Appendix F: Frequently Asked Questions
365
Question
Answer
Is the Dominion KX III FIPS 140-2
Certified?
The Dominion KX III uses an embedded FIPS
140-2 validated cryptographic module running
on a Linux platform per FIPS 140-2
implementation guidelines. This cryptographic
module is used for encryption of KVM session
traffic consisting of video, keyboard, mouse,
virtual media and smart card data.
What kind of encryption does
Dominion KX III use?
Dominion KX III uses industry-standard (and
extremely secure) 256-bit AES, 128-bit AES or
128-bit encryption, both in its SSL
communications as well as its own data
stream. Literally no data is transmitted between
remote clients and Dominion KX III that is not
completely secured by encryption.
Does Dominion KX III support AES
encryption as recommended by
the U.S. government’s NIST and
FIPS standards?
Yes. The Dominion KX III utilizes the Advanced
Encryption Standard (AES) for added security.
256-bit and 128-bit AES is available.
AES is a U.S. government-approved
cryptographic algorithm that is recommended
by the National Institute of Standards and
Technology (NIST) in the FIPS Standard 197.
Does Dominion KX III allow
encryption of video data? Or does
it only encrypt keyboard and
mouse data?
Unlike competing solutions, which only encrypt
keyboard and mouse data, Dominion KX III
does not compromise security
– it allows
encryption of keyboard, mouse, video and
virtual media data.
How does Dominion KX III
integrate with external
authentication servers such as
Active Directory, RADIUS or
LDAP?
Through a very simple configuration, Dominion
KX III can be set to forward all authentication
requests to an external server such as LDAP,
Active Directory or RADIUS. For each
authenticated user, Dominion KX III receives
from the authentication server the user group
to which that user belongs. Dominion KX III
then determi
nes the user’s access permissions
depending on the user group to which he or
she belongs.
How are usernames and
passwords stored?
Should Dominion KX III’s internal
authentication capabilities be used, all
sensitive information, such as usernames and
passwords, is stored in an encrypted format.
Literally no one, including Raritan technical
support or product engineering departments,
can retrieve those usernames and passwords.
Summary of Contents for dominion kx III
Page 12: ......
Page 103: ...Chapter 4 KX III Administrator Help 91 3 Click OK ...
Page 159: ...Chapter 4 KX III Administrator Help 147 ...
Page 283: ...Chapter 7 KX III Local Console KX III End User Help 271 ...
Page 391: ......