Setup guide
Dominion
®
KX II - Frequently Asked Questions
©Copyright Raritan, Inc. 2007 Page 12 of 13 Rev. October 2007
Security
What kind of encryption does
Dominion KX II use?
Dominion KX II uses industry-standard (and extremely secure) 128-bit
RC4 or AES encryption, both in its SSL communications as well as its
own data stream. Literally no data is transmitted between remote
clients and Dominion KX II that is not completely secured by
encryption.
Does Dominion KX II support
AES encryption as
recommended by the US
Government’s NIST and FIPs
standards?
The Dominion KX II utilizes the Advanced Encryption Standard (AES)
encryption for added security.
AES is a US government approved cryptographic algorithm that is
recommended by the National Institute of Standards and Technology
(NIST) in the FIPS Standard 197.
Does Dominion KX II allow
encryption of video data? Or
does it only encrypt keyboard
and mouse data?
Unlike competing solutions, which only encrypt keyboard and mouse
data, Dominion KX II does not compromise security - it allows
encryption of keyboard, mouse and video data.
How does Dominion KX II
integrate with external
authentication servers such
as Active Directory®,
RADIUS, or LDAP?
Through a very simple configuration, Dominion KX II can be set to
forward all authentication requests to an external server such as
LDAP, Active Directory or RADIUS. For each authenticated user,
Dominion KX II receives from the authentication server the user group
to which that user belongs. Dominion KX II then determines the user’s
access permissions depending on what user group to which he or she
belongs.
How are usernames and
passwords stored?
Should Dominion KX II’s internal authentication capabilities be used,
all sensitive information such as usernames and passwords are stored
in an encrypted format. Literally no one, including Raritan technical
support or Product Engineering departments, can retrieve those
usernames and passwords.
Does Dominion KX II support
strong password?
Yes
. The Dominion KX II has administrator-configurable, strong
password checking to ensure that user created passwords meet
corporate and/or government standards and are resistant to brute
force hacking.
Manageability
Can Dominion KX II be
remotely managed and
configured via Web browser?
Yes. Dominion KX II can be completely configured remotely via Web
browser. Note that this does require that the workstation have an
appropriate Java Runtime Environment J.R.E version installed.
Besides the initial setting of Dominion KX II’s IP address, everything
about the solution can be completely set up over the network. (In fact,
using a crossover Ethernet cable and Dominion KX II’s default IP
address, you can even configure the initial settings via Web browser.)
Can I backup and restore
Dominion KX II’s
configuration?
Yes. Dominion KX II’s device and user configurations can be
completely backed up for later restoration in the event of a
catastrophe.
Dominion KX II’s backup and restore functionality can be used
remotely over the network, or through a Web browser.
What auditing or logging
does Dominion KX II offer?
For complete accountability, Dominion KX II logs all major user events
with a date and time stamp. For instance, reported events include (but
are not limited to): user login, user logout, user access of a particular
server, unsuccessful login, configuration changes, etc.
Can Dominion KX II integrate
with syslog?
Yes. In addition to Dominion KX II’s own internal logging capabilities,
Dominion KX II can send all logged events to a centralized syslog
server.
Distributed by Communications Supply Corporation
www.gocsc.com 1.877.462.7279