Secure KVM-over-IP solution
Secure KVM-over-IP solution
Potential security vulnerabilitites, threats
and dangers
KVM solutions are the backbone of the IT infrastructure. Accordingly, it is crucial
to protect the entire KVM installation. The security of KVM systems depends on
two particular factors. First, the systems must be protected against attacks (from out-
side or inside). Second, the quality and reliability of the KVM products and KVM
installations are important.
Protection of KVM systems from external or internal
attacks
Technical progress, the increased digitization of processes and the ever greater net-
working of IT systems are also creating new security vulnerabilities. On the one
hand, work can be done more efficiently, but on the other hand, vulnerability to
threats and attacks increases.
KVM matrix systems allow multiple workplaces to access multiple computers. This
has great advantages: improved workflows, easier control and centralized adminis-
tration. A first big and general security advantage of KVM solutions is the possibil-
ity of removing computers from work spaces and placing them in an access-
protected equipment room. This makes it much more difficult for unauthorized per-
sons to gain physical access to the computers.
Security requirements with KVM-over-IP
Classic KVM systems use standard CAT-x copper cable or fiber optics to transmit
signals. With such KVM systems, physical access is usually necessary to be able to
manipulate anything, such as actively integrating additional unwanted devices.
With KVM-over-IP systems, transmission is based on IP and runs on Gigabit Ether-
net networks (OSI model layer 3). Using KVM-over-IP provides a future-proof solu-
tion due to its flexibility and easy expandability. However, IP transmission also
increases security risks. There is an additional external risk, either via the internet or
internally through easier network access.
Using appropriate software, it is possible to scan the entire internal network for
security holes. In most cases, an attack is targeted at the weakest link in the chain.
This can include, for example, man-in-the-middle attacks, where the entire network
traffic is passed on to third parties. Therefore, separating and segmenting networks
are important tools to protect an application from cyber attacks.
G&D VisionXS-IP-F-TypeC-UHR · 7