Page 42
TLX160 Matrix Switch Product Manual
thinklogical
Rev. E, February, 2018
Secure Application Examples
The Diagram on pg. 40 shows the TLX160 Matrix Switch in a secure application.
The highly secure
components are described as the Red Network and the other, lower security components are
described as the Black Network.
The Red Network, containing the computers (sources), is shown in a
physically secure environment along with the TLX Matrix Switch, the computer server used to manage
the Switch, and the Network Hub. The Network Hub is a dedicated network used only to connect the TLX
Switch to the computer server. This dedicated network does not connect to any other components and
does not extend beyond the physically secure environment. The dedicated network connection may be
replaced by a direct serial connection (RS-232) between the TLX Switch and the computer server.
The TLX Matrix Switch can be configured to
prevent accidental connection from the Red
Network to the Black Network using the
Restricted Switching feature.
For example, the
TLX Matrix Switch Network Diagram should be
configured with the following csv file:
Direction
Number
Priority
I
1
2
I
2
2
O
2
2
I
42
2
O
41
2
O
42
2
I
5
1
O
5
1
I
45
1
O
45
1
The following connection rules apply:
SOURCE 2 can be connected only to DESTINATION 2 and
SOURCE 1 can be connected to both DESTINATION 1 and DESTINATION 2.
Note: The TLX Matrix Switch
and the computer server used to manage the Switch must be
protected according to the highest security classification of any component in the entire
network application.
Note: The optical connections and DESTINATION receiver designated as Red Network
must be physically secure.
Note: When using a Secondary Controller configuration, both controllers must have the
same Partition Table file(s) to maintain the security of the system.
Note: If an unintended power loss occurs directly after modification or deletion of the
‘upstream.csv’ file, the changes may not take effect. Users should always execute the
sync
command
after deleting or modifying the ‘upstream.csv’ to ensure intended changes
occur.
The configuration of the TLX Matrix Switch should be reviewed regularly to ensure that it
continues to meet organizational security policies concerning:
▪
Changes in the TLX Matrix Switch configuration
▪
Changes in the organizational security policy
▪
Changes in the threats presented from non-trusted network interfaces
▪
Changes in the administration, operation staff or the physical environment of the TLX Matrix Switch