Thinklogical MX48 Router Manual User Manual

Page 46

Advertising
background image

®

M X 4 8 R o u t e r P r o d u c t M a n u a l , R e v . F , D e c . 2 0 1 4

Page 42

Appendix E: Secure Applications

MX Router Control

When used in a secure application, the MX Router and External Computer (server) used to manage the
Router must be located in a physically secure environment to which only trusted administrators have
access. Similarly, the server used to manage the MX Router must be physically protected and have
suitable identification/authentication mechanisms to ensure that only trusted administrators have access.

Thinklogical’s MX Router uses two methods for secure routing. One is known as Restricted Switching
and the other is known as Partitioning. These methods can be deployed singularly or jointly, depending
on security requirements.

Restricted Switching

Restricted Switching provides multiple levels of security classification domains on the same MX Router.
Each destination must ensure that no unauthorized content is displayed or accessed, therefore, each

Advertising