Thinklogical MX48 Router Manual User Manual
Page 46
![background image](/files/807766/content/doc046.png)
®
M X 4 8 R o u t e r P r o d u c t M a n u a l , R e v . F , D e c . 2 0 1 4
Page 42
Appendix E: Secure Applications
MX Router Control
When used in a secure application, the MX Router and External Computer (server) used to manage the
Router must be located in a physically secure environment to which only trusted administrators have
access. Similarly, the server used to manage the MX Router must be physically protected and have
suitable identification/authentication mechanisms to ensure that only trusted administrators have access.
Thinklogical’s MX Router uses two methods for secure routing. One is known as Restricted Switching
and the other is known as Partitioning. These methods can be deployed singularly or jointly, depending
on security requirements.
Restricted Switching
Restricted Switching provides multiple levels of security classification domains on the same MX Router.
Each destination must ensure that no unauthorized content is displayed or accessed, therefore, each