
9
2. Introduction
2.1 General
Use the Secure Rack Modem for applications that require secure, dial-up access to
console ports on rack-mounted equipment. It can recognize up to 100 passwords,
track activity for each password, and create a log of successful and/or unsuccessful
access attempts.
2.1.1 P
ASSWORD
-P
ROTECTED
A
CCESS
Up to 100 passwords can be stored in the modem’s non-volatile memory. You can
assign each password a user name and a dial back number (it instructs the unit to
call the user at a predefined number before allowing access to the secure device).
A separate system password restricts access to the modem’s command mode. This
allows the system administrator to contact the unit via modem in order to change
parameters or check access activity.
2.1.2 A
CCESS
A
CTIVITY
L
OGS
The modem provides two convenient ways to track access activity: the Audit log and
the Password directory. The Audit log lists the 100 most recent connection
attempts, including the time, date, password entered, port used, call duration, and
reason for disconnect. The Password directory displays user names, passwords and
dial back numbers, and counts the use of each individual password. Only the
System Administrator can view the Audit log and Password directory; callers who
log on with a User Password are not allowed to view these screens.
2.1.3 T
HREE
D
IFFERENT
O
PERATING
M
ODES
The modem provides three distinct operating modes: the User mode, the
Command mode, and the Unsecured mode.
• User mode: Provides password-protected access to the secure device
connected to the Secure Rack Modem’s serial modem port.
• Command mode: Provides password-protected access to the modem’s
Command Menus, which are used to define passwords and select
configuration parameters.
• Unsecured mode: When this mode is activated, the Secure Rack Modem will
function like a normal, unsecured modem; callers are allowed to access the
secure device without entering a password.
CHAPTER 2: Introduction