User Authentication Device And Hid Device Filtering Configuration - LEGRAND Raritan RSS4-102 Administrator's Manual

Secure switch
Hide thumbs Also See for Raritan RSS4-102:
Table of Contents

Advertisement

DATE-TIME: Current Date and Time in UTC.
MFG_DATE: Manufacturing Date (in UTC) of the Secure Switch.
TAMP_TEST: The Secure Switch's Tamper protection test status.
HW_TEST: The Secure Switch's hardware self-test status.
FW_TEST: The Secure Switch's firmware self-test status.
FW_CHECKSUM: The Secure Switch's firmware checksum for firmware integrity check.
AUDT_ST: Date and Time (in UTC) when the Secure Switch activates all protection mechanism and
starts generating log data.
AUDT_SP: "NA" will be displayed if the Secure Switch functions properly.
If events that trigger the Secure Switch protection mechanism are detected, and make the
Secure Switch shut down and become inoperable, a Date/Time log will be recorded for the
Secure Switch manufacturer.
This particular Date/Time log can be decoded by the Secure Switch manufacturer only.
FW_VER: Firmware version.
TTL_LOGS: Total numbers of Log data.
Log Data Area
The Log Data Area is an area where critical and non-critical Log data can be displayed. Each Log/Event is
recorded with data like Date, Time and special codes to indicate the type and content of the event.
These special codes can only be decoded and interpreted by the Secure Switch manufacturer.
Critical Log Data: Critical Log Data includes the following events.
• Administrator Logon events -- up to four events
• Administrator password change events -- up to two events
• Critical Administrator KVM configuration -- one event
• Self-test / Tampering events -- up to five events
The last one of Critical Log data will be kept for audit. That means New Critical Log
events will overwrite the old Log data while still keeping the last one record.
Non-critical Log Data: Non-critical Log Data includes the following events.
• Administrator Logon records, including Administrator login and log-off events
• Administrator password change events
• Administrator configuration events
• Device filter configuration events
• Self-test events, and power cycle events
A maximum of thirty-two Non-critical Log Data logs will be logged in the Secure Switch.
The new log entry will overwrite the oldest one. For example, the thirty-third log entry
will overwrite the first log.

User Authentication Device and HID Device Filtering Configuration

Administration Functions enable authorized Administrator to configure device filtering (CDF).
18

Advertisement

Table of Contents
loading

Table of Contents