Product specifications
66
Tech Support 0201 888 800
|
Sales 0201 888 888
SpecialtySwitching|Secure KVM Switching
Superiorsecurity,dataisolation,andprotectionfor
government agencies.
ServSwitch Secure KVM Switches with USB
PC Sun
®
Mac
®
USB DVI-I Native Speaker Push Button
PLATFORMS CONNECTORS CABLE PERIPHERALS SWITCHING
1.Preventdataleakingbetween
ports and to the outside world.
Threat: Microprocessor malfunction or
unanticipated software bugs cause data
to flow between ports.
Solution: Unidirectional keyboard and mouse
data flow is enforced by hardware “data
diodes” so data isolation doesn’t rely on
software integrity. This makes it impossible
for the computer to send data along the
keyboard and mouse signaling channel. This
advanced design also ensures data isolation
through hardware and prevents the keyboard
and mouse interfaces from becoming covert
computer-to-computer signaling channels
because of software holes or unanticipated
bugs.
In addition, keyboard and mouse devices
can only be enumerated at the keyboard and
mouse ports. Any other USB peripherals, such
as a USB thumb drive, will be inhibited from
operating, preventing any uploading or
downloading of data.
Threats/Solutions
Threat: Physical proximity between ports
enables data leakage.
Solution: Isolation is improved by placing
the red and black ports at the opposite
edges of the switch.
Threat: Accidental port switching.
Solution: Locked-down operation disables
all keyboard hotkey and mouse switching
functions in both software and hardware
so that data corruption can’t inadvertently
cause an unanticipated channel change.
The only way to change the channels is
with the front-panel keys. There is only one
button per channel, so channel selection is
clear. Color-coded visual feedback confirms
the channel selection.
Threat: Signaling by shorting the power supply
or loading the power.
Solution: Each port is independently powered
by its USB port. Shorting the power supply on
one port will not cause the power on the
other ports to be switched off. The shared
keyboard, mouse, and monitor circuitry are
powered by the power supply. The lack of a
common power supply minimizes electronic
signaling.
Threat: Detection of signals on one computer
by monitoring for crosstalk (leakage) signals
on another computer.
Solution: Minimum crosstalk separation of 60 dB
provided between signals from one computer
and input or I/O signals to another. There are
no connections to sensitive analog inputs,
such as computer microphone ports.
Microphone circuitry enables sensitive
recording of small analog signals. Even very
low crosstalk levels could be recorded and
act as a means by which a non-selected
computer could read data being sent to
another computer.
Threat: Timing analysis attacks (looking at
what happens on one port to determine
data flow patterns on another).
Solution: Only one computer is connected
at a time to any shared circuitry. Links are
unidirectional, preventing timing analysis.
• Highport-to-portelectricalisolation,
whichfacilitatesdataseparation(RED/
BLACK).Channel-to-channel–80-dB
to–60-dBcrosstalkisolationprovides
robustisolationbetweennetworks,
sothey’reidealforgovernment
applications that access classified
networksinadditiontopublic
networks such as the Internet.
• Thelowradiatedemissionsprofile
protects against electronic snooping.
• Switchesarepermanentlyhardwired,
preventing access from one CPU or
network to the others.
• Externaltamper-evidentseals.
• SupportDVI-Ivideo,whichisDC
balancedandmaybeencodedfor
security.
•
Standard Warranty
—2Years
•
Extended Warranty
—1Yearor3Years