
Page 37
TLX160 Matrix Switch Product Manual
thinklogical
Rev. E, February, 2018
To verify the
system restrict policy
, Thinklogical recommends the following:
1) Review the
daemon.log
file on the active Control Card and correct any errors in the Restricted
Switching Table before implementing multiple levels of security classification domains on the
same Matrix Switch
.
2) Fully test the
Restricted Switching
on the active Primary Control Card before implementing
multiple levels of security classification domains on the same Matrix Switch.
3) In a redundant system, make the Secondary Control Card active by disconnecting the LAN cable
from the Primary Control Card
’s LAN port. The Secondary Control Card, upon becoming active,
will evaluate its Restricted Switching Table. Check the
daemon.log
file on the Secondary Control
Card for any errors in the Restricted Switching Table and correct them before implementing
multiple levels of security classification domains on the same Matrix Switch
using the Secondary
Control Card.
4) Fully test the Secondary Control
Card’s
Restricted Switching
before implementing multiple levels
of security classification domains on the same Matrix Switch.
There are cases where updates to the Restricted Switching Table must be made in an active
system.
When an update is made to the table, the Controller will not evaluate the updated table until the
following procedures are followed:
When updates are made to the Restricted Switching Table in a
non-redundant system
,
Thinklogical recommends the following:
(This procedure will be disruptive to system connections)
1) Update the Restricted Switching Table of the Primary Control Card
.
2) Take the Primary Control C
ard out of service by following guidelines in the “Safely Remove an
Active Control
Card” section of this document (pg. 24).
When updates are made to the Restricted Switching Table in a
redundant system
, Thinklogical
recommends the following:
(This procedure will NOT be disruptive to system connections)
1) Update the Restricted Switching Table of the inactive Secondary Control Card
.
2) Take the Primary Control C
ard out of service by following guidelines in the “Safely Remove an
Active Control Card” section of this document (pg. 24). This will cause the Secondary Control Card
to become active and evaluate its Restricted Switching Table.
3) Update the Restricted Switching Table of the inactive Primary Control Card with the same table
used for the Secondary Control Card.
4) Extract and re-insert the Primary Control Card back into the chassis to cause the system to make
the Primary Control Card the active controller and begin using the updated Restrict Switching
Table. Insure that the LAN connection to the Primary Control Card is restored promptly.
Note: When using a Secondary Controller configuration, both controllers must have the
same Restricted Switching Table file(s) to maintain the security of the system.
Restricted switching is disabled when Restricted Switching Table files are removed.
By default,
when there are no Restricted Switching Table files, all input and output ports will have a priority of 1. All
Switches are shipped without Restricted Switching Table files stored on the Control Card and therefore
do not restrict any connection.
Note: If an unintended power loss occurs directly after modification or deletion of the
‘upstream.csv’ file, the changes may not take effect. Users should always execute the
sync
command
after deleting or modifying the ‘upstream.csv’ to ensure intended changes
occur.
Содержание TLX160
Страница 1: ......
Страница 10: ...Page 4 TLX160 Matrix Switch Product Manual thinklogical Rev E February 2018...