User's Manual

Table Of Contents
Fortress ES-Series CLI Guide: Introduction
2
1.2 Network Security Overview
Network security measures take a variety of forms; key
components include:
Confidentiality or privacy implementations prevent
information from being derived from intercepted traffic.
Integrity checking guards against deliberate or accidental
changes to data transmitted on the network.
Access control restricts network access to authenticated
users and devices and defines resource availability and
user permissions within the network.
1.3 Fortress Security Systems
Fortress applies a combination of established and unique
methodologies to network security.
Fortress’s Mobile Security Protocol (MSP) provides device
authentication and strong encryption at the Media Access
Control (MAC) sublayer, within the Data Link Layer (Layer 2)
of the Open System Interconnection (OSI) networking model.
This allows a transmission’s entire contents, including IP
addresses, to be encrypted.
NOTE: New
releases may still
be in FIPS 140-2 Level 2-
validation process. Con-
tact your Fortress repre-
sentative for the current
FIPS certification status
of Fortress products.
Fortress security systems also employ and support standards-
and protocols-based network security measures, including
RADIUS (Remote Authentication Dial in User Service), WPA
(Wi-Fi Protected Access) and WPA2, IPsec (Internet Protocol
Security), with or without L2TP, and NSA (National Security
Agency) Suite B cryptography.
Fortress security systems can be configured to operate in full
compliance with Federal Information Processing Standards
(FIPS) 140-2 Security Level 2.
1.3.1 Fortress Hardware Devices
Fortress hardware platform devices are encompassed in the
ES-series, referred to collectively as Mesh Points. These
devices were formerly known as Secure Wireless Bridges and
have been called simply Bridges, as well as Controllers or
Controller devices and Gateways and Secure Gateways.
The term Mesh Point is used consistently throughout user
guidance to refer to ES-series Fortress hardware devices,
except when quoting GUI wording that departs from that
convention.
Fortress Mesh Points provide network security by
authenticating access to the bridged network and bridging
encrypted wireless transmissions to the wired Local Area
Network (and/or wired communication within the LAN) and by