TAG Datasheet. Trout Access Gate 2026.
Overview of Trout Access Gates: deployment modes, supported protocols, throughput, compliance coverage, and integration requirements for IT and OT environments.
What the Access Gate Delivers.
Trout Access Gates are hardware appliances that deploy in any existing network — no recabling, no IP changes, no endpoint agents. It creates a zero-trust overlay that authenticates, inspects, and logs every connection at the session level.
Zero Trust into the LAN
Applies identity-based controls to internal traffic, not just the perimeter.
Works with Existing Gateways
Connects to current edge or OT gateways without redesigning the network.
Secures Only What Matters
Selected flows are routed through enforcement while normal traffic stays unchanged.
Deploys Incrementally
Introduce Zero Trust step by step without disrupting operations.

What's Inside.
The TAG 2026 datasheet covers hardware specifications, deployment architectures, supported protocol lists, compliance mapping, and integration requirements — formatted for security architects, network engineers, and procurement teams.
Hardware Specifications
Form factor, interface count, throughput, power consumption, operating temperature range, and rack-mount specifications for both models.
Deployment Architectures
One Gateway, Two Gateway Layers, and Multi-Site deployment modes with traffic flow diagrams for north-south and east-west enforcement.
Supported Protocols
Full list of IT and OT protocols supported for deep inspection: Modbus, DNP3, IEC 61850, OPC-UA, S7, BACnet, SSH, RDP, VNC, and more.
Compliance Coverage
CMMC 2.0, IEC 62443, NIST SP 800-82, NIS2 Directive, and DoD Zero Trust pillars — with per-control mapping tables.
Download the TAG Datasheet 2026.
Full technical specifications, deployment architectures, protocol support, and compliance mapping for the Trout Access Gate.
For Security Architects
The datasheet includes traffic flow diagrams for all three deployment architectures, integration points with existing firewall and switch infrastructure, and per-protocol inspection capabilities.
Request a Technical Demo
See the Access Gate live in a lab environment. We walk through deployment, policy configuration, session logging, and protocol inspection on real OT traffic.
Common Questions About the Access Gate.
agents required. The Access Gate enforces zero-trust at the network layer — no software installed on any endpoint.
Access Gate One is a 1/2U rack-mount appliance. Access Gate Enterprise is a 1U rack-mount appliance. Both are designed for standard 19-inch rack installation. Detailed dimensions, weight, and interface specifications are in the datasheet.
The Access Gate performs deep packet inspection for Modbus TCP/RTU, DNP3, IEC 61850 (GOOSE/MMS), OPC-UA, Siemens S7, BACnet, and EtherNet/IP. Standard IT protocols — SSH, RDP, VNC, HTTPS, SMB — are also fully inspected. The complete protocol list is in the datasheet.
Throughput specifications vary by model and deployment mode. The datasheet includes throughput figures for inline enforcement (north-south) and overlay enforcement (east-west) scenarios. OT deployments typically operate well within rated throughput given low-bandwidth industrial protocols.
No. The Access Gate is fully air-gap capable. All policy enforcement, session logging, and configuration management operates on-premise without any cloud connectivity. This makes it suitable for classified environments and isolated OT networks.
The Access Gate ships with a local web management interface accessible from the LAN. For multi-site deployments, a management plane can be established between Access Gates over the inter-site tunnel. No cloud portal or external management dependency is required.

