Foto kan afwijken van werkelijk product
|
|
|
|
|
|
Accessoires
The ServSwitch™ Secure VGA USB KVM Switch with EAL4+/TEMPEST surpasses the security profiles of most other KVM switches.
In addition to its superior hardware-based data-isolation features, the switch has been certified for Common Criteria Evaluation Assurance to Level 4+ (EAL4+), augmented by ALC_FLR.2 and ATE_DPT.2.
The Common Criteria is an international standardized process for information technology security evaluation, validation, and certification. The Common Criteria scheme is supported by the National Security Agency through the National Information Assurance Program (NIAP). EAL4+ itself defines a common set of tests to evaluate the security of an IT product relating to its supply chain, from design and engineering to manufacturing and distribution.
The ServSwitch Secure VGA USB KVM Switch provides control and separation of up to four PC CPUs/servers connected to secure and non-secure networks through just one keyboard, monitor, and mouse. Users can safely switch among the connected computers operating at different classification levels without worry.
Tempest
Plus, it's TEMPEST USA NSTISSAM Level I and NATO SDIP-27 Level A qualified. What this means is the low radiated emissions profile of the switch meets the appropriate requirements for conducted/radiated electromagnetic emissions.
The TEMPEST designation is required by military organizations. As a security standard, it pertains to technical security countermeasures, standards, and instrumentation that prevent or minimize the exploitation of vulnerable data communications equipment by technical surveillance or eavesdropping.
Options with CAC (Common Access Card) Reader support
SW2009A-USB-EAL and SW4008A-USB-EAL feature a support for special Common Access Card (CAC) reader that enhances its functions and gives you even more fail-safe security features.
Threats/Solutions Scenarios
1. Prevent data leaking between ports and to the outside world.
Threat 1.1: Microprocessor malfunction or unanticipated software bugs cause data to flow between ports.
Solution: Unidirectional keyboard and mouse data flow is enforced by hardware “data diodes” so data isolation doesn’t rely on software integrity. This makes it impossible for the computer to send data along the keyboard and mouse signaling channel. This advanced design also ensures data isolation through hardware and prevents the keyboard and mouse interfaces from becoming covert computer-to-computer signaling channels because of software holes or unanticipated bugs.
In addition, keyboard and mouse devices can only be enumerated at the keyboard and mouse ports. Any other USB peripherals, such as a USB thumb drive, will be inhibited from operating, preventing any uploading or downloading of data.
Threat1.2: Physical proximity between ports enables data leakage.
Solution: Isolation is improved by placing the red and black ports at the opposite edges of the switch.
Threat 1.3: Accidental port switching.
Solution: Locked-down operation disables all keyboard hotkey and mouse switching functions in both software and hardware so that data corruption can’t inadvertently cause an unanticipated channel change. The only way to change the channels is with the front-panel keys. There is only one button per channel, so channel selection is clear. Color-coded visual feedback confirms the channel selection.
Threat 1.4: Signaling by shorting the power supply or loading the power.
Solution: Each port is independently powered by its USB port. Shorting the power supply on one port will not cause the power on the other ports to be switched off. The shared keyboard, mouse, and monitor circuitry are powered by the power supply. The lack of a common power supply minimizes electronic signaling.
Threat 1.5: Detection of signals on one computer by monitoring for crosstalk (leakage) signals on another computer.
Solution: Minimum crosstalk separation of 80 dB provided between signals from one computer and input or I/O signals to another. There are no connections to sensitive analog inputs, such as computer microphone ports. Microphone circuitry enables sensitive recording of small analog signals. Even very low crosstalk levels could be recorded and act as a means by which a non-selected computer could read data being sent to another computer.
Threat 1.6: Timing analysis attacks (looking at what happens on one port to determine data flow patterns on another).
Solution: Only one computer is connected at a time to any shared circuitry. Links are unidirectional, preventing timing analysis.
Threat 1.7: Electromagnetic emissions.
Solution: Special low emissions cables are used to minimize radiated electromagnetic signal leakage. Filtered power connections minimize emissions down the power lines.
2. Prevent data from being stored in the device.
Threat 2.1: Data transfer by means of common storage or common RAM.
Solution: Shared circuitry and the keyboard and mouse are powered down at each channel change to clear all volatile memory of any previous connections. This erases the entire RAM, preventing residual data from remaining in the channel and being transferred to another computer. In addition, the USB host controller and the shared USB peripherals are also powered down, reset, and re-enumerated. This ensures no residual data transfer.
3. Prevent electronic snooping.
Threat 2.2: Subversive snooping by detecting electromagnetic radiation emitted from the equipment.
Solution: The shielded metal case features double shielding in critical areas and a low emissions profile to thwart eavesdropping.
Threat 2.3: Physically tampering with the switch.
Solution: The switch is designed with tamperproof seals to be fitted over the countersunk screws.
Distance (Maximum) — Cable length: 1.8 m (6 ft. ) or 3.6 m (12 ft.)
Resolution (Maximum) —
Digital: 165 MHz per DVI link, dual-link DVI supported;
Analog: 1920 x 1280
Connectors —
CPU: (2) or (4) HD26 F;
User: (1) VGA F, (2) USB Type A F for keyboard and mouse only;
SW2009A-USB-EAL and SW4009A-USB-EAL also: (1) USB Type A F for smartcard reader, or combined card reader/keyboard device only;
Power: (1) 2.5-mm barrel F
Power — Input: 100–240 VAC, 50–60 Hz, external, 0.5 amps (maximum)
Output: 5 VDC, 2.5 amps (maximum), 12.5 watts
Size — (1U) 4.4H x 23.5W x 15D cm (1.75"H x 9.25"W x 5.9"D)
Weight — 0.5 kg (1.2 lb.)
TAA compliant — YES
|
|
Acties
Datasheets
ServSwitch Secure VGA USB KVM Switch EAL4+/TEMPEST Datasheet
Brochure ServSwitch Secure EAL4+ (Fr)
CESG CERTIFICATION REPORT No. CRP269
1.0
Oct 1, 2012
CESG EAL2+ Certification
1.0
Oct 1, 2012
TEMPEST Certificate (SW4009A-USB-EAL)
1.1
Dec 9, 2010
Manuals
ServSwitch Secure VGA USB KVM Switch EAL4+/TEMPEST Manual
Recently viewed products:
|