Herunterladen Diese Seite drucken

G&D VisionXS-IP-F-TypeC-UHR Installation Und Bedienung Seite 157

Werbung

Verfügbare Sprachen

Verfügbare Sprachen

Secure KVM-over-IP solution
Trusted Computing Platform
The bootloader, the operating system and the firmware of the devices form a
Trusted Computing Platform. Based on a core component complying with the
FIPS140-2 security standard, an integrated Trusted Platform module secures all
access and configuration data against third-party spying or manipulation. Here, an
RSA encryption method with a key length of 2048 bits is used.
Sensitive data such as login information and passwords are stored permanently and
encrypted in the database of the ControlCenter-IP or ControlCenter-IP-XS within
matrix operation or in the database of the computer module within extender opera-
tion. This database is implemented in G&D's operating system, is TPM-protected
and with the ControlCenter-IP additionally based on a hardware raid. Possible firm-
ware modifications can be detected at an early stage, leading to an interruption of
the boot process. Thus, any attempts at manipulation, such as smuggling in a key-
board sniffer, are prevented.
TPM ensures that a device is only booted with software that has been classified as
trustworthy by the manufacturer.
Monitoring, SNMP and Syslog
Monitoring and SNMP features enable system administrators to monitor the status
of devices installed and peripherals connected. Any information is provided via the
web interface of the respective devices. Permanent detection and reporting makes it
possible to react at an early stage to critical conditions such as exceeding tempera-
tures, loss of communication on the keyboard interface, or a compromised redun-
dancy system. This preemptively prevents system failures, increases the system's
availability and allows operators and system administrators to work more effi-
ciently.
Syslog (System Logging Protocol) is used to generate various events in response to
changing conditions. The events are logged locally and can be checked and ana-
lyzed by an administrator. The syslog messages can also be sent to a syslog server.
Syslog can be used, for example, to log relevant system changes, logins and login
failures.
Update and Backup/Restore
Configuration settings can be saved using the backup function. With the auto
backup function an automatic backup can be saved on a network drive at a defined
interval. This means there ist no need to make a manual backup after a configura-
tion option has been changed. Backed-up data can be restored using the restore
function.
10 · G&D VisionXS-IP-F-TypeC-UHR

Werbung

loading