrial flash disk (8GB)
    1TB SATA enterprise harddrive (shock mount)
    B-Y-O-D Options
    2x USB 2.0
  • General Specs
    240mm x 44mm x 166mm
    (9.36” x 1.72” x 6.47”)
    Need rack-mount?
    Weight: 1.2kg (2.64lbs)
    Multi-LED Status Display
    High efficiency fan
    Energy Efficient (25W)
    SSH Remote Management
    Managed via GUI
  • Optional Features
    GUI for Windows/MacOS X
    802.11 A/B/G/N radio with dual low profile omni directional antennas
  • Performance Characteristics
    Contact us for stats
  • Other Contact Information
    Visit our Contact Page

Intercept Support

  • Targeting
    RADIUS Triggers
    DHCP Triggers
    Protocol Fields
    User-Defined Logic Chain
    Static Characteristics
  • Voice over Packet
    MGCP (partial)
  • Data Intercept
    Unaltered Frame Forwarding
    Short Term Storage (ATIS)
    Chunked PCap capture
  • * = Performance characteristics and published statistics are examples only and are dependent on operating environment and software policies.

  • Copyright © Packet Forensics, LLC • 4535 S. Lakeshore Drive, #4A • Tempe, AZ 85282 US

    Terms & Conditions • Domestic US +1 (800) 807-6140 • International +1 (757) 320-2002 • Privacy Notice