35
TLX48 Matrix Switch Product Manual
thinklogical
Rev. B, April, 2016
To verify the
system restrict policy
, Thinklogical recommends the following:
1) Review the
daemon.log
file on the active Control Card and correct any errors in the Restricted Switching
Table before implementing multiple levels of security classification domains on the same Matrix Switch
.
2) Fully test the
Restricted Switching
on the active Primary Control Card before implementing multiple
levels of security classification domains on the same Matrix Switch.
3) In a redundant system, make the Secondary Control Card active by disconnecting the LAN cable from
the Primary Control Card
’s LAN port. The Secondary Control Card, upon becoming active, will evaluate
its Restricted Switching Table. Check the
daemon.log
file on the Secondary Control Card for any errors
in the Restricted Switching Table and correct them before implementing multiple levels of security
classification domains on the same Matrix Switch
using the Secondary Control Card.
4) Fully test the Secondary Control
Card’s
Restricted Switching
before implementing multiple levels of
security classification domains on the same Matrix Switch.
There are cases where updates to the Restricted Switching Table must be made in an active system.
When an update is made to the table, the Controller will not evaluate the updated table until the following
procedures are followed:
When updates are made to the Restricted Switching Table in a
non-redundant system
, Thinklogical
recommends the following
(This procedure will be disruptive to system connections)
:
1) Update the Restricted Switching Table of the Primary Control Card
.
2) Take the Primary Control C
ard out of service by following guidelines in the “Safely Remove an Active
Control
Card” section of this document (page 23).
When updates are made to the Restricted Switching Table in a
redundant system
, Thinklogical recommends
the following
(This procedure will NOT be disruptive to system connections)
:
1) Update the Restricted Switching Table of the inactive Secondary Control Card
.
2) Take the Primary Control Ca
rd out of service by following guidelines in the “Safely Remove an Active
Control Card” section of this document (page 23). This will cause the Secondary Control Card to become
active and evaluate its Restricted Switching Table.
3) Update the Restricted Switching Table of the inactive Primary Control Card with the same table used for
the Secondary Control Card.
4) Extract and re-insert the Primary Control Card back into the chassis to cause the system to make the
Primary Control Card the active controller and begin using the updated Restrict Switching Table. Insure
that the LAN connection to the Primary Control Card is restored promptly.
Note: When using a Back-up Controller configuration, both controllers must have the same
Restricted Switching Table file(s) to maintain the security of the system.
Restricted switching is disabled when Restricted Switching Table files are removed.
By default, when
there are no Restricted Switching Table files, all input and output ports will have a priority of 1. All Switches are
shipped without Restricted Switching Table files stored on the Control Card and therefore do not restrict any
connection.