Appendix D: FAQs
310
Security
What kind of encryption does the Dominion KX II use?
The Dominion KX II uses industry-standard (and extremely secure) RC4
or AES encryption, both in its SSL communications as well as its own
data stream. Literally no data is transmitted between remote clients and
the Dominion KX II that is not completely secured by encryption.
Does the Dominion KX II support AES encryption as recommended
by the US Government's NIST and FIPs standards?
The Dominion KX II utilizes the Advanced Encryption Standard (AES)
encryption for added security.
AES is a US government approved cryptographic algorithm that is
recommended by the National Institute of Standards and Technology
(NIST) in the FIPS Standard 197.
Does the Dominion KX II allow encryption of video data? Or does it
only encrypt keyboard and mouse data?
Unlike competing solutions, which only encrypt keyboard and mouse
data, the Dominion KX II does not compromise security; it allows
encryption of keyboard, mouse and video data.
How does the Dominion KX II integrate with external authentication
servers such as Active Directory, RADIUS, or LDAP?
Through a very simple configuration, the Dominion KX II can be set to
forward all authentication requests to an external server such as LDAP,
Active Directory, or RADIUS. For each authenticated user, the Dominion
KX II receives the user group to which that user belongs from the
authentication server. The Dominion KX II then determines the user's
access permissions depending on the user group to which he or she
belongs.
How are usernames and passwords stored?
Should the Dominion KX II's internal authentication capabilities be used,
all sensitive information such as usernames and passwords are stored in
an encrypted format. Literally no one, including Raritan Technical
Support or Product Engineering departments, can retrieve those
usernames and passwords.
Does the Dominion KX II support strong password?
Yes, the Dominion KX II has administrator-configurable, strong password
checking to ensure that user-created passwords meet corporate and/or
government standards and are resistant to brute force hacking.
If the Dominion KX II encryption mode is set to Auto, what level of
encryption is achieved?
Summary of Contents for Dominion KX II
Page 10: ......
Page 14: ...Chapter 1 Introduction 4...
Page 16: ...Chapter 1 Introduction 6 Product Photos Dominion KX II KX2 832...
Page 17: ...Chapter 1 Introduction 7 KX2 864...
Page 89: ...Chapter 4 Virtual Media 79...
Page 111: ...Chapter 6 User Management 101...
Page 144: ...Chapter 7 Device Management 134 3 Click OK...
Page 154: ...Chapter 7 Device Management 144 3 Click OK...
Page 198: ...Chapter 9 Security Management 188 3 You are prompted to confirm the deletion Click OK...
Page 277: ...Appendix B Updating the LDAP Schema 267...
Page 324: ......