Black Box ServSwitch Secure - KVM / USB switch - 4 ports

Mfg.Part: SW4009A-USB-EAL | CDW Part: 2486006
Availability: In Stock
Warranties
Advertised Price
Product Details
  • KVM / USB switch
  • 4 x KVM / USB
  • 1 local user
  • desktop
  • for P/N: EHNSECURE1-0006
  • EHNSECURE2-0006
  • EHNSECURE3-0006
View Full Product Details
Better Together
Black Box ServSwitch Secure - KVM / USB switch - 4 ports
Quick View
Total Price:

Product Details

Main Features
  • KVM / USB switch
  • 4 x KVM / USB
  • 1 local user
  • desktop
  • for P/N: EHNSECURE1-0006
  • EHNSECURE2-0006
  • EHNSECURE3-0006
Combat security threats with this hard-wired KVM VGA switch with CAC support. Channel-to-channel 80-dB crosstalk isolation protects against signal snooping. Permanently hard wired preventing access from one CPU or network to the others. Now listed on NIAP website. The low radiated emissions profile meets the appropriate national requirements. External tamper-evident seals. Provides robust isolation between networks so it's ideal for government applications that access classified networks in addition to public networks such as the Internet. Constructed with a solid metal case and a long-wearing switching mechanism. USB host controller erases entire RAM to prevent residual data remaining on channel. Dedicated DDC bus and EDID memory emulation at each port. Features a Common Access Card (CAC) reader meeting the requirements of the Department of Homeland Security Presidential Directive 12 (HSPD-12). Clear unmistakable channel selection. Non-Flash-upgradable ROM. To minimize electronic signaling no common power supply. The ServSwitch(tm) Secure KVM Switch with USB EAL4+ Certified/TEMPEST Level I (Level A) Certified VGA with Card Reader surpasses the security profiles of most other KVM switches. In addition to its superior hardware-based data-isolation features the switch has been certified for Common Criteria Evaluation Assurance to Level 4+ (EAL4+) augmented by ALC_FLR.2 and ATE_DPT.2. The Common Criteria is an international standardized process for information technology security evaluation validation and certification. The Common Criteria scheme is supported by the National Security Agency through the National Information Assurance Program (NIAP). EAL4+ itself defines a common set of tests to evaluate the security of an IT product relating to its supply chain from design and engineering to manufacturing and distribution. The ServSwitch Secure KVM Switch with USB EAL4+ Certified/TEMPEST Level I (Level A) Certified VGA provides control and separation of two PC CPUs/servers connected to secure and non-secure networks through just one keyboard monitor and mouse. Users can safely switch among the connected computers operating at different classification levels without worry. Plus it is TEMPEST USA NSTISSAM Level I and NATO SDIP-27 Level A certified. What this means is the low radiated emissions profile of the switch meets the appropriate requirements for conducted/radiated electromagnetic emissions. The TEMPEST designation is required by military organizations. As a security standard it pertains to technical security countermeasures standards and instrumentation that prevent or minimize the exploitation of vulnerable data communications equipment by technical surveillance or eavesdropping. Also the special Common Access Card (CAC) reader on this switch enhances its functions and gives you even more fail-safe security features. Threats/Solutions Scenarios 1. Prevent data leaking between ports and to the outside world. Threat Microprocessor malfunction or unanticipated software bugs cause data to flow between ports. Solution Unidirectional keyboard and mouse data flow is enforced by hardware"data diodes" so data isolation doesn't rely on software integrity. This makes it impossible for the computer to send data along the keyboard and mouse signaling channel. This advanced design also ensures data isolation through hardware and prevents the keyboard and mouse interfaces from becoming covert computer-to-computer signaling channels because of software holes or unanticipated bugs. In addition keyboard and mouse devices can only be enumerated at the keyboard and mouse ports. Any other USB peripherals such as a USB thumb drive will be inhibited from operating preventing any uploading or downloading of data. Threat Physical proximity between ports enables data leakage. Solution Isolation is improved by placing the red and black ports at the opposite edges of the switch. Threat Accidental port switching. Solution Locked-down operation disables all keyboard hotkey and mouse switching functions in both software and hardware so that data corruption can't inadvertently cause an unanticipated channel change. The only way to change the channels is with the front-panel keys. There is only one button per channel so channel selection is clear. Color-coded visual feedback confirms the channel selection. Threat Signaling by shorting the power supply or loading the power. Solution Each port is independently powered by its USB port. Shorting the power supply on one port will not cause the power on the other ports to be switched off. The shared keyboard mouse and monitor circuitry are powered by the power supply. The lack of a common power supply minimizes electronic signaling. Threat Detection of signals on one computer by monitoring for crosstalk (leakage) signals on another computer. Solution Minimum crosstalk separation of 80 dB provided between signals from one computer and input or I/O signals to another. There are no connections to sensitive analog inputs such as computer microphone ports. Microphone circuitry enables sensitive recording of small analog signals. Even very low crosstalk levels could be recorded and act as a means by which a non-selected computer could read data being sent to another computer. Threat Timing analysis attacks (looking at what happens on one port to determine data flow patterns on another). Solution Only one computer is connected at a time to any shared circuitry. Links are unidirectional preventing timing analysis. Threat Electromagnetic emissions. Solution Special low emissions cables are used to minimize radiated electromagnetic signal leakage. Filtered power connections minimize emissions down the power lines. 2. Prevent data from being stored in the device. Threat Data transfer by means of common storage or common RAM. Solution Shared circuitry and the keyboard and mouse are powered down at each channel change to clear all volatile memory of any previous connections. This erases the entire RAM preventing residual data from remaining in the channel and being transferred to another computer. In addition the USB host controller and the shared USB peripherals are also powered down reset and re-enumerated. This ensures no residual data transfer. 3. Prevent electronic snooping. Threat Subversive snooping by detecting electromagnetic radiation emitted from the equipment. Solution The shielded metal case features double shielding in critical areas and a low emissions profile to thwart eavesdropping. Threat Physically tampering with the switch. Solution The switch is designed with tamperproof seals to be fitted over the countersunk screws.