Dell Precision R5400 Remote Access Device: Administrator's User Manual& - Page 39

Unauthorized Devices

Page 39 highlights

TERA1x00 PC-over-IP Administrative Interface User Manual TER0606004 Issue 3 ID Class VID PID Device Class Sub Class Protocol 0-FFFF, asterisk (*) indicates any vendor ID 0-FFFF 0-FF, asterisk (*) indicates any device class 0-FF, asterisk (*) indicates any device sub class 0-FF, asterisk (*) indicates any protocol authorized Drop-down menu provides human-readable translations of the known device classes Drop-down menu provides human-readable translations of the known device sub classes Drop-down menu provides human-readable translations of the known protocols 1.6.1.2 Unauthorized Devices The Unauthorized Devices section allows specifying the unauthorized USB devices for the Portal. There are two buttons to allow customization of this "black list". The Add new button allows adding a new device or device group, while the Remove button allows its removal. Selecting the Add new button allows USB unauthorization by Class or ID. If Class is selected, then this entry unauthorizes a USB device by Device Class, Sub Class and Protocol. If ID is selected, then this entry unauthorizes a USB device by Vendor ID and Product ID. Note: The USB authorization/unauthorization is applied in the following priority order (Unauthorized Vendor ID/Product ID has highest priority): 1. Unauthorized Vendor ID/Product ID 2. Authorized Vendor ID/Product ID 3. Unauthorized Device Class/Sub Class/Protocol 4. Authorized Device Class/Sub Class/Protocol Table 4 summarizes the USB unauthorization entry types and the associated data fields. Table 5: USB Device Unauthorization Entry Types Entry Type Required Hexadecimal Value Fields Comments ID VID 0-FFFF, asterisk (*) indicates any vendor ID PID 0-FFFF Class Device Class 0-FF, asterisk (*) indicates any device class Drop-down menu provides human-readable translations of the known device classes © 2008 Teradici Corporation Page 39 of 111

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111

TERA1x00 PC-over-IP Administrative Interface User Manual
TER0606004 Issue 3
© 2008 Teradici Corporation
Page 39 of 111
VID
0-FFFF, asterisk (*)
indicates any vendor ID
ID
PID
0-FFFF
Device
Class
0-FF, asterisk (*)
indicates any device
class
Drop-down menu provides
human-readable translations of
the known device classes
Sub
Class
0-FF, asterisk (*)
indicates any device sub
class
Drop-down menu provides
human-readable translations of
the known device sub classes
Class
Protocol
0-FF, asterisk (*)
indicates any protocol
authorized
Drop-down menu provides
human-readable translations of
the known protocols
1.6.1.2 Unauthorized Devices
The
Unauthorized Devices
section allows specifying the unauthorized USB devices
for the Portal.
There are two buttons to allow customization of this “black list”.
The
Add new
button allows adding a new device or device group, while the
Remove
button allows its removal.
Selecting the
Add new
button allows USB unauthorization by
Class
or
ID
.
If
Class
is selected, then this entry unauthorizes a USB device by
Device Class
,
Sub Class
and
Protocol
.
If
ID
is selected, then this entry unauthorizes a USB device by
Vendor ID
and
Product ID
.
Note: The USB authorization/unauthorization is applied in the following priority order
(Unauthorized Vendor ID/Product ID has highest priority):
1. Unauthorized Vendor ID/Product ID
2. Authorized Vendor ID/Product ID
3. Unauthorized Device Class/Sub Class/Protocol
4. Authorized Device Class/Sub Class/Protocol
Table 4 summarizes the USB unauthorization entry types and the associated data
fields.
Table 5: USB Device Unauthorization Entry Types
Entry
Type
Required
Fields
Hexadecimal Value
Comments
VID
0-FFFF, asterisk (*)
indicates any vendor ID
ID
PID
0-FFFF
Class
Device
Class
0-FF, asterisk (*)
indicates any device
class
Drop-down menu provides
human-readable translations of
the known device classes