background image

Remote Port Security Device
User’s Guide  

555-024-402  

Issue 1

October 1996

Key Administration and Use 

Page 4-9

Command Functions 

4

AS—AUX Security

Syntax and Parameters

as

 

or

as on

 

or

as off

 

Description

Use the AUX Security command to enable and disable security on the Key.

NOTE:

Do not enable AUX Security until administrative users are added.

Sample Commands and Responses

To determine the AUX Key status, type 

as

 

.

>AS

AUX Port Security is OFF

To enable AUX Security, type 

as on

 

.

>AS ON

008 02/14/95 05:32:04 AUX Port Security is ON

To disable AUX Security, type 

as off

 

.

>AS OFF

014 02/14/95 04:20:53 AUX Port Security is OFF

Parameter

Description

as

The AUX Security command to view the security 
status of the Key

as on

The AUX Security command to enable AUX 
security on the Key

as off

The AUX Security command to disable AUX 
security on the Key

ENTER

ENTER

ENTER

ENTER

ENTER

ENTER

Содержание 555-024-402

Страница 1: ...555 024 402 Comcode 107748717 Issue 1 October 1996 Remote Port Security Device User s Guide ...

Страница 2: ...t 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment This equipment generates uses and can radiate radio frequen cy energy and if not installed and used in accordance with the instruction manual may cause harmful interference to radio communications However there is no guarantee that...

Страница 3: ...ation and Operational Procedures xvii Federal Communication Commission FCC Electromagnetic Interference Information xviii About This Book xix Intended Audiences xix Responsibilities xix Terms and Conventions xx Typographical Conventions xxi How to Use This Book xxi Product Safety Labels xxii Related Documents xxii How to Comment on This Document xxii 1 Introduction 1 1 RPSD System 1 2 Hardware Com...

Страница 4: ...nstalling the RPSD Lock 2 5 Installing the RPSD Key 2 16 Testing an Uninitialized Key 2 18 Initializing the RPSD Lock 2 18 Initializing the RPSD Key 2 19 Testing the RPSD Lock Installation 2 20 3 RPSD System Administration 3 1 Menu of Commands 3 2 Command Functions 3 5 A Add User 3 6 AH Access History 3 11 AA Administrative Access History 3 14 AF Administrative Failure History 3 17 AS AUX Security...

Страница 5: ... and Use 4 1 RPSD Key User Command Set 4 2 Initialization Functions 4 3 U Set User ID 4 3 K Set Secret Key 4 4 N Set Device Number 4 5 Command Functions 4 6 A Add Administrative User 4 7 AS AUX Security 4 9 C Clock Set 4 10 D Date Set 4 11 H History Display 4 12 I Set Log ID 4 14 L List User Information 4 15 LA List Administrative Users 4 16 Q Quit 4 17 R Remove Administrative User 4 18 S Status D...

Страница 6: ...Page vi 5 Troubleshooting 5 1 Access Failure Messages 5 2 Testing the RPSD Lock 5 6 Built in Diagnostics 5 6 Hardware Replacement 5 9 Replacing the RPSD Lock or Key 5 10 Saving the Key Seed Value 5 11 A Cables Connectors and Ports A 1 B Front Panel LEDs B 1 RPSD Lock B 2 RPSD Key B 3 ...

Страница 7: ... approved accessories Do not install this product near water for example in a wet basement location Do not overload wall outlets as this can result in the risk of fire or electrical shock Do not attach the power supply cord to building surfaces Do not allow anything to rest on the power cord Do not locate this product where the cord will be abused by persons walking on it Unplug the product from t...

Страница 8: ...Remote Port Security Device User s Guide 555 024 402 Issue 1 October 1996 Page x ...

Страница 9: ... the USA only Lucent Technologies provides a toll tree customer Helpline 1 800 242 2121 24 hours a day If you need assistance when installing programming or using your system call the Helpline or your Lucent Technologies authorized representative Outside the USA if you need assistance when installing programming or using your system contact your Lucent Technologies authorized representative ...

Страница 10: ...give any credit for charges that result from unauthorized access To minimize the risk of unauthorized access to your communications system or device When possible restrict the off network capability of off premises callers using calling restrictions Facility Restriction Levels and Disallowed List capabilities When possible block out of hours calling Frequently monitor system call detail reports fo...

Страница 11: ... with no Keys Lucent Technologies will pay for unauthorized calls that occur as a result of access to the system via the remote administration port through the RPSD provided the following conditions are met The RPSD was installed correctly on the remote administration port on the Lucent Technologies communications system and configured at the time of the fraud incident to accept only Lucent Techno...

Страница 12: ...of the fraud incident NOTE In this context correct installation means that the RPSD Lock is installed consistent with installation instructions and in such a way as to deny access in case of power failure The customer provides RPSD documentation to Lucent Technologies showing the time of access and that the access was accomplished via a Lucent Technologies ID The customer provides the communicatio...

Страница 13: ... unit to the factory This warranty is null and void if the manufacturer determines that any modifications have been made to the unit or the unit has been subjected to physical or electrical stress This warranty covers parts and labor only and does not include shipping costs travel expenses or travel time Installation of the equipment is the sole responsibility of the purchaser The manufacturer its...

Страница 14: ...the following The telephone number s you will be using with this equipment The appropriate registration number and ringer equivalence number REN which can be found on the back or bottom of the control unit For each jack the sequence in which lines are to be connected the line types the Facility Interface Code FIC and the Ringer Equivalence Number REN by position when applicable Ringer Equivalence ...

Страница 15: ...mporarily If possible they will notify you in advance But if advance notice is not practical you will be notified as soon as possible You will also be informed of your right to file a complaint with the FCC Changes at Local Telephone Company Your local telephone company may make changes in its facilities equipment operations or procedures that affect the proper functioning of this equipment If the...

Страница 16: ...is equipment has been tested and found to comply with the limits for a Class A digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the ...

Страница 17: ...onnel who administer and maintain the RPSD Lock It is assumed that RPSD system administrators are familiar with menu driven telecommunications hardware components It is also assumed that they understand the need for maintaining security in administering the communications system RPSD Key users are those who dial in to a channel locked with a Lock by using a Key It is assumed that Key users are fam...

Страница 18: ...ters etc is the customer s responsibility If any material is required in addition to the material shipped in the RPSD package it is billable to the customer Terms and Conventions The Remote Port Security Device RPSD Lock is often referred to as the Lock Similarly the RPSD Key is often referred to as the Key Throughout this document toll fraud security hazards are indicated by an exclamation point ...

Страница 19: ...inal connected to the RPSD Lock is referred to as the system administrator s terminal or administration terminal How to Use This Book This is organized into chapters that give information on procedures necessary for the proper installation and administration of your Remote Port Security Device Related Documents later in this section provides a complete list of system documentation together with or...

Страница 20: ...sonal injury or property damage if the hazard is not avoided Related Documents In addition to this book the document listed below is part of the documentation set Within the continental United States order this document from the BCS Publications Fulfillment Center by calling 1 800 457 1235 How to Comment on This Document We welcome your comments both positive and negative Please use the feedback f...

Страница 21: ..._____________________________________________________________________ ___________________________________________________________________________________________ 4 Feel free to write any comments below or on an attached sheet ___________________________________________________________________________________________ __________________________________________________________________________________...

Страница 22: ...Remote Port Security Device User s Guide 555 024 402 Issue 1 October 1996 About This Book Page xxiv How to Comment on This Document ...

Страница 23: ...s a single line dial up port protection system that prevents unauthorized access to a host resource Host resource dial up ports are protected by installing the RPSD Lock on the analog telephone line leading to the port Access is provided only when the calling party uses the RPSD Key a unit installed on the analog telephone line at the calling party end ...

Страница 24: ...ommunications Server ECS all models DIMENSION Other communications systems with dial up ports All voice mail systems Any product that supports analog tip and ring capability With the RPSD Lock and Key system you can set the time of day that access to a port is permitted or you can block any or all access to the line by users of RPSD Keys In addition a system activity log provides a real time recor...

Страница 25: ...incoming call 2 The Lock sends the caller a polling tone If the calling party has an RPSD Key the Key responds with its User ID If there is no Key on the calling end the Lock terminates the call 3 The Lock must recognize the Key s User ID the Lock must be previously initialized with all valid Keys if not the Lock terminates the call 4 Using an algorithm governed by ANSI DES standards the Lock gene...

Страница 26: ... secret encryption key unqiue to the user ID assigned to the Key and encrypts the value the Lock sent Following this the Key calculates the necessary response The Key transmits this expected value to the Lock 7 The Lock compares the Key s response to the expected value it calculated and stored If the Lock receives the precise value it expects it generates ringing and sends the call on to the prote...

Страница 27: ...ve all messages from the Lock to disk The Lucent Technologies personnel who require access to the communications system already have the Keys they need Any additional RPSD Keys for customer use must be ordered separately The hardware components both supplied and otherwise and their requirements are described in the following sections RPSD Lock When you order the RPSD Lock you receive The Lock Powe...

Страница 28: ...RIBER RJ11 port for the central office line labeled TELCO Female DB9 port for the terminal or printer or a modem labeled AUX PORT Alarm leads to connect an external alarm Port for the power supply supplied with the RPSD Lock Figure 1 2 RPSD Lock Power Monitor Function The Power Monitor function allows you to control the behavior of the RPSD during power failure conditions The POWER MONITOR button ...

Страница 29: ...e OUT position for security reasons External Alarm You can connect alarm leads to the screw terminals on the back of the Lock When a Lock failure occurs contacts inside the Lock close and send a signal out the alarm terminals to the communications system or other external alarm You can also use the Power Monitor function to generate a signal failure through the alarm leads without bypassing the RP...

Страница 30: ...PSD Lock works with any modem that can be used with the communications system Similarly the RPSD Key works with any modem that can be used with a terminal NOTE Version 3 of the RPSD Lock and Key works with low and high speed modems up to 28 8 kbps Versions 1 and 2 work only with low speed modems up to 9 6 kbps SUBSCRIBER MODEM TELCO AUX PORT 12VDC 1A Front Back DEFINITY RPSD KEY POWER RING IN CALL...

Страница 31: ...PSD Lock or Key This RS 232 cable is not supplied The AUX PORT is the same port used if a printer is installed You may wish to install a switch to make changing the AUX PORT connection easier for example from a terminal to a printer The terminal should initially be set to 9600 bps and 8 bits no parity These are the factory default settings of the Lock and the Key You may change these parameters la...

Страница 32: ...he software for the RPSD system is contained within the hardware components and does not need to be loaded separately If you are not installing an RPSD Key you need only set the date and time for the RPSD Lock and in the case of multiple Locks a Lock ID If you are installing RPSD Keys you must do some additional initialization on the Lock s ...

Страница 33: ...tantial barrier to unauthorized access to a dial up communication port The Remote Port Security Device is not impregnable but is an important addition to the tools and measures used by system managers to prevent unauthorized access to dial up ports Time of Day Access The RPSD Lock can be administered to prevent access from one or more Key or from all Keys during specified times of day The default ...

Страница 34: ...disconnected As a new message is generated the oldest message in the buffer is deleted The most recent 20 messages are displayed on the first page in real time on the RPSD Lock administration terminal That is the oldest message scrolls off the screen on the administration terminal as the new message is added to the bottom When a printer is connected to the RPSD Lock administration terminal each ne...

Страница 35: ... second means of identifying the calling party lh Log History CC85 000 7 12 96 13 23 18 KEY20 User Removed OK D4E2 001 7 12 96 13 23 51 KEY19 User Added OK A011 002 7 12 96 13 24 12 KEY20 Admin User Added OK 6FD2 003 7 12 96 13 26 51 Call Received 12BB 004 7 12 96 13 26 59 Attempt by KEY20 4321 Failed 4 Blocked User 7EF4 005 7 12 96 13 27 00 KEY20 4321 Disconnected BE31 006 7 12 96 13 27 06 Lucent...

Страница 36: ...g History and how to use the List Statistics command see Chapter 3 RPSD System Administration Single Point Administration You can use a single administration terminal or printer to administer multiple Locks To use a single administration terminal for multiple Locks administer the Locks from teletype tty ports via the UNIX Operating System To use a single printer for multiple Locks connect a printe...

Страница 37: ... message is sent to the Key user s administration terminal To block a Key user or Key users use the Block User command described in the System Administrator Command Set section of Chapter 3 Force Connect Disconnect The RPSD Lock can be forced to connect an incoming call from any source or to disconnect a call in progress A connection can be forced or a call disconnected whether or not the caller i...

Страница 38: ... the INADS system ATT INADS1 ATT INADS2 ATT INADS3 ATT INADS4 User IDs reserved for Key users and engineers at the Technical Services Center in Englewood Colorado all products ATT TSC001 ATT TSC002 User ID reserved for Lucent Technologies personnel at the Tier 3 location at the Denver Works Factory ATT PECC01 User ID reserved for Bell Laboratories field support for System 85 and DEFINITY Enterpris...

Страница 39: ...Page 1 17 System Administration 1 NOTE A single Key can be used to access multiple Locks See the Add User command for the procedure for adding users and the Remove User command for the procedure for removing users both described in the System Administrator Command Set section of Chapter 3 ...

Страница 40: ...Remote Port Security Device User s Guide 555 024 402 Issue 1 October 1996 Introduction Page 1 18 System Administration 1 ...

Страница 41: ... October 1996 2 2 Installation This chapter describes the recommended room layout and environment hardware components installation procedures and testing for the RPSD See Appendix A Cables Connectors and Ports for quick reference materials on the installation of the hardware components ...

Страница 42: ...ck installation label the Locks according to which lines they protect to prevent confusion Power Supply The RPSD Lock and the RPSD Key are both powered by ordinary AC outlets or by AC to 12 VDC coverters connected to AC outlets These need not be grounded three prong outlets If necessary you can use extension cords However it is best to connect the Lock to the Uninterruptible Power Supply UPS conne...

Страница 43: ...rface must be considered To overcome the RS 232 restrictions adjust the baud rate of the administration terminal or other equipment connected to the AUX PORT as follows Cables of 0 to 50 feet a maximum 9600 bps Cables of 50 to 100 feet a maximum of 4800 bps Cables of 100 to 2000 feet a maximum of 2400 bps CAUTION To minimize noise induction cable distance should not exceed 50 feet Set the link spe...

Страница 44: ...no one tries to administer the communications system while the channel is disconnected You can inform the TSC by calling 800 242 2121 and referring to Services Methods Procedures Talkline Case Number 910207 INADS database updates must be performed for the INADS product connection call to be directed through a permanent Lucent Technologies RPSD Key Without INADS updates Lucent Technologies remote m...

Страница 45: ...ferent ways including an RJ11 adapter or a multiple pair gang plug If one is not already present install an RJ11 port on the central office line to facilitate installation of the RPSD Lock and also to make subsequent service easier Label all connections Table 2 1 Cables Connectors and Ports Part From To Modular connector Communications system RJ11 at external modem 7 foot cable with modular connec...

Страница 46: ...terminal via the AUX PORT on the back of the Lock and power it from an AC outlet or Uninterruptible Power Supply UPS On System 85 and DEFINITY Generic 2 the modems are external to the communications system Check that the modems are plugged into the UPS since a power outage that results in either the RPSD Lock or the modem being inaccessible also results in the RMATS channel being inaccessible SUBS...

Страница 47: ...ith RJ11 modular connectors DB9 male to DB25 female cable RS 232 cable Administration terminal for the Lock RPSD Lock power supply AC outlet or outlet on the UPS NOTE NOTE The 7 foot and 14 foot telephone line cords are provided with the RPSD Lock If additional length cords are needed the customer must supply them Connecting the RPSD Lock to the Central Office Line You need the following component...

Страница 48: ...e RMATS channel 2 Locate the central office line for the RMATS port and install an RJ11 receptacle on the central office line 3 Connect one end of the 14 foot telephone line cord with RJ11 connectors to the central office line 4 Plug the RJ11 connector on the other end of the telephone line cord into the TELCO port on the back of the RPSD Lock SUBSCRIBER MODEM TELCO AUX PORT 12VDC 1A ALARM LEADS P...

Страница 49: ...ccompanying that modem The following components are needed to connect the RPSD Lock to the communications system modem RPSD Lock Communications system modem assigned to the RMATS channel 7 foot line cord with RJ11 connectors To connect the RPSD Lock to the communications system modem follow these steps see Figure 2 3 1 Using the 7 foot line cord with RJ11 connectors on both ends insert one connect...

Страница 50: ... 024 402 Issue 1 October 1996 Installation Page 2 10 Installation 2 Figure 2 3 RPSD Lock to Modem SUBSCRIBER MODEM TELCO AUX PORT 12VDC 1A ALARM LEADS POWER MONITOR RED GREEN BYPASS SECURE Communications System Modem RJ11 Connector RJ11 Connector ...

Страница 51: ... end NOTE NOTE Install an A B switch if you are going to connect both a terminal and a printer This enables the administrator to change equipment without the trouble of disconnecting and reconnecting the plugs Follow the directions for connecting a terminal to the AUX PORT to install the A B switch To connect the RPSD Lock to the administration terminal or printer follow these steps see Figure 2 4...

Страница 52: ...n Obtain further information for the terminal or printer from the documentation accompanying them Figure 2 5 and Figure 2 6 illustrate the pin cable connections from the DB25 end of the Lock or Key cable to data terminal equipment DTE and data communications equipment DCE SUBSCRIBER MODEM TELCO AUX PORT 12VDC 1A ALARM LEADS POWER MONITOR RED GREEN BYPASS SECURE DB9 9 Pin DB25 25 Pin Adapter RPSD A...

Страница 53: ...ary Port Terminal and Printer Pinouts DB9 DB25 Signal To DTE DB25 Pin To DCE DB25 Pin 1 Not used 2 2 TXD input 2 3 3 3 RXD output 3 2 7 4 RTS input 4 6 8 5 CTS output 5 5 6 6 DSR output 6 4 5 7 Ground 7 7 1 8 CD output 8 20 9 Positive Test Voltage 10 19 Not used 4 20 DTR input 20 8 21 Not used 9 22 RI output 22 22 23 25 Not used ...

Страница 54: ...25 End of the Cable to DTE Figure 2 6 Connections from DB25 End of Cable to DCE RPSD DCE 2 3 4 5 6 7 8 20 22 2 3 4 5 6 7 8 20 22 Transmit Data Receive Data Request to Send Clear to Send Data Set Ready Signal Ground Data Carrier Detect Data Terminal Ready Ring Indicator Terminal or Printer DTE RPSD DCE 2 3 4 5 6 7 8 20 2 3 4 5 6 7 8 20 Printer DCE ...

Страница 55: ... other end into an AC wall outlet or an available outlet on the UPS see Figure 2 10 The red Power LED on the front panel of the Lock goes on and remains on while the other LEDs on the front panel of the Lock should blink three times and then settle into a Locked condition If there is any failure of the LEDs for example they do not blink three times or the Power light does not come on the Lock is d...

Страница 56: ...ed to provide Alarm Lead connections for alarming RPSD Key failures Refer to External Alarm earlier in this chapter Connecting the RPSD Key to the Terminal The RPSD Key is connected to the terminal via the AUX PORT on the back of the Key and the terminal s RS 232 port See Table 2 2 for the pinouts for the AUX PORT connection The AUX PORT for the Key is connected in the same manner as the AUX PORT ...

Страница 57: ... of the Key The following components are needed to connect the Key to the caller s modem RPSD Key Modem 7 foot line cord with RJ11 connectors To connect the Key to the caller s modem follow these steps see Figure 2 3 the connection is the same for the Key as for the Lock 1 Using the 7 foot line cord with RJ11 connectors on both ends insert one connector into the SUBSCRIBER port on the back of the ...

Страница 58: ...ated RPSD Lock either directly via the telephone or via an application on the terminal If the connection is good the yellow VERIFY light comes on first followed by the green CONNECTION light This should occur in less than 30 seconds The CONNECTION LED remains lit until the call is ended If the connection fails the red IDLE light comes on Initializing the RPSD Lock Initialization of the RPSD Lock i...

Страница 59: ...ed on the RPSD Lock See Chapter 4 Key Administration and Use for the Set Communications Parameters command to change the default settings if desired on the RPSD Key Initializing the RPSD Key Initialization of an RPSD Key involves both the Key and the RPSD Lock On the Lock you must add the Key User ID in question by using the Add User command See System Administrator Command Set in Chapter 3 for th...

Страница 60: ...s functioning properly 3 Have the technical support center call the RMATS channel If access is successful the installation is working properly If access is unsuccessful refer to Chapter 5 Troubleshooting After a successful access of the port has shown the Lock to be working properly try dialing out through the RMATS channel via the Lock If you have trouble with making an outgoing call the tip and ...

Страница 61: ...rs may take many actions to enhance overall telecommunication security These actions include but are not limited to providing physical security for RPSD installation sites locked rooms cabinets etc and wiring room sites Monitor the RPSD System Activity Log for patterns of activity such as repeated denied call attempts Contact your computer security group for assistance NOTE Save the seed value for...

Страница 62: ...ystem administrator is shown in Figure 3 1 Figure 3 1 Menu of Commands NOTE The menu of Commands is available at any time by pressing on the RPSD administration terminal The commands are not case sensitive Menu of Commands A Add User LH Log History FC Force Connect B Block User AH Access History FD Force Disconnect U Unblock User FH Failure History T Test User AA Admin Access Hist D Date Set R Rem...

Страница 63: ...rial port Set Comm Parameters page 3 47 Add administrative RPSD Key non administrative user to Lock Add User page 3 6 Determine code to be matched by a code from the user Test User page 3 50 Enable or disable security on the AUX administrative port AUX Security page 3 19 Specify time restrictions for access to the Lock Change Restrictions page 3 22 Assign specified time restrictions to users User ...

Страница 64: ...age 3 44 User information lists List user ID whether the user is blocked user type permanent administrative RPSD Key non administrative password or passkey requirement for administrative users and assigned restrictions List User Table page 3 36 List specific time periods and days during which time restrictions may be placed on one or more users List Restrictions page 3 32 Show whether a user is bl...

Страница 65: ...duration of the call Access History page 3 11 List the details of the last 500 failed access attempts including Message Authentication Code message sequence number date time user ID device number and failure reason Failure History page 3 26 List the details of the last 100 administrative access attempts including Message Authentication Code message sequence number date time user ID and duration of...

Страница 66: ... is not case sensitive secret_key The the pre defined number of up to 14 hexadecimal digits used to administer a single Key for multiple Locks This parameter can be specified by the system administrator or randomly assigned by the Lock If this field is omitted the field must be delimited by a comma it is randomly generated by the Lock a The administrative user designation authentication _ mode Ide...

Страница 67: ... Denver Works Factory ATT PECC01 User ID reserved for Bell Laboratories field support for System 85 and DEFINITY Enterprise Communications Server ECS Generic 2 ATT LABS01 User ID reserved for Bell Laboratories field support for System 75 and DEFINITY ECS Generic 1 ATT LABS02 User ID reserved for Bell Laboratories field support for AUDIX ATT LABS03 In addition to normal access capabilities administ...

Страница 68: ...ame secret key information is used when adding that Key to other Locks The information is used to generate the test response The secret key chosen by the administrator is the key information to be added to the RPSD Key If this option is not used the RPSD Lock generates the secret key information randomly The RPSD Lock returns secret information and a test response when a user is added This informa...

Страница 69: ... parameter specified Adding an administrative user requiring password authentication a KEY20 JPLock01 443 08 12 96 13 14 22 KEY20 User Added OK Enter this secret key into the RPSD Key Unit F37B 159D 6ABE 3E Test Response is 8119704 a KEY20 F47B159D6ABE3E JPLock02 443 08 14 96 01 57 43 KEY21 User Added OK Enter this secret key into the RPSD Key Unit F47B 159D 6ABE 3E Test Response is 4296425 a JOE ...

Страница 70: ...the existing passkey can be entered so a new one does not have to be assigned a KEY20 ak JPLock02 443 08 14 96 01 57 43 KEY21 Admin User Added OK Enter These Digits into PassKey as Key1 or Key2 7652 0034 2106 4704 3320 Test Challenge 1234567 Reply 832 5113 a KEY20 58940085427656086626 ak JPLock02 443 08 14 96 01 57 43 KEY20 Admin User Added OK Enter These Digits into PassKey as Key1 or Key2 5894 0...

Страница 71: ...message sequence number 20 to a page More to Come appears at the bottom of the each page except the last page and End of List appears at the bottom of the last page Press to move from page to page When you reach the last page indicated by End of List press to return to the menu of commands When you want to capture a long Access History to a file on a computer include the ALL parameter Page breaks ...

Страница 72: ... 06 Outdial 0 5 08 D4E2 003 08 16 96 15 20 51 Outdial 0 2 14 12BB 004 08 16 96 15 24 19 ATT INADS2 72333 0 8 46 7EF4 005 08 16 96 15 48 01 ATT INADS2 72333 0 1 59 BE31 006 08 16 96 15 58 23 KEY11 82545 0 7 22 A3F3 007 08 16 96 16 08 51 KEY11 82545 0 3 20 4C23 008 08 17 96 08 08 18 Outdial 0 9 49 DD52 009 08 17 96 08 28 13 ATT INADS1 12345 0 28 11 21CC 010 08 17 96 08 58 37 ATT INADS1 12345 0 1 02 ...

Страница 73: ...h status message The messages are numbered in sequence from 000 to 999 and then restart at 000 Date The date that the access took place Time The time that the access call came in User ID The user ID of the Key used to access the RMATS channel If the call was an outgoing call on the channel no user ID is displayed but the call is identified as Outdial Device The device number of the Key used to acc...

Страница 74: ... More to Come appears at the bottom of the each page except the last page and End of List appears at the bottom of the last page Press to move from page to page When you reach the last page indicated by End of List press to return to the menu of commands When you want to capture a long Administrative Access History to a file on a computer include the ALL parameter Page breaks are removed and the e...

Страница 75: ... 16 96 13 09 42 KEY11 1 20 33 CC34 002 08 16 96 15 12 06 KEY20 0 5 08 D4E2 003 08 16 96 15 20 51 KEY20 0 2 14 12BB 004 08 16 96 15 24 19 ATT INADS2 0 8 46 7EF4 005 08 16 96 15 48 01 ATT INADS2 0 1 59 BE31 006 08 16 96 15 58 23 KEY11 0 7 22 A3F3 007 08 16 96 16 08 51 KEY11 0 3 20 4C23 008 08 17 96 08 08 18 KEY20 0 9 49 DD52 009 08 17 96 08 28 13 ATT INADS1 0 28 11 21CC 010 08 17 96 08 58 37 ATT INA...

Страница 76: ...e code is generated to protect the integrity of the Administrative Access History The Message Authentication Code is followed by a period and the sequence number of each status message The messages are numbered in sequence from 000 to 999 and then restart at 000 Date The date that the access took place Time The time that the access call came in User ID The user ID of the administrative Key used to...

Страница 77: ...More to Come appears at the bottom of the each page except the last page and End of List appears at the bottom of the last page Press to move from page to page When you reach the last page indicated by End of List page press to return to the menu of commands When you want to capture a long Administrative Failure History to a file on a computer include the ALL parameter Page breaks are removed and ...

Страница 78: ...erated to protect the integrity of the Failure History The Message Authentication Code is followed by a period and the sequence number of each status message The messages are numbered in sequence from 000 to 999 and then restart at 000 Date The date of the access failure Time The time of the access failure User ID The user ID of the RPSD Key used to attempt to access the channel Device The device ...

Страница 79: ...ON and no administrative users have been added an appropriate warning message will be displayed when the RPSD system is powered up When AUX Port security is disabled administrative access to the RPSD system is allowed without authentication by any terminal connected to the AUX port When AUX Port security is enabled the administrative user must press twice to activate an administrative session and ...

Страница 80: ...s high When the administrative session is terminated the Carrier Detect Signal CD goes low for one second If DTR goes low during an administrative session the session is terminated Sample Command and Response Determining AUX port status AUX Security command with no arguments Enabling AUX Security Disabling AUX Security NOTE When the current administrative session is completed by using the Quit com...

Страница 81: ...h permanent and non permanent users may be blocked To determine whether a user is already blocked use the List User Table command see instructions on page 3 34 Sample Command and Response Parameter Description b Block User command user_id A unique identifier assigned to each user by the system administrator using the Add User command Use the List User Table command to check user IDs see instructio...

Страница 82: ...ng the User Restrictions command described on page 3 52 start hh mm The beginning time of the restriction in 24 hour clock format You must use the colon as a separator between the hours and minutes You must also use a leading zero 0 to enter any time that is less than 10 00 for example 08 00 end hh mm The ending time of the restriction in 24 hour clock format You must use the colon as a separator ...

Страница 83: ...from time 00 00 to time Y on the next day For example if you want to restrict access from 8 00 p m on a Thursday until 8 00 a m on a Friday restrict access from 20 00 on Thursday until 24 00 on Thursday and then restrict access from 00 00 on Friday until 08 00 on Friday Also when you use the User Restrictions command assign both of these restrictions to users you want to restrict from overnight ac...

Страница 84: ...Lock is installed ensures the accuracy of the System Activity Log Also the clock is used by the Lock to activate and deactivate defined time restrictions Sample Command and Response Parameter Description c Clock Set command hh mm The current time in 24 hour clock format You must use the colon as a separator between the hours and minutes You must also use a leading zero 0 to enter any time that is ...

Страница 85: ... installed ensures the accuracy of the System Activity Log Sample Command and Response Parameter Description d Date Set command mm dd yy The date in month day and year format Use the slash as a separator between the month day and year Also use two digits for the month day and year entries Include a leading zero 0 to enter any month or day that is less than 10 and use only the last two digits of th...

Страница 86: ... 20 to a page More to Come appears at the bottom of the each page except the last page and End of List appears at the bottom of the last page Press to move from page to page When you reach the last page indicated by End of List page press to return to the menu of commands When you want to capture a long Failure History to a file on a computer include the ALL parameter Page breaks are removed and t...

Страница 87: ...45 4 A011 002 08 16 96 15 12 06 KEY20 73647 1 6FD2 003 08 16 96 15 20 51 KEY20 73647 8 12BB 004 08 16 96 15 24 19 ATT INADS2 72333 7 7EF4 005 08 16 96 15 48 01 ATT INADS2 72333 5 BE31 006 08 16 96 15 58 23 KEY11 82545 9 AEF3 007 08 16 96 16 08 51 KEY11 82545 2 4C23 008 08 17 96 08 08 18 ATT INADS4 66600 6 DD52 009 08 17 96 08 28 13 ATT INADS1 12345 5 21CC 010 08 17 96 08 58 37 ATT INADS1 12345 8 6...

Страница 88: ... number of each status message The messages are numbered in sequence from 000 to 999 and then restart at 000 Date The date of the access failure Time The time of the access failure User ID The user ID of the RPSD Key used to access the channel Device The device number of the RPSD Key used to access the channel The device number is a number assigned to the Key by the Key user at initialization Reas...

Страница 89: ... issued When you issue the Force Connect command the Lock will request confirmation To confirm the command type y to cancel the command type n If you issue the command when there is no call attempting to connect an error message is displayed Security Alert Use of the FC command provides a call with connection to the protected resource bypassing the security normally provided by the Lock Use this c...

Страница 90: ...igher priority call When you issue the Force Disconnect command the Lock will request confirmation To confirm the command type y to cancel the command type n If you issue the command when no call is in progress an error message is displayed Sample Command and Response Parameter Description fd Force Disconnect command ENTER JPLock01 195 08 17 96 14 23 55 Call Received JPLock01 196 08 17 96 14 24 04...

Страница 91: ...en more than one Lock is in operation The Lock s ID is added to the beginning of status messages to identify the Lock concerned Sample Command and Response In the sample the log ID is added to the beginning of the status message It will appear here on all status messages once the ID is set Parameter Description i ID Set command log_id The name you select to identify the Lock The Log ID is limited ...

Страница 92: ...ods can be created each is assigned a single character code from A to N Use the Change Restrictions command to set the restriction time periods and to associate a code letter to each period of time and day defined see instructions on page 3 22 Then apply the code to a specific user or users using the User Restriction command see instructions on page 3 52 Parameter Description lr List Restrictions ...

Страница 93: ...fy the specific time periods and days during which time restrictions can be placed on one or more users Start Time The time of day in 24 hour clock format when the restriction begins End Time The time of day in 24 hour clock format when the restriction ends Days of the Week The days on which the restricted times take effect lr Restriction ID Start Time End Time Days of Week A 18 00 24 00 Sat Sun B...

Страница 94: ... users and permanent users Call attempts and failures to the administrative interface are updated only if AUX security is enabled See instructions for the Key AUX Security command in the Command Functions section of Chapter 4 Sample Command and Response Parameter Description ls List Statistics command ENTER ls RPSD Lock Access Attempt Statistics Last Reset 08 14 96 Since Last Reset Cumulative RPSD...

Страница 95: ...y authenticated by the Lock both since the last time the statistics were reset and cumulatively since the Lock was installed Failed Attempts by Reason The number of times that a caller failed in an access attempt for each of the nine failure reasons The statistics are broken down into the number of failures since the last reset for RPSD Key non administrative and administrative users and also the ...

Страница 96: ... assigned to the user The information is listed about all users if no user ID is specified about a specified user if the full user ID is given or about all users beginning with the character s that is entered For example if you enter a information is listed for all user IDs beginning with the letter a Parameter Description l List User command full_ or_ partial_user_ id A unique identifier assigned...

Страница 97: ...r type which determines access level and the authentication mode The user types are P Permanent reserved for Lucent Technologies personnel R RPSD Key normal access level A Administrative can change Lock parameters For administrative users only W Password required for access K Passkey required for access User type P is followed by either R or A to identify access levels for permanent users Restrict...

Страница 98: ...ered as the full_or_partial_user_id parameter Information is listed for the specified user only fields included on the screen are described on page 3 37 User ID Blocked User Type Restriction s ATT INADS1 PR A B ATT INADS2 PR B ATT INADS3 PR ATT INADS4 PR ATT PECC01 PR ATT TIER3G PR ATT LABS01 PR ATT LABS02 PR ATT LABS03 PR ATT TSC001 PR ATT TSC002 PR KEY11 R A KEY12 B R C KEY13 B R D KEY14 AW A B ...

Страница 99: ...a partial user ID entered as the full_or_partial_user_id parameter Information is listed for all users beginning with the characters entered fields included on the screen are described on page 3 37 1 KEY User ID Blocked User Type Restriction s KEY11 R A KEY12 B R C KEY13 B R D KEY14 AW A B KEY15 AW D KEY16 AK A KEY17 AK A KEY18 B R A KEY19 R A ...

Страница 100: ...s are undergoing unexplained access failures or are failing for reasons 2 3 or 5 of Table 3 2 on page 3 43 report it to Lucent Technologies To protect the integrity of the Log History a Message Authentication Code is generated and shown on the Log History for each entry on the System Activity Log The Message Authentication Code is followed by a period and the sequence number of the message for exa...

Страница 101: ... the last page indicated by End of List page press to return to the menu of commands When you want to capture a long History Log to a file on a computer include the ALL parameter Page breaks are removed and the entire Log History is listed To pause the report shown on the screen press To resume the report on the screen press again To capture a Log History use a communications software package such...

Страница 102: ...age lh Log History CC85 000 7 12 96 13 23 18 KEY20 User Removed OK D4E2 001 7 12 96 13 23 51 KEY19 User Added OK A011 002 7 12 96 13 24 12 KEY20 Admin User Added OK 6FD2 003 7 12 96 13 26 51 Call Received 12BB 004 7 12 96 13 26 59 Attempt by KEY20 4321 Failed 4 Blocked User 7EF4 005 7 12 96 13 27 00 KEY20 4321 Disconnected BE31 006 7 12 96 13 27 06 Lucent RPSD Lock V1 0 Idle Locked A3F3 007 7 12 9...

Страница 103: ...tatus Message Meaning 1 No RPSD Key Detected No RPSD Key was detected on the caller s line 2 No Response No response was returned from the RPSD Key when the RPSD Lock sent the challenge 3 Invalid User ID The RPSD Key user s ID is not in the table of users on the RPSD Lock 4 Blocked User The RPSD Key user was deliberately blocked by the administrator on the RPSD Lock 5 Invalid Response The RPSD Key...

Страница 104: ...rative users must press twice and use a password or passkey to begin a new administrative session Security Alert It is recommended that you use the Quit command to terminate all administrative sessions to prevent unauthorized administrative access NOTE AUX Security must be enabled before an administrative session can be activated Sample Command and Response Parameter Description Q Quit command ENT...

Страница 105: ...secret key information was retained In such a case the Key does not need to be reinitialized See the Initializing an RPSD Key in Chapter 2 for the procedure When a Remove User command is issued the RPSD Lock requests a y or an n as confirmation of the removal To check the user IDs or to check for permanent status use the List User Table command see instructions on page 3 34 Sample Command and Resp...

Страница 106: ...on Use the Reset Statistics command to reset the access attempts statistics to zero This command does not reset cumulative totals Use the List Statistics command to obtain the access attempts statistics see instructions on page 3 34 Sample Command and Response Parameter Description rs Reset Statistics command ENTER rs Are You Sure Y N y JPLock01 447 08 14 96 14 20 43 Statistics Reset ...

Страница 107: ...er Description sc Set Communications Parameters command speed length_ parity The communications link speed in bits per second bps and the character length in bps and parity on the serial port The options for speed are 300 600 1200 2400 4800 9600 or 19200 bps trailing zeros may be omitted for example you can enter 24 for 2400 bps If either speed or length_ parity are omitted the current entry is le...

Страница 108: ...on st Status Display command Lucent Technologies RPSD JPLock01 The version number of the equipment Firmware The version number of the firmware Init Code Where and when the device was initialized Current Date The current date If the date is wrong you can correct it by using the Date Set command see instructions on page 3 31 Time The current time If the time is wrong you can correct it by using the ...

Страница 109: ... RPSD Lock To set a Log ID use the ID Set command see instructions on page 3 31 Comms Set to The setting of the communications parameters To change the communications parameters use the Set Communications Parameters command see instructions on page 3 14 The default setting is 9600 baud at eight bits no parity Current Status The current status of the Lock ...

Страница 110: ...with the passkey requirement the code is used in response to the challenge 1234567 Obtain the Test Response on the RPSD Key by using the List User Information command on the RPSD Key user s terminal See Chapter 4 Key Administration and Use for details on the Key List User Information command To check the user IDs use the List User Table command see instructions on page 3 34 Sample Command and Resp...

Страница 111: ...and non permanent users may be unblocked To determine whether a user is blocked or to check the user IDs use the List User Table command see instructions on page 3 34 Sample Command and Response Parameter Description u Unblock User command user_id A unique identifier assigned to each user by the system administrator using the Add User command Use the List User Table command to check user IDs see i...

Страница 112: ...n enter any number of restriction ID codes to assign the corresponding time restriction to the user s up to all restriction ID codes 14 To check that the restrictions were assigned as desired use the List User Table command see instructions on page 3 34 To check parameters of the restriction IDs use the List Restrictions command see instructions on page 3 26 Parameter Description ur User Restricti...

Страница 113: ... C in the following example are assigned to all users beginning with the characters entered KEY in the following example ur KEY20 abc 193 08 16 96 11 33 21 KEY20 Assigned Restr ABC ur KEY abc 194 08 16 96 11 36 21 Restr KEY11 Assigned Restr ABC 195 08 16 96 11 36 23 Restr KEY12 Assigned Restr ABC 196 08 16 96 11 36 25 Restr KEY13 Assigned Restr ABC 197 08 16 96 11 36 27 Restr KEY14 Assigned Restr ...

Страница 114: ... 54 Command Functions 3 Help Screens To obtain a help screen for any command enter a question mark followed by the command and press Sample Help Request and Help Response ENTER i Command I ID Set Function Set ID to precede all log messages from this device Format I log_id Example I LOCK A To clear ID type I ...

Страница 115: ...sswords or the PassKey procedure The caller dials the port being protected on the communications system from the caller s terminal connected to the Key authentication takes place during which time the LEDs on the front panel of the RPSD Key indicate the status of the call and the caller is connected to the RMATS channel However before a Key can be used you must initialize it by using certain comma...

Страница 116: ...ecret Key and Device ID A Add Admin User R Remove Admin User LA List Admin Users AS AUX Security ON OFF Q Quit Admin session Initialization Functions U Set User ID K Set Secret Key N Sets Device Number For Help Type Followed by Command The following is the Menu of Commands when the Key has been initialized Menu of Commands L List RPSD Key User Information H History Display D Date Set C Clock Set I...

Страница 117: ...n Use the Set User ID command to enter a name that will identify the RPSD Key to the RPSD Lock Use this command only when initializing a previously uninitialized Key To use this command enter u user_id The user ID entered must match the user ID programmed into the Lock to identify that Key If you assign the same user ID to more than one Key assign different device numbers to those Keys Sample Comm...

Страница 118: ...est Reply should be matched against the one for your Key given by the RPSD Lock If the replies match the Key has been correctly seeded with the secret information If the responses do not match use the Wipe Out command described in this section to return the Key to an uninitialized state and initialize the Key again Double check that you have the correct secret key If the tests fail again there is ...

Страница 119: ...D The device number is associated with the Key for the purpose of identification by the Lock Use this command to initialize a previously uninitialized Key To use this command enter n device_number Do not duplicate existing device numbers The last four digits of the Key Lucent Technologies serial number are recommended Sample Command and Response n 12345 08 14 90 14 03 59 Device Number set to 12345...

Страница 120: ...those commands listed in the Menu of Commands after the Key device has been initialized The command functions are A Add Administrative User AS AUX Security C Clock Set D Date Set H History Display I Set Log ID L List User Information LA List Administrative Users Q Quit R Remove Administrative User S Status Display SC Set Communications Parameters W Wipe Out Help Screens ...

Страница 121: ...ed If you leave the secret_key field blank the secret_key may be generated by the Lock device or may be input as a 20 digit octal number Sample Command and Response for Adding an Administrative User Via a PassKey A TONI K 010 02 14 95 05 42 04 TONI Admin User Added OK Enter These Digits into PassKey as Key1 or Key2 5740 4176 1276 6330 2620 Test Challenge 1234557 Reply 770 1131 See PassKey Authenti...

Страница 122: ...555 024 402 Issue 1 October 1996 Key Administration and Use Page 4 8 Command Functions 4 NOTE If the secret_key is randomly assigned by the Lock device in other words the field is omitted the field must be delimited by a comma Example a sam ak ...

Страница 123: ... added Sample Commands and Responses To determine the AUX Key status type as AS AUX Port Security is OFF To enable AUX Security type as on AS ON 008 02 14 95 05 32 04 AUX Port Security is ON To disable AUX Security type as off AS OFF 014 02 14 95 04 20 53 AUX Port Security is OFF Parameter Description as The AUX Security command to view the security status of the Key as on The AUX Security command...

Страница 124: ...he Key s internal clock to ensure the accuracy of the History Log Set the clock to local time standards in 24 hour clock format for example 16 00 for 4 00 PM Use a colon to separate the hours and minutes Also use a leading zero if you set the time less than 10 00 Sample Command and Response c 13 15 8 14 90 13 15 00 Time Changed OK Parameter Description c The Clock Set command hh mm The time in hou...

Страница 125: ... be certain that it is correct To check the date use the Status Display command described in this section Use two digits for each part of the date including a zero at the beginning for months or days less than 10 for example 08 01 90 The last two digits are used for the year Also be certain to separate the month day and year with the slash character Sample Command and Response d 08 14 90 08 14 90 ...

Страница 126: ...e Sequence Number is appended to the Message Authentication Code the fields are delimited with a period When you list the report with the ALL command toggle to pause and resume the report The and ALL parameters may be used in combination Sample Command and Response h Log History 2375 000 02 14 95 09 22 23 Lucent RPSD Key V2 0x Reset EC32 001 02 14 95 09 22 58 User ID set to ATT USER1A ABB8 002 02 ...

Страница 127: ...ers separated by a decimal point the Message Authentication Code and the Sequence Number Date The second field provides the date the message was generated Time The second field provides the time the message was generated in 24 hour clock format Message The last field contains the status message Failed attempts at access generate a message at the RPSD Lock that is sent to the RPSD Key There are nin...

Страница 128: ...tify which Key is associated with which status message This is especially important where multiple devices share a single administration terminal The command adds the ID to the beginning of each message generated by the Key Sample Command and Response i KEY11 KEY11 08 14 90 14 20 08 Log ID Changed OK Parameter Description i The Set Log ID command log_id An identifier of up to eight characters sele...

Страница 129: ...ters l Description Use the List User Information command to list the user ID device number and test response number for the Key To use the List User Information command enter l at the prompt of the Key user s terminal Sample Command and Response l User ID KEY20 Device Number 12345 Test Response 8119704 Parameter Description l The List User Information command ENTER ENTER ...

Страница 130: ...ormation for that specified user or for all users who have the same beginning characters For example if you enter LA a the command lists information for all administrative user IDs that begin with A Sample Command and Response LA User ID User Type DAN AW SAM AK End of List The fields on the List User Table screen are User ID the user ID of the RPSD Key used to access the channel User Type the User...

Страница 131: ...administrative session and return the RPSD Key device to a secure mode NOTE AUX Security AS must be enabled to have an administrative session To re access the administrative session press twice and authenticate yourself via the Password or PassKey mode Sample Command and Response Q Admin Session Terminated 017 02 14 95 04 23 18 TONI Admin Session Terminated Parameter Description Q The Quit command...

Страница 132: ...iption Use the Remove Administrative User command to remove an administrative user from the Administrative Table The system prompts for confirmation prior to removing the adminstrative user Sample Command and Response R TONI Are You Sure Y N Y 011 02 14 95 05 43 05 TONI User Removed OK Parameter Description r The Remove Administrative User command user_id The user ID programmed for that Key ENTER ...

Страница 133: ...ware gives the version number of the firmware Init Code tells where and when the device was initialized Current Date gives the current date If the date is wrong it can be corrected by using the Date Set command described in this section Time gives the current time If the time is wrong it can be corrected by using the Time Set command described in this section Log ID provides the Log ID of the RPSD...

Страница 134: ... 8 bit no parity The options for speed and length_parity are Speed 300 600 1200 4800 9600 or 19 200 bps trailing zeros may be omitted meaning you may enter sc 24 for 2400 bps Length_parity 8N 8 bits no parity 7N 7 bits no parity 7E 7 bits even parity 70 7 bits odd parity NOTE If you omit either speed or length_parity the current entry is left unchanged Sample Command and Response sc 1200 7E 08 14 ...

Страница 135: ...alized state If you use the Wipe Out command the Key cannot access the Lock until the entire initialization procedure is performed again For this reason be sure you want to return the Key to an uninitialized state before using this command The RPSD Key requests confirmation of the Wipe Out command Sample Command and Response w THIS FUNCTION RENDERS DEVICE UNABLE TO ACCESS RPSD LOCK Are You Sure Yo...

Страница 136: ...escription To obtain a help screen for any command enter a question mark followed by the command and Sample Command and Response i Command I ID Set Function Set ID to precede all log messages from this device Format I log_id Example I KEY A To clear ID type I Parameter Description The Help command command Any one of the commands used on an initialized Key ENTER ENTER ...

Страница 137: ...pear on your computer screen Passwords can contain any printable ASCII character including a space NOTE Although user IDs are not case sensitive passwords are case sensitive therefore note whether you enter the password in upper or lower case Security Alert Passwords should be as long as allowed Passwords should be hard to guess and therefore should not contain all the same numbers for example 888...

Страница 138: ... your identification via the PassKey 1 Press twice RPSD prompts for the user ID 2 Type the pre authorized administrative ID and press 3 Turn the PassKey on and press the red button 4 Enter your Personal Identification Number PIN and press RPSD displays a challenge on the screen 5 Type the challenge into the PassKey and press The PassKey displays a response 6 Type the response into the terminal and...

Страница 139: ... See Replacing the RPSD Lock or Key in this chapter When access is successful status messages like the following appear on the RPSD Key user s administration terminal connected via the Key Auxiliary Port 07 12 90 13 58 27 Calling Out 07 12 90 13 58 37 Dialing Complete 07 12 90 13 59 07 Authentication Complete 07 12 90 14 05 41 Lucent RPSD Key V1 1 Idle However access attempts may not always be suc...

Страница 140: ...er fails to gain access to the RMATS channel because the administrator has put a block on that Key or because access has been restricted for that time of day the system is functioning properly However the Lock reports this action as a Key user being unable to gain access You can also obtain an access failure message for the most recent call attempt by using the Last Call Status Test See Last Call ...

Страница 141: ...vel of service 3 Invalid User ID The RPSD Key user ID is not in the table of users on the RPSD Lock Add the Key user to the user table if it is someone you want to have access to the RMATS channel This message may indicate an unauthorized attempt at access Check the Test Responses to make sure the RPSD Lock and RPSD Key Test Responses match If access for this Key is desired and the Test Responses ...

Страница 142: ...uninitialized state Then use the Key initialization commands also found in Chapter 4 6 Outgoing Call An outgoing call is being placed from the Lock This is not proper usage so the Lock disconnects the call No action necessary This is not a call failure 7 Ring No Answer The Lock rang the modem but the modem did not pick up Run the Modem Ring test described on page 5 8 and follow the directions for ...

Страница 143: ...berate restriction placed on access to the Lock by the administrator If you must have access at this time contact the system administrator The administrator may bypass the time restriction in one of the following ways removing the time restriction on that Key user or using the Force Connect Command See Chapter 3 for instructions on removing time restrictions or using the Force Connect command Tabl...

Страница 144: ...nd perform the diagnostics the second to physically replace various pieces of hardware Built in Diagnostics The RPSD system provides three diagnostic tests which are used to determine the cause of access failures These are Self Check test Last Call Status test Modem Ring test All three tests are performed by dialing the RMATS channel from a touch tone telephone and entering a code for the test you...

Страница 145: ...come for the last call attempt to the Lock The test responds either with slow beeps the number of which corresponds to the nine status messages explained in Table 5 1 or three fast beeps which means that the last call attempt was successful Follow these steps to perform the Last Call Status Test 1 Dial the RMATS channel from a touch tone telephone When the call is answered you will hear a tone ind...

Страница 146: ...connection to the RPSD Lock 2 Press 3 on the telephone pad The RPSD Lock responds to the command by ringing the modem While the Lock rings the modem you hear a simulated ring on the telephone receiver When the modem picks up you hear the answer tone The answer tone will not last long enough for the modem to perform handshaking The Lock then sends three quick beeps to your telephone and disconnects...

Страница 147: ... Test is in the communications system modem follow these steps 1 Disconnect the modular telephone plug from the communications system modem and connect a touch tone telephone to the modem 2 Call the RMATS channel from another touch tone telephone and perform the Modem Ring Test described on page 5 8 3 If the phone you substituted for the modem rings have someone answer it If the connection is fine...

Страница 148: ... may remove the RPSD Lock from the line and to maintain access to the RMATS channel connect the modem directly to the CO line Do this only if the Force Connect command fails as well See Chapter 3 for further information on the Force Connect command Security Alert Without the Lock the line is not secure Lucent Technologies technicians should consider a failed Lock or Key a Severity 4 trouble Custom...

Страница 149: ...initialize the replacement Lock with the same information as the original Security Alert Save the secret information in a secure location to maintain the security of the system If the security of the Seed Value is breached RPSD security itself is lost The RPSD Lock and Key should be reinitialized with a new secret key NOTE The RPSD Secret Key Seed Value must be physically protected and secured Luc...

Страница 150: ...Remote Port Security Device User s Guide 555 024 402 Issue 1 October 1996 Troubleshooting Page 5 12 Saving the Key Seed Value 5 ...

Страница 151: ...t Security Device User s Guide 555 024 402 Issue 1 October 1996 A 0 Cables Connectors and Ports Table A 1 shows the cables connectors and ports for installing the RPSD system This table includes optional connections as well as the basic configuration ...

Страница 152: ...ith RPSD Lock RPSD Lock CO line or modem 14 ft cable with modular connector on each end Supplied with RPSD Lock RPSD Lock CO line or modem RJ11 wall jack XXXXXX CO line RJ11 TELCO jack on RPSD Key EIA RS 232 cable XXXXXX DB9 DB25 cable at RPSD Lock DB25 at administration terminal or printer or A B switch DB9 to DB25 cable XXXXXX RPSD Lock Cable to administration terminal or printer or A B switch D...

Страница 153: ...te Port Security Device User s Guide 555 024 402 Issue 1 October 1996 B A Front Panel LEDs Both the RPSD Lock and the RPSD Key have seven LEDs on their front panels This appendix explains the meaning of each LED and its various states ...

Страница 154: ...s of the RPSD Lock when the different LEDs are lit Table B 1 Lock LEDs and Meanings LED 1 2 3 4 5 6 7 Meaning On On Off Off Off Off Off An incoming call is being processed On Off On Off Off Off Off The RPSD Lock is ringing the modem On Off Off On Off Off Off An outgoing call is in progress from the modem On Off Off Off On Off Off The Lock is idle and in a ready condition able to accept incoming ca...

Страница 155: ...atus of the RPSD Key when the different LEDs are lit Table B 2 Key LEDs and Meanings LED 1 2 3 4 5 6 7 Meaning On On Off Off Off Off Off An incoming call is being processed On Off On Off Off Off Off Blinks on power up On Off Off On Off Off Off An outgoing call is in progress from the modem On Off Off Off On Off Off The Key is idle and in a ready condition able to place outgoing calls or process in...

Страница 156: ...Remote Port Security Device User s Guide 555 024 402 Issue 1 October 1996 Front Panel LEDs Page B 4 RPSD Key B ...

Отзывы: