SECURE 2/4 PORT KVM COMBINER SWITCHES

Overview
Features
Specifications
Downloads
How to Order

KVM Combiner device models addressed in this page:

  • SC42DU-3 - Secure 4P to 2P DVI Video KVM Combiner w/fUSB
  • SC42DHU-3 - Secure 4P DVI to 2P HDMI Video KVM Combiner w/fUSB
  • SC21H-3 - Secure 2-Port HDMI Video KVM Combiner

-------------------------------------------------------------------------------

KVM COMBINER HIGHLIGHTS

The KVM Combiner switch offered by HSL provides increased productivity in challenging multi-computer environments where users are required to view and interact with several computers at the same time. Optimize user experience while maintaining the highest isolation between computers and peripherals.

Obviate the need for purchasing and installing dedicated, per-computer peripheral sets.

Secure by design

HSL KVM Combiner switches are designed to meet with the security requirements demanded by government agencies, military, financial institutions and similar security sensitive customers.

Securely share peripherals across different security domains

Securely share peripherals between computers that belong to different security classifications levels while keeping the highest possible data separation security.

Prevent information leaks

Obstacle threats derived from sharing and switching of vulnerable, untrusted or unauthorized peripheral devices. Block peripheral exploits, information leaks, eavesdropping, signal transmission, computer malware, hardware and firmware tampering by enforcing multilayered security mechanisms.

View and control multiple computers simultaneously

Present and work with up to 4 computers at the same time. Cascade combiners to view and control up to 16 (4x4) computers on a single or dual displays.

Filter USB Peripherals

Block unauthorized USB devices while allowing secure switching of smart card and biometric authentication devices between computers. Whitelist and blacklist specific USB devices based on VID/PID characteristics.

 

2-Port System Diagram

 

4-Port System Diagram

  • Interact with multiple computers presented on the same display at the same time using a single set of USB, audio, keyboard, video and mouse peripherals.
  • Freeze USB (SC42DU-3, SC42DHU-3):
    Assign the USB port to a specific computer while switching the keyboard, video, mouse and audio between other computers. Useful for various scenarios, for instance, when a USB smart card reader  must remain mapped to a certain computer.
  • Smoothly switch between computers (Virtual Display Technology):
    Automatically switch control from one computer to another by dragging the mouse cursor over the computer’s display border. Peripherals switch to the next computer without hav‌ing to press any buttons once the mouse is passing the display border.
  • View applications in Ultra High Definition (UHD) 4K video quality:
    Never compromise on video quality. Run graphic-intensive, ultrahigh definition applications on all single and dual monitor KVM models.
  • Avoid typing mistakes:
    Since two-way communication is blocked by the KVM security, keyboard lock LEDs do not function. Help users avoid typing mistakes by visually indicating the status of keyboard locks (CAPS-LOCK | NUM LOCK | SCROLL LOCK) on the product’s front facing panel.
  • Native touch screen support: 
    Interact with all the computers that are connected to the KVM Combiner using
    touch screen gestures. No need to install any driver or software.
  • Flexible screen layout: 
    Resize source scaling and aspect ratio to create Tile, Scale and Custom display layouts that fit user needs. Support screen duplication & extended screen view modes.

 

Keyboard & Mouse Threats Protection

Attack Type Vulnerability Risk
Signal/Virus
  • Programmable components may include malicious code and are vulnerable to manipulation.
  • May include memory chips that can store data
  • Bi-directional keys (Num Lock, Scroll Lock, Cap Lock, Pause Break) can be used to send and decode data between systems
Data leakage from one system to another
Solution Components Solution Highlights 
Unidirectional Optical Data Diodes 
  • Allowing data to flow only in one direction, from the device- to-host computer.
  • Preventing host-to-peripheral data flow eliminates data leakage through the shared peripheral.
  • Preventing host-to-host connectivity isolates all hosts from each other.
Hardware-based Peripheral Isolation per Port
  • Each port is fully isolated from other ports.
Hardcoded HID Filter
  • Accepts only USB HID Devices (Keyboard & Mice) rules out others.
  • Hardcoded ASCII keyboard / mice characters.
  • Incapable of processing any other code than HID-ASCII. 

 

 

Monitor / Display Threats Protection

Attack Type Vulnerability Risk
Signal/Virus
  • Programmable components may include malicious code and are vulnerable to manipulation.
  • Manipulating monitor settings can be used to send and decode data between systems
Data leakage from one system to another
Solution Components Solution Highlights 
Extended Display Identification Data (EDID) Emulation 
  • Prevent direct access to the monitor’s Extended Display Identification Data (EDID).
  • Dedicated, read-only, EDID emulation for each computer provides complete isolation.
No Shared Circuitry
  • Computer video input interfaces are isolated through the use of different electronic components, power and ground domains.
Block Monitor Control Command Set (MCCS)
  • Ignore MCCS commands, so they cannot pass through and exploit the monitor’s internal memory.

 

 

Audio Threats Protection

Attack Type Vulnerability Risk
Signal/Virus/Hot Microphone
  • Programmable components may include malicious code and are vulnerable to manipulation.
  • Manipulated sound card can reprogram a speaker into a microphone to act as an audio reception tool (e.g. microphone).
Data leakage and eavesdropping
Solution Components Solution Highlights 
Unidirectional Diodes 
  • Enforce computer-to-speaker, one-way flow of sound through unidirectional optical data diodes.
  • Prevent re-tasking of the audio line-in (headset/speaker) into a microphone line and thus block eavesdropping attempts by reprograming a speaker to act as an audio reception tool (e.g. microphone).

 

 

USB Threats Protection

Attack Type Vulnerability Risk
Virus
  • Highly popular standard commonly used by computer and mobile users.
  • Provides on-the-fly high speed, bidirectional flow of data to and from the computer.
  • Multifunctional port: numerous device types can connect through the same physical port
  • Programmable components may include malicious code and are vulnerable to manipulation.
  • Can be used to store/inject data.
Data leakage from one system to another
Solution Components Solution Highlights 
Block un-authorized USB
  • Completely block and disable unauthorized USB devices and traffic
Secure & Dedicated Keyboard / Mouse Ports
  • Accepts only USB HID Devices (Keyboard & Mice) rules out others
  • Refer to Keyboard & Mouse threats table for additional information
Biometric/Smart-Card reader support
  • Special secured port (fUSB) for smart-card/biometric reader with patented Freeze function to support user authentication across multiple isolated networks.
Filter USB Peripherals
  • Whitelist and blacklist specific USB devices based on VID/PID characteristics.

 

 

Hardware Tampering Protection

Attack Type Vulnerability Risk
Implant malicious hardware
  • Open product and implant malicious hardware.
Data leakage and eavesdropping
Solution Components Solution Highlights 
Always-ON tamper evident system 
  • Any attempt to open the product enclosure will activate an anti-tamper system making the product inoperable.
Blinking LEDs provide a clear indication of a tampering event.
  • Special holographic tampering evident labels on the product’s enclosure provide a clear visual indication if the product has been opened or compromised.

 

 

Firmware Tampering Protection

Attack Type Vulnerability Risk
Firmware Reprogramming
  • Attempt to reprogram firmware components to include malicious code.
  • Attempt to store/inject data.
Data leakage and eavesdropping
Solution Components Solution Highlights 
Tamper-proof electrical design 
  • There is no access to the product’s firmware or memory through any port.
  • Firmware is permanently stored on a nonreprogrammable Read Only Memory (ROM) to prevent any modification.
  • Firmware integrity is verified through a self-test procedure during power-up. Upon detection of a critical failure the device disables normal operation and provides the user with a clear visual indication of failure.

 

 

SECURE 2/4 PORT KVM COMBINER SWITCHES
Part Number SC42DU-3 SC42DHU-3 SC21H-3
No. of Sources 4 4 2
Console Ports 
Displays 2 x DVI-I, single-link / dual-link 2 x HDMI 1.4 1 x HDMI 1.4
Max Output Resolution UHD 4K - 3840X2160 @ 30 Hz (via DVI to HDMI cable) DVI dual-link - 2560X1600 @ 60 Hz (via DVI cable) Supporting UHD 4K resolutions up to 3840x2160 Supporting UHD 4K resolutions up to 3840x2160
Mouse & Keyboard USB Type A, PS/2 USB Type A, PS/2 USB Type A
Audio Jack 3.5 mm Jack 3.5 mm Jack 3.5 mm Jack
fUSB Port USB Type A USB Type A N/A
Computer ports
Display Type 1 x DVI-I, single-link/dual-link 1 x DVI-I, single-link/dual-link 1 x HDMI 1.4
Max Input Resolution 1920x1200 1920x1200 1920x1200
Mouse and Keyboard USB Type B USB Type B USB Type B
Audio Jack 3.5 mm Jack 3.5 mm Jack 3.5 mm Jack
fUSB Ports USB Type B USB Type B N/A
Power
  • Power input 100 to 240V AC Internal, 35W Max
  • Power input 100 to 240V AC External, 12V DC, 1.5A
Environmental
  • Operating Temperature: 32° to 104° F (0° to 40° C)
  • Storage Temperature: -4° to 140° F (-20° to 60° C)
  • Humidity: 0-80% RH, non-condensing
Software
  • Supported OS: Windows, Linux, Mac
Regulatory Compliance
  • CE, RCM, FCC class B, VCCI, TUV US, TUV Canada
Security Accreditations
  • Designed to meet with the security requirements demanded by government agencies, military, financial institutions and similar security sensitive customers.
Physical Characteristics
  • Dimensions: 342 x 148 x 42 mm / 13.4 x 5.8 x 1.6 inches
  • Device weight: 1.61 kg (3.5 lbs)
  • Dimensions: 177 x 82 x 35 mm / 6.9 x 3.2 x 1.3 inches
  • Device weight: 0.52 kg (1.1 lbs)
Warranty, reliability
  • Product life-cycle 10 years
  • Warranty 2 Years
  Installation Guides File Size Date
Installation Guide - 2/4 Ports High Security KVM Combiner Switches

This guide includes instructs for installing HSL Combiner SC21H-3, SC42DU-3, SC42DHU-3, SC42PHU-3 devices.

993 KB 17 May, 2017

 
  Quick Setup Guides File Size Date
Quick Setup Guide - Secure 2/4 Port KVM Combiners Switches

This guide instructs how to install, configure and operate a Secure HSL 2/4 Port KVM Combiners switches.

3 MB 25 May, 2017

 
  Presentations File Size Date
Presentation - HSL Secure 2/4 Port KVM Combiners Switches

This document covers the technical and sales aspects of HSL KVM Combiners Switches Product Line.

6 MB 17 May, 2017

 
  Data Sheets File Size Date
Data Sheet - Secure 2/4 Port KVM Combiners Switches

This document provides the specifications for SC42DU-3, SC42DHU-3, SC21H-3 Secure 2/4 Port KVM Combiners Switches.

953 KB 17 May, 2017

Model Description CPN
SC42DU-3 Secure 4P to 2P DVI Video KVM Combiner w/fUSB CPN10312
SC42DHU-3 Secure 4P DVI to 2P HDMI Video KVM Combiner w/fUSB CPN10311
SC21H-3 Secure 2-Port HDMI Video KVM Combiner, PP 3.0 CPN10287

 

Related Products