![Belden Thinklogical TLX48 Product Manual Download Page 33](http://html.mh-extra.com/html/belden/thinklogical-tlx48/thinklogical-tlx48_product-manual_2725639033.webp)
34
TLX48 2RU KVM Matrix Switch Product Manual
thinklogical
Rev. B, May 2022
Restricted Switching
Restricted Switching provides multiple levels of security classification domains on the same Matrix
Switch.
Each destination must ensure that no unauthorized content is displayed or accessed. Therefore, every
input and output must be prioritized. Priorities can range from 1 to the total number of ports in the Matrix Switch.
An output can connect to an input with a priority greater than, or equal to, its own. Thus, a priority level of 1 on
an output can connect to any input (priority 1, 2, 3…).
The user must provide a table defining the priorities for each input and output of the switch matrix. This table is
in the form of a comma separated value (csv) file. This file contains the values in three columns:
Port Direction
(i=input, o=output),
Port Number
and
Port Priority
. For example:
"i", 1, 1
"i", 2, 2
"i", 3, 3
Output 1 can connect to ports 1-5.
"i", 4, 1
Output 2 can connect to ports 3 and 5.
"i", 5, 3
Output 3 can connect to ports 2, 3, and 5.
"o", 1, 1
Output 4 cannot connect to any ports.
"o", 2, 3
Output 5 can connect to ports 1-5.
"o", 3, 2
"o" 4, 4
"o", 5, 1
Note that Port Direction (i or o) is in quotes and that the table must use only the following ASCII printable
characters:
Double quotes (or speech marks)
character code = 34
(")
Lower case i
character code = 105
(i)
Lower case o
character code = 111
(o)
Comma
character code = 44
(,)
Carriage Return
character code = 13
(CR)
Line Feed
character code = 10
(LF)
The Restricted Switching Table files are stored on the controller card at:
/var/local/router/restrict/upstream.csv
At system power up, after initial boot-up, the
Primary Controller Card
will only evaluate its Restricted Switching
Table (upstream.csv file) once upon becoming active. The
Back-Up Controller Card
will NOT evaluate its
Restricted Switching Table (upstream.csv file) at initial boot-up, but it will when a switchover occurs from Primary
Active to Back-Up Active. If an
upstream.csv
file is found, a log entry to the
deamon.log
file is made indicating
“Restricted Switching ENABLED.” If no file is found, then a log entry of “Restricted Switching DISABLED” is
made.
The inactive Back-Up Controller Card will not verify its Restricted Switching Table (csv file), so it will not log error
messages with current time stamp entries until it becomes active. Also, any errors that occur during the
Restricted Switching Ta
ble evaluation process will be logged as “error” with a
field and line invalid
identifier. The
daemon.log file
will be at the following location on the controller card:
/var/log/daemon.log
.
For access to the
daemon.log
file via SSH, refer to THE NETWORK INTERFACES section of this document on
pg.
for correct IP addresses of Controller Cards when in Primary Active or Back-Up Active mode.