Also found in: Wikipedia.
TACLANETactical Local Area Network Encryptor
References in periodicals archive ?
The TACLANE can be used on both ATM and IP networks, and is a smaller, less expensive device than the FASTLANE encryptor.
5 million, features a PCMCIA cryptocard, which plugs into GTE TACLANE units and performs data encryption and decryption under a wide range of protocols.
The TACLANE Trusted Sensor Software improves and enhances cyber situational awareness, key to understanding the network and crucial in the development of effective computer network defense.
The strategic ADN stack consisted of a Black Core switch, NIPR router and switch, SIPR & CX-I TACLANE and switch.
So the strategic ADN stack consisted of a Black Core switch; NIPR router and switch; SIPR & CX-I TACLANE and switch.
Other networks are tunneled through the NIPRNET with TACLANE type 1 encryptors.
The cyber defense capable TACLANE high-speed encryptors secure networks at the highest security level while providing the ability to identify possible threats deeply embedded in network data traffic.
The router is then connected to a Cisco 3560G switch via its Ethernet port, and then to each network's appropriate TACLANE device.
General Dynamics has delivered full system lifecycle cyber capabilities across the Department of Defense as well as secure voice and data systems, including the TACLANE and Sectera brand encryption products, which protect critical communications for the U.
With the installation of data packages and TACLANEs at each BCT HQs, SFC Larry Martin and Gallagher were able to link each BCT TACLANE providing the ability to use additional gateways located at DMAIN, DREAR, and 2/25 BCT HQs.
Each IKSS terminal is fielded with one TACLANE for encryption of the Ku link into SIPRNET, tunneling of NIPR through a second TACLANE was achieved by harvesting an existing TACLANE that resided in each S1/S4 vehicle within the battalions.
Government's Secret Internet Protocol Router Network (SIPRNet), including the widely deployed TACLANE family of network encryptors.