ATEN CS1182DP4C Manual page 15

Hide thumbs Also See for CS1182DP4C:
Table of Contents

Advertisement

Security Target
Version 1.1
2022-03-08
The Secure KVM Switch products are designed to enforce the allowed and disallowed data flows between
user peripheral devices and connected computers as specified in [PSD]. Data leakage is prevented across
the TOE to avoid compromise of the user's information. The Secure KVM Switch products automatically
clear the internal TOE keyboard and mouse buffers.
Figure 1 shows the data path design using a 2-Port KVM as an example.
Figure 1: Simplified Block Diagram of a 2-Port KVM TOE
As shown in Figure 1 above, the internal components of the KVM consist of switches, emulators, USB host
controllers, processors, and embedded with non-updateable firmware v1.1.101. The internal hardware
components are identified in Appendix A and include the manufacturer and the part number. The data
flow of USB keyboard/mouse is controlled by the host controller for console HID keyboard and pointing
devices. Details of the data flow architecture are provided in the proprietary Secure KVM Isolation
Document. All keyboard and mouse connections are filtered first, and only authorized devices will be
allowed. The TOE emulates data from authorized USB keyboard and mouse to USB data for computer
sources.
The TOEs proprietary design ensures there is no possibility of data leakage from a user's peripheral output
device to the input device; ensures that no unauthorized data flows from the monitor to a connected
computer; and unidirectional buffers ensure that the audio data can travel only from the selected
computer to the audio device. There is no possibility of data leakage between computers or from a
peripheral device connected to a console port to a non-selected computer. Each connected computer has
its own independent Device Controller, power circuit, and EEPROM. Additionally, keyboard and mouse
are always switched together.
All Secure KVM Switch components including the RPS, feature hardware security mechanisms including
tamper-evident labels, always active chassis-intrusion detection, and tamper-proof hardware
10

Advertisement

Table of Contents
loading

Table of Contents