
Fortress Bridge: Introduction
2
1.1.1.2
Bridge CLI
The Bridge’s command-line interface provides administration
and monitoring functions via a command line. It is accessed
over the network via the Bridge’s IP address or through a
terminal connected directly to the Bridge’s serial
Console
port.
1.1.1.3
SNMP
NOTE:
You cannot
configure SNMP
management on a For-
tress Bridge in
FIPS
op-
erating mode (the
default).
The Bridge supports versions 1 and 2 of the Simple Network
Management Protocol (SNMP) Internet standard for network
management. The Fortress Management Information Base
(MIB) is included on the Bridge CD and available from:
www.fortresstech.com/support/products_updates.asp
.
1.2 Network Security Overview
Network security measures take a variety of forms; key
components include:
Access controls
prevent unwanted users and devices from
connecting to the network. Typically some form of
authentication
is required, in which credentials are
validated before a connection is allowed. Additionally,
policy
can be applied to determine what on the network the
authenticated user or device can access, when, and with
what permissions.
Privacy,
or
confidentiality,
implementations prevent
information from being derived from intercepted network
traffic through the use of data
encryption
, and guard
against network tampering by checking the
integrity
of
transmitted data.
1.3 The Fortress Security System
The Fortress Security System applies a combination of
established and unique methodologies to both network access
and data privacy.
1.3.1
Multi-factor Authentication™
Fortress guards the network against illicit access with Multi-
factor Authentication: checking three levels of access
credentials before allowing a connection.
1)
Network authentication
mandates that connecting devices
use the correct shared identifier for the network. The For-
tress Security System requires all members of a secure
network to authenticate with the correct
Access ID
.
2)
Device authentication
mandates that a connecting device is
individually recognized on the network through its unique
device identifier. The Fortress Security System requires
each device to authenticate on the secure network with the
unique
Device ID
generated for that device.
Summary of Contents for ecure Wireless Access Bridge
Page 2: ......
Page 18: ......
Page 47: ...Fortress Bridge Configuration 37 NOTE For security ...
Page 87: ......