Page 48
724-746-5500 | blackbox.com
1-, 8-, and 16-Port ServSwitch EC with IP KVM Switch Modules
The Security menu allows you to configure a number of settings, including:
Internal Firewall Setup
As an additional layer of protection, the ServSwitch can use an internal firewall.
When this feature is enabled, connections will only be accepted from listed hosts.
For example, the administrator can type in 10.1.0.1/240 in the “Accept” field.
The IP of the client’s computer between 10.1.0.1 and 10.1.0.240 allows accessing
the ServSwitch with the right username and password. On the other hand, the
user can type in 192.168.1.0/20 (for example) in the “Reject” field. The IP of the
client’s computer between 192.168.1.0 and 192.168.1.20 will be rejected to access
the ServSwitch. This makes the ServSwitch invisible to them.
There are three ways to type in the IP addresses:
1. Specific IP addresses (for example, 10.1.0.1, 10.1.0.5, etc.).
2. Net Range (for example, 10.1.0.1/240).
3. Host Names (for example, yahoo.com, google.com, etc.).
CAUTION: Be careful NOT to lock yourself out! Be certain that your IP will be
accepted by your filter.
VNC Password Policy
When a new VNC connection is established, the remote user must be authenti-
cated. Standard VNC protocol does not support username; it only supports pass-
words. As long as all users have unique passwords, you can determine which user
is connecting based on the password provided. Or, you may enable a second
login screen that will require a valid username and password. You must first
establish a VNC connection using menus and prompts generated by the firmware.
If it is enabled, a second login screen will be required from Java VNC clients as
well. This is unfortunate because the one-time password scheme cannot be used,
and Java VNC clients have already logged into the Web server securely. Also, VNC
normally encrypts passwords and uses a challenge/hashed response system
that is more secure than the second login method. This isn’t a concern if the
entire connection is encrypted with SSH or SSL, however.
Trust SSH Tunnels
If the incoming VNC connection is coming in over an SSH tunnel, the SSH user/
password combination is used and no password is required. Disable this behavior
if you suspect that your SSH client machine is not secure and you are concerned
that your SSH tunnels may be used by other people.