Many Net Techs have heard of a STIG (Security Technical Implementation Guide) but most have never actually looked at them before. The STIG, combined with NSA guides are considered the “best practices” for information assurance within DOD systems. While there is nothing that says that your systems MUST be configured to their standards it is important to realize that by not configuring them in the recommended way means that you are accepting risk.
Quality of Service (QOS) in WIN-T 1A
Quality of service (QOS) is one of those things that nearly every net tech has heard of but most know nothing about. We think of it as a silver bullet but are sorely mistaken. Take some time to learn about it and figure out how it can help you.
Trends from the National Training Center Part 6 – Network Security
Our networks play a vital part in allowing the units we support to communicate which enables to commander to “impose his will on the enemy” (a my boss likes to always say). But if the network is not secure it can easily be used against us. This is part six of a series of posts concerning the network trends that I regularly see here at the National Training Center as units pass through on rotation.
Trends from the National Training Center Part 5 – HCLOS
The high capacity line-of-sight (HCLOS) radio provides a high bandwidth low latency link between two nodes in the WIN-T network. It can greatly expand the capabilities of the BCT’s network but must be deliberately planned. This is part five of a series of posts concerning the network trends that I regularly see here at the National Training Center as units pass through on rotation.
Trends from the National Training Center Part 4- Signal Maintenance
The Brigade S6 is responsible for providing the overall communications plan for the BCT. In order to accomplish that mission, they must continually know the status of all systems that support that mission to include JNNs, CPNs, and STTs along with their support equipment (generators). This is part four of a series of posts concerning the network trends that I regularly see here at the National Training Center as units pass through on rotation.
Trends from the National Training Center Part 3- Training
Installing, operating, and maintaining a modern tactical signal network is not an easy task and yet we expect our operators to be proficient at it. While this is by no means an unrealistic goal, it is one that requires work and training at home station before going to the field. This is part three of a series of posts concerning the network trends that I regularly see here at the National Training Center as units pass through on rotation.
Trends from the National Training Center Part 2- Network Management
Managing the network is one of the key responsabilities of the Brigade Network Technician. It is critical that NETOPS is always aware of the status of the network and how it is performing in order to proactively identify problems and fully optimize the network. This is part two of a series of posts concerning the network trends that I regularly see here at the National Training Center as units pass through on rotation.
Trends from the National Training Center Part 1- Network Planning
As an Observer, Coach, Trainer (OC/T) here at the National Training Center, we have two primary jobs. The first one is to observe (watch what you’re doing), coach (give you that little nudge to help you through something that you may not be comfortable with, and train (teach you the stuff that you just haven’t »
Standardizing the LAN
Tactical networks are an ever changing beast. Links come and go frequently as units maneuver across the battlefield. Likewise, the BCT Main is a mobile headquarters that needs to be able to quickly setup and tear down in order to move to the next location. Having a standardized LAN setup can greatly reduce the amount of time required to reestablish the Main each time it moves, and greatly aid in troubleshooting after it has been established.
Default Passwords
Information Assurance (IA) is not an easy. Attackers continually find new and innovative ways to attack our systems and bypass the security controls that we have put in place. We put elaborate controls in place to ensure that any attacker will at least have to work in order to get into our systems only to have all of our time and effort wasted because of a default password.