Home > ADDER > Extender > ADDERView Secure Digital Standard Manual

ADDERView Secure Digital Standard Manual

    Download as PDF Print this page Share this page

    Have a look at the manual ADDERView Secure Digital Standard Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 78 ADDER manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							AdderView Secure
    User Guide
    
    ERR
    1234
    PWR
    AVSD1002	(2	port)
    AVSD1004	(4	port)}  
    						
    							
    
    
    
    1
    
    
    SECT 1
    Contents
    IMPORTANT: Before using this product .....................................2
    Welcome
    Introduction ........................................................................\
    .........3
    AdderView Secure - features ......................................................4
    Devices used with the AdderView Secure ..................................5
    Keyboard devices ....................................................................5
    Mouse devices ........................................................................\
    .5
    Standard items ........................................................................\
    .....6
    Additional items ........................................................................\
    ..6
    Installation
    Locations ........................................................................\
    ..............7
    Cabling recommendations ..........................................................7
    Tamper-evident seals...................................................................7
    Links overview ........................................................................\
    .....7
    Mounting ........................................................................\
    .............8
    Making connections ....................................................................9
    Connections to computer systems   .......................................9
    Connections to user console peripherals .............................11
    Video display (EDID) information ........................................13
    Connection to power supply ................................................14
    Operation
    Selecting computers ..................................................................15
    Error indicator........................................................................\
    ....15
    Tamper-evident seals.................................................................15
    Further information
    Troubleshooting ........................................................................\
    16
    Summary of threats and solutions ............................................16
    Getting assistance ......................................................................18
    Warranty ........................................................................\
    ............19
    Safety information ....................................................................19
    Lithium battery ........................................................................\
    ..19
    Radio Frequency Energy............................................................20   
    						
    							
    
    
    
    2
    
    
    IMPORTANT: Before using this product
    Prior to use, a prospective user of the product should ensure that indiv\
    iduals 
    with the appropriate authority implement the following objectives in the\
     
    environment where the product is to be used:
    •	 The	operational	environment	procedures	must	ensure	that	all	users	are	duly	
    authorized and possess the necessary privileges to access the informatio\
    n 
    transferred via the product. This should be implemented physically and i\
    n 
    terms of supporting IT infrastructure.
    •	 Operational	procedures	must	(e.g.	re	staff	vetting	and	training)	ensure	
    that, as far as is reasonably possible, the product is received, install\
    ed and 
    managed in accordance with the manufacturer’s directions. This should\
     also 
    ensure that users are not malicious or hostile.
    •	 The	product	should	be	installed	in	an	environment	that	is	physically	secure.
    Additionally, the security office in the organisation purchasing the p\
    roduct 
    should be aware the product is not responsible for security vulnerabilit\
    ies in 
    computers, IT components or peripherals outside its physical boundary. T\
    he 
    security of other system components connected to the product will requir\
    e 
    separate management to ensure IT security best practice.   
    						
    							
    
    
    
    3
    
    
    2341
    PC 2PC 3PC 4PC 1
    SECT 2
    Welcome
    Introduction
    The AdderView Secure range of products are highly robust KVMA switches f\
    or 
    critical applications. When information absolutely must not be leaked be\
    tween 
    systems or networks, the AdderView Secure units combine the necessary 
    isolation with a desirable ease of use. 
    AdderView Secure units are available in two port and four port versions.\
     Both 
    models combine a number of overlapping strategies that are designed and \
    proven to defeat potential points of infiltration or protect against u\
    ser error.  
    Firstly, all channel switching is controlled only from the front panel b\
    uttons. No 
    keyboard or mouse switching commands are permitted and all operations ar\
    e 
    continually monitored by a dedicated sub-system. Any deviation from a st\
    rictly 
    ordered sequence of events will result in an error condition, where all \
    channels 
    are immediately isolated and the operator is informed via a front panel \
    indicator.
    Data Diodes, implemented within hardwired electronic circuitry, rather t\
    han 
    software, are liberally employed to ensure that critical data paths can \
    flow only 
    in one direction. These data diodes ensure that a compromised peripheral\
    , a 
    keyboard for instance, cannot read information back from a connected sys\
    tem in 
    order to transfer such details to another system. Whenever a channel is \
    changed, 
    the connected keyboard and mouse are always powered down and re-initiali\
    zed 
    to provide yet another level of protection against hidden peripheral mal\
    ware.  
    In general, the role of software within the unit has been reduced to an \
    absolute 
    minimum to avoid the possibility of subversive reprogramming. Additional\
    ly, all 
    flash memory has been banished from the design, to be replaced by one-\
    time 
    programmable storage which cannot be altered. 
    The outer casing contains extensive shielding to considerably reduce ele\
    ctromagnetic 
    emissions. Additionally, the casing has been designed with as few apertu\
    res as 
    possible to reduce the possibility of external probing and several prima\
    ry chassis 
    screws are concealed by tamper-evident seals to indicate any unauthorize\
    d 
    internal access. Shielding extends also to the internal circuitry with a\
    ll channels 
    providing a minimum of 60dB crosstalk separation between computer input \
    signals and any signals from the other computers at frequencies up to 10\
    0MHz.
    These are just a few of the many strategies and innovations that have be\
    en 
    combined to ensure separation between differing systems. Numerous other \
    defences lie in wait to defeat any potential threat.     
    Various strategies are employed to ensure complete separation between the switched channels: •	 One-way	Data Diodes are used on keyboard and mouse communication channels so that data isolation does not rely on software.•	 The	keyboard	and	mouse	are	powered	down	and	re-initialized	during	every	channel switch to ensure that they cannot act as transport media for malicious data between computers. •	 Many	aspects	of	operation	are	internally monitored. For instance, if a second channel attempts to open while another	is	still	active,	all	operation	will be instantly halted and an error condition signalled to the user.      
    Hard wired Data Diodes enforce a one-way	flow	on	information.
    Individually	colored	indicators	provide	clear	visual	feedback	about	the	currently selected channel.
    Channel switching is by physical button press only, no keyboard or mouse codes are permitted.
    Common	keyboard,	mouse,	video	monitor and speakers are able to access multiple high security computers/networks, safe in the knowledge that data will not be transferred from one to another, either	by	user	error	or	subversive	attack. 
    The	switching	section	is	hard	wired to allow only one channel to	be	selected	at	any	time.	This	operation is also closely monitored by separate checking circuitry.     
    						
    							
    
    
    
    4
    
    
    ERR
    1234
    PWR
    5V2.0A
    USER CONSOLE
    INDOOR USE O NLY
    4312
    AdderView Secure - features
    The AdderView Secure is housed in an electromagnetically shielded robust\
     casing that measures just [w x d x h] 
    9.25”	x	5.9”	x	1.73”	(235mm	x	150mm	x	44mm)	-	the	height	is	1U	within	a	19”	rack.	All	channel	switching	is	
    achieved solely using the front panel buttons which are clearly indicate\
    d, as are the rear panel connections.
    Switching is controlled solely by the clearly labeled front panel buttonsEach selected channel is represented by an individually colored indicator to provide additional visual feedback.
    Clear error indicationAny unexpected operation	(such	as an attempt to select two channels simultaneously)	will	be	signalled by the ERR indicator, accompanied by complete isolation of all channels. 
    Secure and shielded casingThe casing is shielded to reduce electromagnetic emissions to an absolute minimum, access apertures are minimized and vital access screws have tamper-evident seals.
    Clear and simple connectionsAll connections are clearly marked to avoid any ambiguity. Full dual link DVI/I video	connections	are	provided	and	USB	connections are used throughout for keyboard and mouse links. 
    5V2.0AINDOOR USE O NLY
    21
    12
    2	port	version
    2	port	version   
    						
    							
    
    
    
    5
    
    
    Devices used with the AdderView Secure
    Keyboard devices
    The keyboard used with the switch must be approved against the security \
    policy	of	your	organization	and	must	be	plugged	directly	into	the	switch’s	USB	
    keyboard port with no adapters or converters.
    During the life of the product, the user should make periodic checks to \
    ensure 
    that	the	keyboard	remains	directly	connected	into	the	switch’s	USB	keyboard	
    port. 
    The keyboard is powered down and reset at every switchover to clear stor\
    ed 
    states.
    Mouse devices
    Although pointing devices don’t generally process confidential data and are 
    therefore considered to pose a lower risk, you should ensure that the mo\
    use 
    used with the switch is approved against the security policy of your org\
    anization 
    and	plugged	directly	into	the	switch’s	USB	mouse	port	with	no	adapters	or	
    converters. 
    The mouse is powered down and reset at every switchover to clear stored \
    states.
    5V2.0 AINDOOR USE O NLY
    USE R  C O NSO LE
    4 2
    3
    1
    U
    SE R CO NSO LE
    5V2.0 AINDOOR USE O NLY
    USE R  C O NSO LE
    4 2
    3
    1
    U
    SE R C ONSO LE   
    						
    							
    
    
    
    6
    
    
    ERR
    12 34
    PWR
    5V, 2A Power supply plus country-specific	mains	cable
    Standard itemsAdditional items
    AdderView Secure unitAVSD1002   (2 port)AVSD1004  (4 port)
    Installation	CD-ROM
    Rack	bracketsIncluding four screws   
    						
    							
    
    
    
    7
    
    
    Installation
    Locations
    Please consider the following important points when planning the locatio\
    n of 
    the AdderView Secure unit:
    •	 Situate	the	unit	close	to	the	host	computers	to	which	it	will	be	connected	
    and also the user console peripherals. 
    •	 The	unit	requires	a	power	supply	input,	so	a	nearby	spare	mains	power	
    outlet will be required. 
    •	 As	keyboard	and	mouse	switching	codes	are	not	possible	for	security	reasons,	
    the only way to change channels is via the front panel buttons. Therefore, the 
    unit should be easily accessible from the user’s normal position.     
    •	 Please	consult	the	precautions	listed	within	the	Safety information section.
    Cabling recommendations
    It is vitally important to use good quality shielded cables to minimize \
    the 
    risk of signal emissions that may be intercepted. Please follow the foll\
    owing 
    recommendations when specifying cables: 
    •	 DVI	cables	-	should	be	braid	and	foil	shielded.		
    •	 VGA	cables	-	should	be	braid	and	foil	shielded.	If	DVI-I	to	VGA	style	adapters	
    are used these should be of the fully ‘canned’ variety. 
    •	 USB	cables	-	should	be	braid	and	foil	shielded.		
    •	 Audio	cables	-	should	be	braid	shielded	with	fully	shielded	connectors	(not	
    unshielded	connectors	with	drain	wires).	
    We strongly recommend that you fit ferrite cores at both ends of every\
     cable to 
    further assist with emission suppression. 
    Tamper-evident seals
    The primary casing access screws are pre-fitted with tamper-evident se\
    als. It 
    may be a policy of your organization to fit proprietary tamper-evident\
     labels 
    across certain chassis screws. Additionally, seals could be added betwee\
    n each 
    connection and the unit to highlight any connections that have been alte\
    red.
    IMPORTANT:	Do	not	use	the	unit	if	the	tamper-evident	seals	are	
    damaged. Do not use if there are any signs of damage to the unit or its \
    power supply.
    SECT 3
    Links overview
    The rear panel of the unit is well marked, however, the diagram below of\
    fers 
    additional clarity on how best to arrange your connections.
    You may have noticed that the indicators on the front panel use differen\
    t 
    colors to represent the various channels. This is done to provide quick \
    and 
    effective visual feedback to the operator. Channel 1 has a green indicat\
    or 
    and is traditionally used for the lowest security connection. The fina\
    l channel, 
    numbered	2	on	the	two	port	version	and	4	of	the	four	port	version,	uses	a	red	
    indicator and is usually connected to the highest security connection. T\
    hese are 
    configuration conventions only and are offered as a suggestion - there\
     are no 
    technical differences in the operational specifications of the four ch\
    annels.  
    43
    5V2.0A
    USER CONSOLE
    INDOOR USE O NLY
    12
    Channel 1  (green indicator)Usually	used	for connection to the lowest security computer/network.
    Channel 4  (red indicator)Usually	used	for connection to the highest security computer/network.
    Console connectionsConnect directly to the operator’s keyboard, mouse, video display and speakers.
    Channel 3  (amber  indicator)
    Channel 2  (blue  indicator or red indicator on two channel models)    
    						
    							
    
    
    
    8
    
    
    Mounting
    The AdderView Secure unit offers two main mounting methods:
    •	Supplied	four	self-adhesive	rubber	feet
    •	Optional	rack	brackets
    5V2.0AINDOOR USE O NLY
    1
    USER CONSOLE
    4   
    						
    							
    
    
    
    9
    
    
    Making connections
    Connections to the AdderView Secure unit do not need to follow the preci\
    se 
    order given in this user guide, although if one or more systems must be \
    hot-
    plugged, connect these after all other connections have been made.
    IMPORTANT: All rear panel connectors are clearly marked, however, take g\
    reat 
    care not to cross connect any links or devices. You are recommended to c\
    onnect 
    all of the input and output links within one channel before proceeding t\
    o the 
    next channel.
    Note: In order to minimize signal emissions, you are strongly recommende\
    d to 
    use good quality shielded cables throughout and to fit ferrite cores a\
    t each end 
    of every cable. 
    Connections to computer systems  
    To	connect	a	keyboard	and	mouse	link	
    1  Wherever possible, ensure that power is disconnected from the unit and t\
    he 
    host	computer(s)	to	be	connected.
    To	connect	an	audio	link	
    1  Wherever possible, ensure that power is disconnected from the unit and t\
    he 
    host	computer(s)	to	be	connected.
    2	 At	the	rear	panel	of	the	unit,	choose	the	appropriate	channel	group	(1	to	4)	
    and connect an audio link cable to the socket marked  
    2	 At	the	rear	panel	of	the	unit,	choose	the	appropriate	channel	group	(1	to	4)	
    and	connect	a	USB	link	cable	(square	type-B	plug)	to	the	socket	marked	  
    3	 Attach	the	other	end	of	the	USB	link	cable	to	a	vacant	USB	socket	of	the	
    appropriate	host	computer	(this	will	most	probably	require	a	rectangular	
    type-A	USB	plug).
    3 Attach the other end of the audio link cable to the speaker socket of th\
    e 
    appropriate system.
    5V2.0AINDOOR USE O NLY
    2
    1
    5V2.0AINDOOR USE O NLY
    2
    1   
    						
    All ADDER manuals Comments (0)

    Related Manuals for ADDERView Secure Digital Standard Manual