Compliant Product - Belkin OmniView Secure DVI Dual-Link 2-port (F1DN102D) or 4-port (F1DN104D) KVM Switch
Certificate Date: 11 February 2009
Validation Report Number: CCEVS-VR-VID10305-2009
Product Type: Peripheral Switch
Conformance Claim: EAL4 Augmented with ALC_FLR.3
PP Identifier: Peripheral Sharing Switch for Human Interface Devices Protection Profile, Version 1.2 (Archived)
CC Testing Lab: InfoGard Laboratories, Inc.
The Belkin® OmniView™ Secure DVI Dual-Link KVM Switch allows the sharing of a single set of peripheral components such as keyboard, video monitor, audio signals, and mouse/pointer devices among multiple computers through a standard USB interface. The OmniView Secure DVI Dual-Link KVM offers isolation among the switchable channels to ensure that computers are thoroughly isolated within the boundary of the Belkin Secure KVM and ensures that only a single computer can access the shared peripheral resource set at one time. Dedicated manual switches with LED “switched state” indicators for each channel assure that the channel selection is unambiguously indicated. The Belkin Secure KVM Switch requests the connected peripherals for “plug and play” settings and stores this data internal to the KVM switch, to assure the host computer can quickly access the needed configuration data. In addition, an on-board keyboard/mouse emulator assures that connected computers boot uninterrupted regardless of switched status. The KVM Switch is available in 2 or 4 port models offering switchable connections to 2 or 4 computers through a USB connection. The Belkin OmniView Secure DVI Dual-Link KVM Switch conforms to the Peripheral Sharing Switch (PSS) for Human Interface Devices Protection Profile Version 1.2, dated 21 August 2008.
SECURITY EVALUATION SUMMARY
The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The criteria against which the Belkin OmniView Secure DVI Dual-Link KVM Switch was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1 and International Interpretations effective on 14 February, 2008. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1. InfoGard Laboratories determined that the evaluation assurance level (EAL) for the product is the EAL 4 family of assurance requirements. The product requires no configuration settings to satisfy the security functional requirements defined in the Belkin® OmniView™ Secure DVI Dual-Link KVM Models: F1DN102D F1DN104D Security Target, as the switch is configured during the manufacturing process prior to shipment to the customer. A Validator, on behalf of the CCEVS Validation Body, monitored the evaluation carried out by InfoGard. The evaluation was completed in December 2008. Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report for the Belkin® OmniViewTM Secure DVI Dual-Link KVM Switch, prepared by CCEVS.
It should be noted that Precedent Decision-138 affects the Protection Profile that this TOE conforms with. The customer is urged to review PD-138 (http://www.niap-ccevs.org/cc-scheme/PD/0138.html) as products compliant with this profile may not include mechanisms to ensure that all peripheral memory is cleared when the device is switched between computers. Switching functionality for the Belkin® OmniViewTM Secure DVI Dual-Link KVM Switch includes complete disconnect of the active Host during switching, resulting in the requisite USB reset upon reconnection to the new Host. Through USB enumeration rules, this reset activity eliminates any data stored in a volatile USB buffer within a peripheral device. Any commercially available peripheral (as defined in the referenced Protection Profile) without non volatile memory is assumed to conform to the USB standard.
It is the responsibility of integrators of the switch to assess the risk of information transfer with compliant switches.