Herunterladen Diese Seite drucken

G&D VisionXS-IP-F-TypeC-UHR Installation Und Bedienung Seite 155

Werbung

Verfügbare Sprachen

Verfügbare Sprachen

Secure KVM-over-IP solution
In KVM-over-IP systems, keyboard and mouse inputs as well as video, audio, USB
and RS232 data must be encrypted to prevent unauthorized users from tapping data
transmissions and thus gaining access to internal information, such as logins and
passwords. Regularly exchanging the security keys is mandatory. The use of VPN,
VLANs and secure encryption is also required to prevent unwanted access.
The secure solution from G&D
G&D uses different ports for data transmission in the IP network. A VPN tunnel
connects each end device (IP-CPU/IP-CON) to the respective counterpart or to the
KVM-over-IP matrix Control-Center-IP or ControlCenter-IP-XS. An AES256
Galois/Counter Mode (GCM) encrypted IPSec VPN tunnel is used (GCM is based
on Counter Mode CTR, but also offers integrated integrity protection). There is also
downward compatibility for AES128-GCM.
The first port that is established from all KVM-over-IP end devices to the respective
counterpart or to the matrix is the so-called control port. The communication
between the end devices or with the matrix is negotiated through a self-developed
authentication plug-in. This ensures that only G&D devices can establish a connec-
tion based on their UID, serial number and the Trusted Platform Module. The con-
trol port is also used to exchange the respective security keys the KVM-over-IP
matrix generates within matrix operation or the computer module generates within
extender operation for each end device.
8 · G&D VisionXS-IP-F-TypeC-UHR

Werbung

loading