Thinklogical VX640 Router Manual User Manual

Page 38

Advertising
background image

VX640 Router Manual, Rev. F

33

November, 2013

Appendix E: Secure Applications

VX Router Control

When used in a secure application, the VX Router and External Computer (server) used to manage the
Router must be located in a physically secure environment to which only trusted administrators have
access. Similarly, the server used to manage the VX Router must be physically protected and have
suitable identification/authentication mechanisms to ensure that only trusted administrators have access.

Thinklogical’s VX Router uses two methods for secure routing. One is known as Restricted Switching
and the other is known as Partitioning. These methods can be deployed singularly or jointly, depending
on security requirements.

Restricted Switching

Restricted Switching provides multiple levels of security classification domains on the same VX Router.
Each destination must ensure that no unauthorized content is displayed or accessed, therefore, each
input and output needs to be prioritized. Priorities can range from 1 to the total number of ports in the VX

Advertising