AVSV1002 Adder Secure 2 Port EAL2+ USB & VGA Secure KVM Switch

£450.00 inc VAT

Adder AVSV1002 2 port EAL4+, EAL2+ Accredited & TEMPEST USB and VGA Secure KVM switch Independantly tested against common criteria and  achieves Evaluation Assurance Level 4+. CERTIFICATION REPORT No. CRP259. It is hardwired so that data Diodes, implemented within hard-wired electronic circuitry, rather than software, are liberally employed to ensure that critical data paths can flow only in one direction. These data diodes ensure that a compromised peripheral, a keyboard for instance, cannot read information back from a connected system in order to transfer such details to another system. Whenever a channel is changed, the connected.

Data Sheet

Manual

Description

The AVSV1002 is part of AdderView Secure range of products that are highly robust KVM switches for critical applications. When information absolutely must not be leaked between systems or networks, the ADDERView AVSV1002 Secure KVM switch combines the necessary isolation with a desirable ease of use.

ADDERView AVSV1002 Secure unit combines a number of overlapping strategies that are designed to defeat potential points of infiltration or protect against user error.

The outer casing in the AdderView AVSV1002 contains extensive shielding to considerably reduce electromagnetic emissions. Additionally, the casing has been designed with as few apertures as possible to reduce the possibility of external probing and several primary chassis screws are concealed by tamper-evident seals to indicate any unauthorized internal access. Shielding extends also to the internal circuitry with strong levels of electrical crosstalk isolation between ports to protect against signals from one computer becoming detectable on another.

  • TEMPEST Qualified: Tempest certified design (USA NSTISSAM Level I and NATO SDIP-27 Level A).
  • EAL4+ Certified
  • EAL2+ Certified
  • Harwired Port isolation
  • No critical software reliance
  • Minimal emission design
  • Physical port identification

Available in both 2 port & 4 port versions.

Hardware compatibility

Compatible with all known platforms featuring VGA video and USB HID or PS/2connectivity.

OS compatibility

All known software and operating systems including Windows (all), DOS, Linux, Unix,BSD, Sun OS, Solaris, Mac OS, NetWare etc.

Computer connections at switch

2 x USB HID (Keyboard/Mouse), HD-15VGA, 2 or 4 x system link connection.

Physical design

Compact case, robust metal construction, extensive shielding.

Power connection

100-240 VAC 47/63Hz

Operating temperature

0 to 40 deg C / 32 to 104 deg F

Approvals

EAL4+, CE, FCC
Tempest qualified design
Common Criteria EAL4+ Certification

Order Codes

AVSV1002-XX:  Secure KVM Switch with USB, VGA, 2 port
AVSV1004-XX: Secure KVM Switch with USB, VGA, 4 port

XX= Mains Lead Country Code:
UK = United Kingdom
US = United States
EURO = Europe
AUS = Australia

Additional Accessories

The special cables available for connections to each system are carefully constructed with braid and foil to provide excellent screening against signal emissions that could otherwise be eavesdropped. A similarly constructed cable is also available for the monitor connection (VSCD9). The special cables already have ferrite cores fitted to assist with signal suppression. For USB peripheral connections, we strongly recommend that (if not already fitted) you attach ferrite cores to those cables to further assist with emission suppression.

VSCD5: Shielded link cable (VGA, PS/2 keyboard, PS/2 mouse), length 1.8m/6ft
VSCD7: Shielded link cable (VGA, USB keyboard/mouse), length 1.8m/6ft
VSCD9: Shielded link cable (VGA only), length 1.8m/6ft
RMK4: Rackmount kit (234mm wide, 1U products)

TEMPEST qualified

Tempest certified design (USA NSTISSAM Level I and NATO SDIP-27 Level A).

EAL4+ certified

Independantly tested against common criteria, the AVSD achieves Evaluation Assurance Level 4+. CERTIFICATION REPORT No. CRP259

EAL2+ certified

EAL2+ Common Criteria Evaluation Assurance Level 2 (augmented by ALC_FLR.2) COMMON CRITERIA (ISO 15408) ASSURANCE LEVEL and Peripheral Sharing Switch (PSS) For Human Interface Devices Protection Profile, IAD, Version 2.1, 7 September 2010. CERTIFICATION REPORT No. CRP268

Hardwired port isolation

Data Diodes, implemented within hard-wired electronic circuitry, rather than software, are liberally employed to ensure that critical data paths can flow only in one direction. These data diodes ensure that a compromised peripheral, a keyboard for instance, cannot read information back from a connected system in order to transfer such details to another system. Whenever a channel is changed, the connected

keyboard and mouse are always powered down and re-initialized to provide yet another level of protection against hidden peripheral malware.

No critical software reliance

In general, the role of software within the unit has been reduced to an absolute minimum to avoid the possibility of subversive reprogramming. Additionally, all flash memory has been banished from all security critical areas of the design, to be replaced by one-time programmable storage which cannot be altered.

Minimal emission design

The outer casing contains extensive shielding to considerably reduce electromagnetic emissions. Additionally, the casing has been designed with as few apertures as possible to reduce the possibility of external probing and several primary chassis screws are concealed by tamper-evident seals to indicate any unauthorized internal access. Shielding extends also to the internal circuitry with strong levels of electrical crosstalk isolation between ports to protect against signals from one computer becoming detectable on another.

Physical port identification

ADDERView Secure units are available in two port and four port sizes. Each size can be ordered in standard and enhanced versions. The enhanced versions allow you to attach a smart card reader that can be securely shared between the connected systems. The enhanced versions also contain anti-subversion and authentication features that guard against intrusion and allow you to prove that the unit is genuine, respectively. These are just a few of the many strategies and innovations that have been combined to reinforce the separation between differing systems. Numerous other defences lie in wait to defeat potential threats.

You may also like…

Title

Go to Top