Raritan Computer DKX2-0E-E Server User Manual


 
Appendix D: FAQs
231
Security
Question Answer
What kind of encryption
does Dominion KX II
use?
Dominion KX II uses industry-standard (and extremely secure) 128-bit
RC4 or AES encryption, both in its SSL communications as well as its
own data stream. Literally no data is transmitted between remote
clients and Dominion KX II that is not completely secured by
encryption.
Does Dominion KX II
support AES encryption
as recommended by the
US Government's NIST
and FIPs standards?
The Dominion KX II utilizes the Advanced Encryption Standard (AES)
encryption for added security.
AES is a US government approved cryptographic algorithm that is
recommended by the National Institute of Standards and Technology
(NIST) in the FIPS Standard 197.
Does Dominion KX II
allow encryption of
video data? Or does it
only encrypt keyboard
and mouse data?
Unlike competing solutions, which only encrypt keyboard and mouse
data, Dominion KX II does not compromise security - it allows
encryption of keyboard, mouse and video data.
How does Dominion KX
II integrate with external
authentication servers
such as Active Directory,
RADIUS, or LDAP?
Through a very simple configuration, Dominion KX II can be set to
forward all authentication requests to an external server such as LDAP,
Active Directory, or RADIUS. For each authenticated user, Dominion
KX II receives from the authentication server the user group to which
that user belongs. Dominion KX II then determines the user's access
permissions depending on the user group to which he or she belongs.
How are usernames and
passwords stored?
Should Dominion KX II's internal authentication capabilities be used,
all sensitive information such as usernames and passwords are stored
in an encrypted format. Literally no one, including Raritan technical
support or Product Engineering departments, can retrieve those
usernames and passwords.
Does Dominion KX II
support strong
password?
Yes. The Dominion KX II has administrator-configurable, strong
password checking to ensure that user-created passwords meet
corporate and/or government standards and are resistant to brute force
hacking.