How does the USB over IP solution work?
USB over IP software works by encapsulating the data sent from a device and transferring it to remote computers over a TCP/IP network. Transmitted data is received and de-encapsulated by a virtual USB port created by the software tool.
When using a USB over TCP/IP tool, the software needs to be installed on the computer with a physical connection to the USB device as well as on the remote client machines that require access to the peripherals.
The virtualization of USB ports performed by USB over IP software enables computers without physical interfaces to access and control USB devices.
The list of the types of equipment that can be shared and accessed remotely with this kind of software solution is extensive and includes:
- Printers, scanners, and smart card readers;
- Cameras and other audio/video devices;
- Personal healthcare and diagnostic equipment;
- HID devices, USB hubs, and game controllers;
- Mass storage devices and USB security dongles.
Unique FlexiHub features
FlexiHub has many features that make it an attractive USB over IP solution. In many usage scenarios, these features make it a more effective tool than a USB over IP freeware application.
Secure Connections
FlexiHub implements secure USB data transmission with 2048-bit SSL encryption. This feature keeps your data safe by making it unreadable by unauthorized third parties.
Automatic Device Detection
FlexiHub detects and displays information regarding connected devices automatically for easier identification of shared resources.
Proxy Server
FlexiHub has a set of proxy servers that enable connected computers to detect and access remote devices without a public IP address.
Data Compressing
Higher data transfer rates and reduced bandwidth consumption are possible by having FlexiHub compress data before transmission.
Creating Login Tokens
This USB over IP software lets you create a secure login token that can be shared with other users. The token enables users to connect to shared USB devices without providing them with login credentials.
Lock Devices
Devices can be locked with FlexiHub which makes them unavailable to remote network-connected client computers. Locked devices will not appear on FlexiHub’s list of available devices.