Page 26
TLX12 Matrix Switch Product Manual
thinklogical
Rev. E, Oct., 2019
Restricted Switching
Restricted Switching provides multiple levels of security classification domains on the same
Matrix Switch.
Each destination must ensure that no unauthorized content is displayed or accessed.
Therefore, every input and output must be prioritized. Priorities can range from 1 to the total number of
ports in the Matrix Switch. An output can connect to an input with a priority greater than, or equal to, its
own. Thus, a priority level of 1 on an output can connect to any input (priority 1, 2,
3…).
The user must provide a table defining the priorities for each input and output of the switch matrix. This
table is in the form of a comma separated value (csv) file. This file contains the values in three columns:
Port Direction
(i=input, o=output),
Port Number
and
Port Priority
. For example:
I/O
Number
Priority
"i", 1, 1
"i", 2, 2
"i", 3, 3
"i", 4, 1
"i", 5, 3
"o", 1, 1
"o", 2, 3
"o", 3, 2
"o" 4, 4
"o", 5, 1
Output 1 can connect to ports 1-5.
Output 2 can connect to ports 3 and 5.
Output 3 can connect to ports 2, 3, and 5.
Output 4 cannot connect to any ports.
Output 5 can connect to ports 1-5.
Note that Port Direction (i or o) is in quotes and that the table must use only the following ASCII printable
characters:
Double quotes (or speech marks)
character code = 34
(")
Lower case i
character code = 105
(i)
Lower case o
character code = 111
(o)
Comma
character code = 44
(,)
Carriage Return
character code = 13
(CR)
Line Feed
character code = 10
(LF)
The Restricted Switching Table files are stored on the iMX6 processor at:
/var/local/router/restrict/upstream.csv
At system power up, after initial boot-up completes, the processor will only evaluate its Restricted
Switching Table (upstream.csv file) once upon becoming active. If an
upstream.csv
file is found, a log
entry to the
deamon.log
file is made indicating
“Restricted Switching ENABLED.” If no file is found, then
a log entry of “Restricted Switching DISABLED” is made.
Any errors that occur during the Restricted Switching Table evaluation process will be logged as
“error”
with a
field and line invalid
identifier. The
daemon.log file
will be at the following location:
/var/log/daemon.log
.
For access to the
daemon.log
file via SSH, refer to THE NETWORK INTERFACES section of this
document (pg. 7).
To verify the system
’s
Restricted Switching policy
, Thinklogical recommends the following:
1) Review the
daemon.log
file and correct any errors in the Restricted Switching Table before
implementing multiple levels of security classification domains on the same Matrix Switch.
2) Fully test the
Restricted Switching
before implementing multiple levels of security classification
domains on the same Matrix Switch.
Summary of Contents for ThinkLogical TLX12
Page 1: ...Rev E Oct 2019 ...