
8
8 PORT SECURE KM
SM80NU-3 SM80NU-3 SM80NU-3
Section 2 - Overview
Main Features
Product is designed, manufactured and delivered in security-
controlled environments. Below is a summary of the main advanced
features incorporated in product:
Advanced isolation between computers and shared peripherals
The emulations of keyboard, mouse and display EDID, prevent direct
contact between computers and shared peripherals. Product design
achieves maximal security by keeping the video path separate with
keyboard and mouse switched together, purging keyboard buffer
when switching channels. All these features contribute to strong
isolation between computer interfaces, maintained even when
product is powered off.
Unidirectional data flow: USB, audio and video
Unique hardware architecture components prevent unauthorized
data flow, including:
•
Optical unidirectional data flow diodes in the USB data path
that filtrate and reject unqualified USB devices;
•
Secure analog audio diodes that prevent audio
eavesdropping with no support for microphone or any other
audio-input device;
Isolation of power domains
Complete isolation of power domains prevents signaling attacks.
Secure administrator access & log functions
Product incorporates secure administrator access and log functions
to provide auditable trail for all product security events, including
battery backup life for anti-tampering and log functions. Non-
reprogrammable firmware prevents the ability to tamper with
product logic. Valid administrator username and password are
required to access administrator functions.
Always-on, active anti-tamper system
Active anti-tampering system prevents malicious insertion of
hardware implant such as wireless key-logger inside product
enclosure. Any anti-tampering attempt causes isolation of all
computers and peripheral devices rendering product inoperable and
showing clear indications of tampering event to user.
Holographic security tamper-evident labels are placed on the
enclosure to provide a clear visual indication if product has been
opened or compromised.
Important note before deploying the product:
In order to
comply with the product’s Common Criteria evaluation
and in order to prevent unauthorized administrative access to the
product, the default administrator user name and password must be
changed prior to first product use.
Refer to the product Administrator Guide for further details.
Содержание SCKM180
Страница 21: ...21 8 PORT SECURE KM SM80NU 3 SM80NU 3 SM80NU 3 Section 2 Overview Typical system installation...
Страница 23: ...23 8 PORT SECURE KM SM80NU 3 SM80NU 3 SM80NU 3 Section 2 Overview Using Keyboard shortcuts...
Страница 24: ...24 8 PORT SECURE KM SM80NU 3 SM80NU 3 SM80NU 3 Section 2 Overview 8 port KM Predefined Setups...