Remote Port Security Device
User’s Guide
555-024-402
Issue 1
October 1996
Introduction
Page 1-11
System Administration
1
System Administration
The RPSD Lock prevents unauthorized access to the channel used by Lucent
Technologies personnel to perform maintenance and/or to administer your
communications system. When you administer the RPSD, keep in mind that
access via telephone lines is not the only means of breaching the security of your
system. A system can be breached, for example, by physically intercepting lines
and adding unauthorized equipment. RPSD users may need to take many
actions to enhance overall telecommunication security. These actions include,
but are not limited to, providing physical security for RPSD installation sites
(locked rooms, cabinets, etc.) and wiring room sites. Monitor the RPSD System
Activity Log for patterns of activity, such as repeated denied call attempts.
Contact your computer security group for assistance.
!
Security Alert:
The Remote Port Security Device, if properly installed and managed,
provides a significant and substantial barrier to unauthorized access to a
dial-up communication port.
The Remote Port Security Device is not impregnable but is an important
addition to the tools and measures used by system managers to prevent
unauthorized access to dial-up ports.
Time of Day Access
The RPSD Lock can be administered to prevent access from one or more Key or
from all Keys during specified times of day. The default setting is no blockage of
access for any Key user at any time. The administrable parameters are time,
date, and user ID. Up to 14 separate time restrictions (periods of no access) may
be set for any one user ID. Time restrictions may overlap.
For example, you can use this feature to prevent any administration of the
communications system while a system administrator is not present to oversee
the administration. In this instance, you could administer the Lock to block all
users from 6:00 p.m. (18:00 hours using a 24-hour clock format) when the system
administrator leaves the office until 8:00 a.m. (08:00 hours using a 24-hour clock
format) when the system administrator returns to the office.
To specify Time of Day Access, see the instructions for the Change Restriction
command, for the List Restrictions command, and for the User Restrictions
command in Chapter 3.