Black Box SW2006A-USB-EAL 2-Port Secure Single-Head KVM Switch, EAL4+ Certified

Black Box SW2006A-USB-EAL KVM Switch, VGA, USB, EAL2+ EAL4+ Certified, TEMPEST Level I (Level A) Qualified Design, 2-Port
Model: SW2006A-USB-EAL
Availability: 3 - 4 Weeks or Less
Standard Shipping & Handling
Qty: Add to Cart

Black Box SW2006A-USB-EAL KVM Switch, VGA, USB, TEMPEST Level I (Level A)

The SW2006A-USB-EAL Secure KVM Switch with USB, EAL4+ Certified/TEMPEST Level I (Level A) Qualified, VGA, surpasses the security profiles of most other KVM switches. In addition to its superior hardware-based data-isolation features, the switch has been certified for Common Criteria Evaluation Assurance to Level 4+ (EAL4+), augmented by ALC_FLR.2 and ATE_DPT.2. 

The Common Criteria is an international standardized process for information technology security evaluation, validation, and certification. The Common Criteria scheme is supported by the National Security Agency through the National Information Assurance Program (NIAP). EAL4+ itself defines a common set of tests to evaluate the security of an IT product relating to its supply chain, from design and engineering to manufacturing and distribution.

The ServSwitch Secure KVM Switch with USB, EAL4+ Certified/TEMPEST Level I (Level A) Qualified, VGA provides control and separation of two PC CPUs/servers connected to secure and non-secure networks through just one keyboard, monitor, and mouse. Users can safely switch among the connected computers operating at different classification levels without worry. Plus, it is TEMPEST USA NSTISSAM Level I and NATO SDIP-27 Level A qualified. What this means is the low radiated emissions profile of the switch meets the appropriate requirements for conducted/radiated electromagnetic emissions. The TEMPEST designation is required by military organizations. As a security standard, it pertains to technical security countermeasures, standards, and instrumentation that prevent or minimize the exploitation of vulnerable data communications equipment by technical surveillance or eavesdropping.

Threats/Solutions Scenarios - Prevent data leaking between ports and to the outside world

Threat: Microprocessor malfunction or unanticipated software bugs cause data to flow between ports.
Solution: Unidirectional keyboard and mouse data flow is enforced by hardware "data diodes" so data isolation doesn't rely on software integrity.

Threat: Malicious modification of microprocessor software causing data to leak between ports.
Solution: Microprocessors are one-time programmable and soldered on the board. Data isolation does not rely on software; it is ensured by hardware.

Threat: Subversive snooping by detecting electromagnetic radiation emitted from the equipment.
Solution: Carefully shielded metal case with dual shielding in critical areas and a low emissions profile.

Threat: Detection of signals on one computer by monitoring for crosstalk (leakage) signals on another computer.
Solution: No connections to sensitive analog inputs (such as computer microphone ports). Minimum crosstalk separation of 60 dB provided between signals from one computer and input or I/O signals to another.

Threat: Timing analysis attacks (looking at what happens on one port to determine data flow patterns on another).
Solution: Only one computer is connected at a time to any shared circuitry. Links are unidirectional, preventing timing analysis.

Threat: Signaling by shorting the power supply or loading the power.
Solution: Each port is independently powered by its USB port. Shorting the power supply on one port will not cause the power on the other ports to be switched off. The shared keyboard, mouse, and monitor circuitry are powered by the power supply. The lack of a common power supply minimizes electronic signaling.

Threat: Data transfer by using common storage or common RAM.
Solution: Shared circuitry and the keyboard and mouse are powered down at each switchover to clear all volatile memory of any previous connections.

Threat: Physical proximity between ports enables data leakage.
Solution: Isolation is improved by placing the red and black ports at the opposite edges of the switch.

Threat: Accidental port switching
Solution: Locked-down operation disables all keyboard hotkey and mouse switching functions in both software and hardware so that data corruption can't inadvertently cause an unanticipated channel change. The only way to change the channels is with the front-panel keys. There is only one button per channel, so channel selection is clear. Color-coded visual feedback confirms the channel selection.

Key Features

  • High port-to-port electrical isolation, which facilitates data separation (RED/BLACK)
  • The low radiated emissions profile meets the appropriate national requirements for conducted/radiated electromagnetic emissions
  • Switches are permanently hard wired, preventing access from one CPU to the others or access from one network to others
  • External tamper-evident seals make it easy to spot attempted tampering
  • Channel-to-channel >60-dB crosstalk isolation protects against signal snooping, so software tools and applications cannot be used to access any connected computer from another connected computer
  • Users can safely switch among as many as four computers operating at different classification levels
  • The switches feature a non-Flash-upgradable ROM for security
  • Support DVI-I video, which is DC balanced and may be encoded for security
  • DVI-I video provides exact video quality and also passes analog VGA signals
  • Offer true DDC video support, which can be disabled for installations requiring the highest security
  • Constructed with a solid metal case and a long-wearing switching mechanism
  • Provide robust isolation between networks, so they’re ideal for government applications that access classified networks in addition to public networks such as the Internet

Note

This Black Box product is subject to the International Traffic in Arms Regulations (ITAR). The ITAR (22 CFR parts 120-130) governs the manufacture, export, and temporary import of defense articles, the furnishing of defense services, and brokering activities involving items described on the USML (U.S. Munitions List).

Technology
Transmission DistanceCable length: 6 ft. (1.8 m) or 12 ft. (3.6 m)
Video
ResolutionDigital: 165 MHz per DVI link, dual-link DVI supported; Analog: 1920 x 1280
Power
Rated PowerInput: 100-240 VAC, 50-60 Hz, external, 0.5 amps (maximum) Output: 5 VDC, 2.5 amps (maximum), 12.5 watts
Ratings
RoHS CompliantYes
Download NameFile Size
SW2006A-USB-EAL Data Sheet.pdf442.28KB