PC-over-IP Administrative
Interface User Manual
38
button allows a new device or device group to be added to the list and the
Remove
button allows a device or device group to be removed from the list.
Selecting the
Add new
button allows USB authorization by
ID
or
Class
. If
ID
is selected,
then this entry authorizes a USB device by
Vendor ID
and
Product ID
. If
Class
is
selected, then this entry authorizes a USB device by
Device Class
,
Sub Class
and
Protocol
.
Note: USB authorizations are applied in the following priority order:
1. Unauthorized Vendor ID/Product ID (highest priority)
2. Authorized Vendor ID/Product ID
3. Unauthorized Device Class/Sub Class/Protocol
4. Authorized Device Class/Sub Class/Protocol (lowest priority)
Table 1-9 summarizes the USB authorization entry type and the associated data fields.
Table 1-9: USB Device Authorization Entry Types
Entry
Type
Required
Fields
Hexadecimal Value
Comments
ID VID 0-FFFF
PID 0-FFFF
Class Device
Class
0-FF; asterisk (*) indicates
any device class
Drop-down menu provides
human-readable translations of
the known device classes
Sub Class
0-FF; asterisk (*) indicates
any device sub class
Drop-down menu provides
human-readable translations of
the known device sub classes
Protocol
0-FF; asterisk (*) indicates
any protocol authorized
Drop-down menu provides
human-readable translations of
the known protocols
1.7.1.2 Unauthorized Devices
The
Unauthorized Devices
section allows the administrator to specify the unauthorized
USB devices for the Portal. Two buttons allow customization of this “black list.” The
Add
new
button allows a new device or device group to be added to the list and the
Remove
button allows a device or device group to be removed from the list.
Selecting the
Add new
button allows USB unauthorization by
Class
or
ID
. If
ID
is
selected, then this entry unauthorizes a USB device by
Vendor ID
and
Product ID
. If
Class
is selected, then this entry unauthorizes a USB device by
Device Class
,
Sub Class
and
Protocol
.
Note: USB authorizations are applied in the following priority order:
1. Unauthorized Vendor ID/Product ID (highest priority)
2. Authorized Vendor ID/Product ID
3. Unauthorized Device Class/Sub Class/Protocol