Belkin Secure Products Frequently Asked Questions
Table of contents Belkin Secure KVM 2 Security Features Detection of KVM Attacks Functional Features Belkin Secure KM 9 General Information Security Features Functional Features Belkin Secure Desktop Controller Unit (DCU) 10 General Information Functional Features Security Features Belkin Secure Windowing KVM 12 General Information Security Features Functional Features Belkin Secure Product Certification NIAP & NSA-Related Information 14
Belkin Secure KVM Security Features What are the potential security risks when using an unsecure KVM? 3. S erialized, traceable, holographic FIPScompliant labels can be found on the Belkin Secure KVM, providing a visual indication of an external tampering attempt. There are many cases where one user needs to work simultaneously with a few computers, operating at various security levels. Users rely on the KVM used to protect the networks from system breaches and data leakages.
Belkin Secure KVM Security Features Why are the LEDS of the Num Lock and Caps Lock keys disabled? How does the Belkin Secure KVM prevent unauthorized USB peripheral usage? How does the Belkin Secure KVM reduce the risk of user errors? The Belkin Secure KVM is equipped with specific ports for Keyboard and Mouse only. Peripherals connected to USB hubs are not supported to prevent potential hacking or social attack.
Belkin Secure KVM Detection of KVM Attacks Can an intrusion detection system (IDS) or an anti-virus software detect an attack on KVMs? No. The attacks on KVMs are targeted and very particular, the code used in such attacks is written by professionals with specific intentions, taking advantage of KVM and or peripheral device vulnerabilities. In the case of a targeted attack(s) that use Zero Day Vulnerabilities, IDSs and anti-virus software are not efficient to protect the network.
Belkin Secure KVM Detection of KVM Attacks What are the mounting options available for the Belkin Secure KVM? Belkin Secure KVMs with up to four ports can be placed on the user’s desktop, or an optional mounting bracket can be used to allow for under-the-desk, or side-wall mounting.
Belkin Secure KVM Functional Features Do I need to install software with the Belkin Secure KVM? No, there is no need to install any software. Can I/Should I turn off the Belkin Secure KVM? No, there is no need to turn off the KVM. Most Secure KVM products do not have a power switch. The Belkin Secure KVM Product consumes very little power when not used.
Belkin Secure KVM Functional Features Can I prevent the CAC from being switched to specific computers? Yes, on Belkin Secure KVMs that support CAC, each channel CAC port is controlled by a CAC switch next to each channel button on the KVM. Sliding the CAC switch to the left will disable the CAC port from being mapped on that specific channel. In dual-head Secure KVM models, is it possible to have one “row” switching VGA while the other row switches “DVI”? Yes, this is possible.
Belkin Secure KM General Information What is the difference between a KM and a KVM? KVM’s are designed to switch displays, allowing the user to only see and manage one target device at a time. When using a KM switch, users can see all the connected computers, securely, at the same time. A KM switch is a device that switches a single keyboard and mouse between multiple computers.
Belkin Secure KM Functional Features Do I need to install software drivers with the Belkin Secure KM? What operating systems are supported by the Belkin Secure KM switch? The Belkin Secure KM can be easily configured to support dual, triple, or quad head computers through a signed software driver. Single head installations, one monitor per computer, do not require any software installation.
Belkin Secure DCU (Desktop Controller Unit) General Information What is the Belkin Secure DCU device? The Belkin Secure Desktop Controller Unit (DCU) is a remote control device that enables switching of the available computers/networks through a small footprint device on the desktop. The Belkin Secure DCU provides clear indications of the selected channel through numbers, as well as programmable text and color.
Belkin Secure DCU (Desktop Controller Unit) Functional Features Can the Belkin Secure DCU be programmed to present channel names in languages other than English? The F1DN002R and F1DN003R models (with LCD) support network/resource name customization in English, German, French, Spanish, and Russian. Customization of the DCU is to be done at the administrator level only, prior to a deployment to the end-users that will operate the device.
Belkin Secure Windowing KVM General Information What is the difference between a KVM and a Windowing KVM? KVM’s are designed to switch displays, allowing the user to only see and manage one target device at a time. When using a Windowing KVM, the user can work simultaneously across computers at different security levels, without exposing the organization to the risks of information leakage through the KVM.
Belkin Secure Windowing KVM Functional Features Can the Belkin Secure Windowing KVM scale video input? Yes, The Belkin Secure Windowing KVM has an advanced scaling function allowing the user to scale the video source (x 1/2 and x 1/4 smaller) to ensure proper viewing and superb work experience. A user can now fit four full HD sources on a single HD screen by scaling each source, all in real time with no data loss.
Belkin Secure Products NIAP & NSA-Related Information If cables manufactured by another company are used together with the Belkin Secure KVM, does this affect the CC (Common Criteria)? Yes, it is highly recommended to use the Belkin Cables together with the Belkin Secure KVM, in order to meet the security requirements defined by the Common Criteria Protection Profiles. Are Belkin’s Secure KVMs TAAcompliant and GSA-listed? Yes.
Belkin Secure Products NIAP & NSA-Related Information Is the Belkin EAL 2 product less secure than the existing EAL 4 products? No. Belkin’s new Secure DVI-I KVMs are validated to a higher Protection Profile v2.1, which has stricter information assurance (IA) requirements.