Dell Precision R5400 Remote Access Device: Task-Based User Guide  - Page 22

USB Security

Page 22 highlights

PCoIP Technology User Guide (Vol I) 10 USB Security PCoIP Technology provides granular security control to authorize and unauthorize USB devices. Note: The USB security is applied in the following priority order (Unauthorized Vendor ID/Product ID has highest priority): 1. Unauthorized Vendor ID/Product ID 2. Authorized Vendor ID/Product ID 3. Unauthorized Device Class/Sub Class/Protocol 4. Authorized Device Class/Sub Class/Protocol Following are three USB authorization/unauthorization examples: • Authorize specific class of printers • Authorize specific vendor/product ID combination • Unauthorize mass storage devices Authorizing USB by Class 1. In the Authorization section, select Add new button. Figure 19: Add new Button 2. When the entry fields expand, select the entry type. As the intent is to authorize device class, select Class. Figure 20: Selecting the Class Entry Type TER0806003 Issue 1 Figure 21: Selecting the Printer 4. If all printers were to be authorized, the sub class and protocol should be left as Any. In this example, only printers supporting a specific protocol are authorized. Select Printer. Figure 22: Selecting the Sub Class 5. Finally the protocol can be selected. Here the desired IEEE 1284.4 compatible bidirectional protocol is chosen, and the USB permissions entry is complete. Figure 23: Selecting the Protocol 3. Next the Device Class must be selected. Select Printer. © 2008 Teradici Corporation 6. Select Add to add changes and Apply to save the changes to FLASH to complete the configuration. Page 22 of 25

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25

PCoIP Technology User Guide (Vol I)
TER0806003 Issue 1
© 2008 Teradici Corporation
Page 22 of 25
10 USB Security
PCoIP Technology provides granular security
control to authorize and unauthorize USB
devices.
Note: The USB security is applied in the
following priority order (Unauthorized Vendor
ID/Product ID has highest priority):
1. Unauthorized Vendor ID/Product ID
2. Authorized Vendor ID/Product ID
3. Unauthorized Device Class/Sub
Class/Protocol
4. Authorized Device Class/Sub Class/Protocol
Following are three USB
authorization/unauthorization examples:
Authorize specific class of printers
Authorize specific vendor/product ID
combination
Unauthorize mass storage devices
Authorizing USB by Class
1. In the Authorization section, select
Add new
button.
Figure 19: Add new Button
2. When the entry fields expand, select the
entry type. As the intent is to authorize device
class, select
Class
.
Figure 20: Selecting the Class Entry Type
3. Next the
Device Class
must be selected.
Select
Printer
.
Figure 21: Selecting the Printer
4. If all printers were to be authorized, the sub
class and protocol should be left as
Any
. In
this example, only printers supporting a
specific protocol are authorized. Select
Printer
.
Figure 22: Selecting the Sub Class
5. Finally the protocol can be selected. Here the
desired
IEEE 1284.4 compatible bidirectional
protocol is chosen, and the USB permissions
entry is complete.
Figure 23: Selecting the Protocol
6. Select
Add
to add changes and
Apply
to
save the changes to FLASH to complete the
configuration.