2 bridge cli, 3 snmp, 2 network security overview – Fortress Technologies ecure Wireless Access Bridge User Manual
Page 12: 3 the fortress security system, 1 multi-factor authentication, Bridge cli snmp, Multi-factor authentication

Fortress Bridge: Introduction
2
1.1.1.2
Bridge CLI
The Bridge’s command-line interface provides administration
and monitoring functions via a command line. It is accessed
over the network via the Bridge’s IP address or through a
terminal connected directly to the Bridge’s serial
Console
port.
1.1.1.3
SNMP
NOTE:
You cannot
configure SNMP
management on a For-
tress Bridge in
FIPS
op-
erating mode (the
default).
The Bridge supports versions 1 and 2 of the Simple Network
Management Protocol (SNMP) Internet standard for network
management. The Fortress Management Information Base
(MIB) is included on the Bridge CD and available from:
www.fortresstech.com/support/products_updates.asp
.
1.2 Network Security Overview
Network security measures take a variety of forms; key
components include:
Access controls prevent unwanted users and devices from
connecting to the network. Typically some form of
authentication is required, in which credentials are
validated before a connection is allowed. Additionally,
policy can be applied to determine what on the network the
authenticated user or device can access, when, and with
what permissions.
Privacy, or confidentiality, implementations prevent
information from being derived from intercepted network
traffic through the use of data encryption, and guard
against network tampering by checking the integrity of
transmitted data.
1.3 The Fortress Security System
The Fortress Security System applies a combination of
established and unique methodologies to both network access
and data privacy.
1.3.1
Multi-factor Authentication™
Fortress guards the network against illicit access with Multi-
factor Authentication: checking three levels of access
credentials before allowing a connection.
1) Network authentication mandates that connecting devices
use the correct shared identifier for the network. The For-
tress Security System requires all members of a secure
network to authenticate with the correct Access ID.
2) Device authentication mandates that a connecting device is
individually recognized on the network through its unique
device identifier. The Fortress Security System requires
each device to authenticate on the secure network with the
unique Device ID generated for that device.