User manual
PC-over-IP Administrative
Interface User Manual
38
button allows a new device or device group to be added to the list and the Remove
button allows a device or device group to be removed from the list.
Selecting the Add new button allows USB authorization by ID or Class. If ID is selected,
then this entry authorizes a USB device by Vendor ID and Product ID. If Class is
selected, then this entry authorizes a USB device by Device Class, Sub Class and
Protocol.
Note: USB authorizations are applied in the following priority order:
1. Unauthorized Vendor ID/Product ID (highest priority)
2. Authorized Vendor ID/Product ID
3. Unauthorized Device Class/Sub Class/Protocol
4. Authorized Device Class/Sub Class/Protocol (lowest priority)
Table 1-9 summarizes the USB authorization entry type and the associated data fields.
Table 1-9: USB Device Authorization Entry Types
Entry
Type
Required
Fields
Hexadecimal Value Comments
ID VID 0-FFFF
PID 0-FFFF
Class Device
Class
0-FF; asterisk (*) indicates
any device class
Drop-down menu provides
human-readable translations of
the known device classes
Sub Class 0-FF; asterisk (*) indicates
any device sub class
Drop-down menu provides
human-readable translations of
the known device sub classes
Protocol 0-FF; asterisk (*) indicates
any protocol authorized
Drop-down menu provides
human-readable translations of
the known protocols
1.7.1.2 Unauthorized Devices
The Unauthorized Devices section allows the administrator to specify the unauthorized
USB devices for the Portal. Two buttons allow customization of this “black list.” The Add
new button allows a new device or device group to be added to the list and the Remove
button allows a device or device group to be removed from the list.
Selecting the Add new button allows USB unauthorization by Class or ID. If ID is
selected, then this entry unauthorizes a USB device by Vendor ID and Product ID. If
Class is selected, then this entry unauthorizes a USB device by Device Class, Sub Class
and Protocol.
Note: USB authorizations are applied in the following priority order:
1. Unauthorized Vendor ID/Product ID (highest priority)
2. Authorized Vendor ID/Product ID
3. Unauthorized Device Class/Sub Class/Protocol