SECURE 8/16 PORT KVM COMBINER SWITCHES

Overview
Features
Specifications
Downloads
How to Order

KVM Combiner device models addressed in this page:

  • TC82PHG-3T - Secure 8P DP/HDMI to 2P HDMI Video KVM Combiner
  • TC162PHG-3T - Secure 16P DP/HDMI to 2P HDMI Video KVM Combiner w/fUSB

-------------------------------------------------------------------------------

KVM COMBINER HIGHLIGHTS

When you need to interact with several computers at the same time, typical KVM switches are limiting. Why? Because they only let you view and work on a single computer at a time. 

HSL’s Combiner switch provides you with the flexibility to interact with multiple computers, while letting you:

  • View all computers on one or two displays. It functions as a KVM switch, a scaler, and a multi-viewer – all in one.

  • Move the mouse and keyboard freely between all computers.

It also saves you money, by eliminating the need to purchase and install dedicated, per-computer peripheral sets.

Secure by design

The Combiner’s most important feature is security, HSL’s expertise. Due to its unidirectional architecture, it maintains complete isolation while switching between vulnerable, untrusted, or unauthorized multiple computers and peripherals – preventing data leakage. It blocks threats such as: peripheral exploits, information leaks, eavesdropping, signal transmission, computer malware, hardware, and firmware tampering.

The Combiner switches meet the security requirements demanded by government agencies, military installations, financial institutions, and similar security-sensitive users.

View and control multiple computers simultaneously

With a single Combiner, you can view and control up to four computers at the same time. Cascading Combiners, increases the number up to 16 (4x4) computers on a single or dual display.

 

8-Port System Diagram

 

  • Interact with multiple computers shown on the same display – at the same time – using a single set of USB, audio, keyboard, video, and mouse peripherals.
  • Smoothly switch between computers (Virtual Display Technology):

    Automatically switch control from one computer to another, by dragging the mouse cursor over the computer’s display border. The peripherals then switch to the next computer – with no need to press any buttons.

  • View applications in Ultra High Definition (UHD) 4K video quality:
    Never compromise on video quality. Run graphic-intensive, ultra-high definition applications on all single- and dual-monitor KVM models.

  • Native touch screen support: 

    Interact with all computers connected to a KVM Combiner, using touchscreen gestures. No need to install drivers or software.

  • Flexible screen layout: 

    Resize source scaling and aspect ratio, to create tile, scale, and custom display layouts that fit your needs. Supports screen-duplication and extended-screen view modes.

  • Dual DisplayPort and HDMI connector:
    Connect either DisplayPort or HDMI sources into the same port, with the new dual-source video connector. Eliminates the need for adapters and converters.

  • State-of-the-art conversion scaler:
    Rapidly convert any input and output resolution (up to 4K) to optimal quality display, on a 4K screen, using the built-in scaler.

  • Extremely low latency viewing:
    View the input channel with extra low latency – below 10ms – using the direct mode feature.

 

Keyboard & Mouse Threats Protection

Attack Type Vulnerability Risk
Signal/Virus
  • Programmable components may include malicious code and are vulnerable to manipulation.
  • May include memory chips that can store data
  • Bi-directional keys (Num Lock, Scroll Lock, Cap Lock, Pause Break) can be used to send and decode data between systems
Data leakage from one system to another
Solution Components Solution Highlights 
Unidirectional Optical Data Diodes 
  • Allowing data to flow only in one direction, from the device- to-host computer.
  • Preventing host-to-peripheral data flow eliminates data leakage through the shared peripheral.
  • Preventing host-to-host connectivity isolates all hosts from each other.
Hardware-based Peripheral Isolation per Port
  • Each port is fully isolated from other ports.
Hardcoded HID Filter
  • Accepts only USB HID Devices (Keyboard & Mice) rules out others.
  • Hardcoded ASCII keyboard / mice characters.
  • Incapable of processing any other code than HID-ASCII. 

 

 

Monitor / Display Threats Protection

Attack Type Vulnerability Risk
Signal/Virus
  • Programmable components may include malicious code and are vulnerable to manipulation.
  • Manipulating monitor settings can be used to send and decode data between systems
Data leakage from one system to another
Solution Components Solution Highlights 
Extended Display Identification Data (EDID) Emulation 
  • Prevent direct access to the monitor’s Extended Display Identification Data (EDID).
  • Dedicated, read-only, EDID emulation for each computer provides complete isolation.
No Shared Circuitry
  • Computer video input interfaces are isolated through the use of different electronic components, power and ground domains.
Block Monitor Control Command Set (MCCS)
  • Ignore MCCS commands, so they cannot pass through and exploit the monitor’s internal memory.

 

 

Audio Threats Protection

Attack Type Vulnerability Risk
Signal/Virus/Hot Microphone
  • Programmable components may include malicious code and are vulnerable to manipulation.
  • Manipulated sound card can reprogram a speaker into a microphone to act as an audio reception tool (e.g. microphone).
Data leakage and eavesdropping
Solution Components Solution Highlights 
Unidirectional Diodes 
  • Enforce computer-to-speaker, one-way flow of sound through unidirectional optical data diodes.
  • Prevent re-tasking of the audio line-in (headset/speaker) into a microphone line and thus block eavesdropping attempts by reprograming a speaker to act as an audio reception tool (e.g. microphone).

 

 

USB Threats Protection

Attack Type Vulnerability Risk
Virus
  • Highly popular standard commonly used by computer and mobile users.
  • Provides on-the-fly high speed, bidirectional flow of data to and from the computer.
  • Multifunctional port: numerous device types can connect through the same physical port
  • Programmable components may include malicious code and are vulnerable to manipulation.
  • Can be used to store/inject data.
Data leakage from one system to another
Solution Components Solution Highlights 
Block un-authorized USB
  • Completely block and disable unauthorized USB devices and traffic
Secure & Dedicated Keyboard / Mouse Ports
  • Accepts only USB HID Devices (Keyboard & Mice) rules out others
  • Refer to Keyboard & Mouse threats table for additional information
Biometric/Smart-Card reader support
  • Special secured port (fUSB) for smart-card/biometric reader with patented Freeze function to support user authentication across multiple isolated networks.
Filter USB Peripherals
  • Whitelist and blacklist specific USB devices based on VID/PID characteristics.

 

 

Hardware Tampering Protection

Attack Type Vulnerability Risk
Implant malicious hardware
  • Open product and implant malicious hardware.
Data leakage and eavesdropping
Solution Components Solution Highlights 
Always-ON tamper evident system 
  • Any attempt to open the product enclosure will activate an anti-tamper system making the product inoperable.
Blinking LEDs provide a clear indication of a tampering event.
  • Special holographic tampering evident labels on the product’s enclosure provide a clear visual indication if the product has been opened or compromised.

 

 

Firmware Tampering Protection

Attack Type Vulnerability Risk
Firmware Reprogramming
  • Attempt to reprogram firmware components to include malicious code.
  • Attempt to store/inject data.
Data leakage and eavesdropping
Solution Components Solution Highlights 
Tamper-proof electrical design 
  • There is no access to the product’s firmware or memory through any port.
  • Firmware is permanently stored on a nonreprogrammable Read Only Memory (ROM) to prevent any modification.
  • Firmware integrity is verified through a self-test procedure during power-up. Upon detection of a critical failure the device disables normal operation and provides the user with a clear visual indication of failure.

 

 

SECURE 8/16 PORT KVM COMBINER SWITCHES
Part Number TC82PHG-T3
TC162PHG-T3
No. of Sources 8 16
Console Ports
Displays 2 x HDMI 1.4 2 x HDMI 1.4
Mouse & Keyboard USB Type A USB Type A
fUSB Port N/A USB Type A
Computer ports
Display Type DP/HDMI 2.0 DP/HDMI 2.0
Max Resolution (Input & Output) Supporting UHD 4K resolutions up to 3840x2160 Supporting UHD 4K resolutions up to 3840x2160
Mouse and Keyboard USB Type B USB Type B
Power
  • Power input 100 to 240V AC Internal, 35W Max
  • 2 x Power input 100 to 240V AC Internal, 35W Max
Environmental
  • Operating Temperature: 32° to 104° F (0° to 40° C)
  • Storage Temperature: -4° to 140° F (-20° to 60° C)
  • Humidity: 0-80% RH, non-condensing
Software
  • Supported OS: Windows, Linux, Mac
Regulatory Compliance
  • CE, RCM, FCC class B, VCCI, TUV US, TUV Canada
Security Accreditations
  • Designed to meet with the security requirements demanded by government agencies, military, financial institutions and similar security sensitive customers.
Physical Characteristics
  • Dimensions: 442.5 x 299.7 x 43.6 mm / 17.4 x 11.8 x 1.7 inches
  • Dimensions: 442.5 x 299.7 x 77 mm / 17.4 x 11.8 x 3 inches
Warranty, reliability
  • Product life-cycle 10 years
  • Warranty 2 Years
  Data Sheets File Size Date
Data Sheet - Secure 8/16 Port KVM Combiners Switches

This document provides the specifications for TC82PHG-3T, TC162PHG-3T, Secure 8/16 Port KVM Combiners Switches.

2 MB 17 Apr, 2019
Model Description CPN
TC82PHG-T3 Secure 8P DP/HDMI to 2P HDMI Video KVM Combiner CPN13758
TC162PHG-T3 Secure 16P DP/HDMI to 2P HDMI Video KVM Combiner w/fUSB CPN13759

 

Related Products