beautypg.com

2 bridge cli, 3 snmp, 2 network security overview – Fortress Technologies ecure Wireless Access Bridge User Manual

Page 12: 3 the fortress security system, 1 multi-factor authentication, Bridge cli snmp, Multi-factor authentication

background image

Fortress Bridge: Introduction

2

1.1.1.2

Bridge CLI
The Bridge’s command-line interface provides administration
and monitoring functions via a command line. It is accessed
over the network via the Bridge’s IP address or through a
terminal connected directly to the Bridge’s serial

Console

port.

1.1.1.3

SNMP

NOTE:

You cannot

configure SNMP

management on a For-
tress Bridge in

FIPS

op-

erating mode (the
default).

The Bridge supports versions 1 and 2 of the Simple Network
Management Protocol (SNMP) Internet standard for network
management. The Fortress Management Information Base
(MIB) is included on the Bridge CD and available from:

www.fortresstech.com/support/products_updates.asp

.

1.2 Network Security Overview

Network security measures take a variety of forms; key
components include:

‹

Access controls prevent unwanted users and devices from
connecting to the network. Typically some form of
authentication is required, in which credentials are
validated before a connection is allowed. Additionally,
policy can be applied to determine what on the network the
authenticated user or device can access, when, and with
what permissions.

‹

Privacy, or confidentiality, implementations prevent
information from being derived from intercepted network
traffic through the use of data encryption, and guard
against network tampering by checking the integrity of
transmitted data.

1.3 The Fortress Security System

The Fortress Security System applies a combination of
established and unique methodologies to both network access
and data privacy.

1.3.1

Multi-factor Authentication™

Fortress guards the network against illicit access with Multi-
factor Authentication: checking three levels of access
credentials before allowing a connection.

1) Network authentication mandates that connecting devices

use the correct shared identifier for the network. The For-
tress Security System requires all members of a secure
network to authenticate with the correct Access ID.

2) Device authentication mandates that a connecting device is

individually recognized on the network through its unique
device identifier. The Fortress Security System requires
each device to authenticate on the secure network with the
unique Device ID generated for that device.