![Thinklogical TXL24 Скачать руководство пользователя страница 41](http://html1.mh-extra.com/html/thinklogical/txl24/txl24_product-manual_1107271041.webp)
Page 35
TLX24 Matrix Switch Product Manual
thinklogical
Rev. C, August, 2016
The Controller
will evaluate its Partition Table (upstream.csv file) only once at boot-up.
Any errors that occur during the Partition Table evaluation process will be logged in the
daemon.log file
at the following location on the Controller:
var/log/daemon.log
Note:
For access to the
daemon.log
file via SSH, refer to “THE NETWORK INTERFACES”
section of this manual (page 10).
To verify the
system partition policy
, Thinklogical recommends the following:
1) Review the
daemon.log
file and correct any errors in the Partition Table before implementing
multiple levels of security classification domains on the same Matrix Switch
.
2) Fully test the
Partitioning
before implementing multiple levels of security classification domains
on the same Matrix Switch.
There are cases where updates to the Partition Table must be made in an active system.
When an
update is made to the table, the Controller will not evaluate the new table until it is rebooted.
Partition switching is disabled when Partition Table files are removed. By default, when there are no
Partition Table files, all ports not listed will default to partition 1.
All Switches are shipped without
Partition Table files and therefore do not restrict any connections.
Administration Access
There are only two methods by which the administrator can access the Switch Configurations:
1.
Using the serial console directly connected to the Switch.
Note: While no administrator password is required to use the serial console, physical
access to the Switch is required, therefore the Switch should be stored in a physically
secure location to avoid unauthorized access.
2. Using SSH access
The Switch allows SSH connections to the Switch for management purposes. SSH sessions are
authenticated using an encrypted password file.
Password Security
For security purposes, the Switch defaults to using the Message-Digest Algorithm (MD5) and
shadow passwords
. It is highly recommended that you do not alter these settings.
If you
select the older Data Encryption Standard (DES) format, passwords will be limited to eight
alphanumeric characters (disallowing punctuation and other special characters) with a modest
56-bit level of encryption.
The single most important thing you can do to protect the Switch
is create a strong password.
Creating Strong Passwords
:
The password can contain up to 127 characters and cannot contain a space.
MAKE THE PASSWORD AT LEAST EIGHT CHARACTERS LONG. The longer the password,
the more effective it will be. If you are using an MD5 password, it should be approximately 15
characters long. With DES passwords, use the maximum eight character length.
MIX UPper AnD LowER CASE LETTERS. Passwords are case sensitive, so mixing will
multiply the number of possible combinations.
MIX LETTER5 AND NUM8ERS within the password to enhance its strength.
INCLUDE NON-ALPHANUMERIC CH@RACTER$. Special characters, such as (& $ % >) and
punctuation marks (? “- !) increase the strength of a password.
Secure Application Examples
The Diagram on page 37 shows the TLX24 Matrix Switch in a secure application.
The highly secure
components are described as the Red Network and the other, lower security components are
described as the Black Network.
The Red Network, containing the computers (sources), is shown in a
Содержание TXL24
Страница 1: ......
Страница 10: ...Page 4 TLX24 Matrix Switch Product Manual thinklogical Rev C August 2016...