HP dc73 HP Blade Workstation Solution Planning Guide - Page 27

Maximizing RGS security

Page 27 highlights

• RGS connections can only be established from the Display Subnet • No RGS Receivers on the Corporate LAN can connect to RGS sessions on the blades. • VPN sessions are likely to come in from the Corporate LAN, limiting external access to blade desktops. • This issue can be fixed by turning on and configuring the link between the data and display LAN switches in the blade enclosure (off by default). 5-2 Maximizing RGS security RGS enables dramatic improvements in data security. In an RGS environment, only display images from the blade workstation are sent to the client computer via the network. The actual application data never leaves the blade workstation. The information that does cross the network (keyboard and mouse events from client, pixels and audio from blade, USB from both) is encrypted with 256-bit AES (Advanced Encryption Standard). The blade workstations themselves can be located in a high-security environment to prevent the physical removal of media or access to I/O ports. With RGS 5.0 and later, HP provides expanded support for remote USB devices. To minimize potential security risks, HP has implemented an Access Control List solution on a group-by-group basis to limit (or eliminate) the USB devices a particular group can mount to the blade workstation from the client. The Blade Workstation Client has recently added Dynamic Domain Name Service (DDNS) with Microsoft Active Directory authentication. Some customers only allow known systems to connect to their network, and maintain that information in Active Directory. In some environments, this may be insufficient. Policies might require physical separation between networks at different security levels to ensure that no data can pass between them. In this case, it may be necessary to use multiple clients with a KVM switch. Network Planning 27

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35

Network Planning 27
RGS connections can only be established from the Display Subnet
No RGS Receivers on the Corporate LAN can connect to RGS sessions on the blades.
VPN sessions are likely to come in from the Corporate LAN, limiting external access to blade desktops.
This issue can be fixed by turning on and configuring the link between the data and display LAN
switches in the blade enclosure (off by default).
5-2 Maximizing RGS security
RGS enables dramatic improvements in data security. In an RGS environment, only display images from the blade
workstation are sent to the client computer via the network. The actual application data never leaves the blade
workstation. The information that does cross the network (keyboard and mouse events from client, pixels and
audio from blade, USB from both) is encrypted with 256-bit AES (Advanced Encryption Standard).
The blade
workstations themselves can be located in a high-security environment to prevent the physical removal of media or
access to I/O ports.
With RGS 5.0 and later, HP provides expanded support for remote USB devices. To minimize potential security
risks, HP has implemented an Access Control List solution on a group-by-group basis to limit (or eliminate) the USB
devices a particular group can mount to the blade workstation from the client.
The Blade Workstation Client has recently added Dynamic Domain Name Service (DDNS) with Microsoft Active
Directory authentication.
Some customers only allow known systems to connect to their network, and maintain that
information in Active Directory.
In some environments, this may be insufficient. Policies might require physical separation between networks at
different security levels to ensure that no data can pass between them.
In this case, it may be necessary to use
multiple clients with a KVM switch.