background image

Event Manager Description

1-6

303142-A Rev. 00

Security Management

Voice Services use the RSA Public Key Cryptosystem to provide secure 
communications. A public key cryptosystem is a complex mathematical method 
to secure digital communications. Public key encryption uses two algorithmic 
keys: a public key used to encode the data and a private key required to decode it. 
The encryption key is usually made public and the decryption key is kept secret.

Voice Services uses two additional types of keys to create two levels of security. 
Default keys are common to all Voice Services and Control Centers, while unique 
keys
 are generated for each individual server and Control Center. In order to 
communicate with other Voice Services, an individual manager or the Control 
Center must have the appropriate security keys. All Voice Services and Control 
Center applications have the default key when installed; if the default key is 
disabled, unique keys must be distributed to new servers or Control Centers 
through a key management system.

While communications between Voice Services use RSA encryption, the SQL 
database itself is not automatically encrypted. If database encryption is required, 
the data must be encrypted on the servers which create the data.

System Requirements

Hardware

Intel Pentium 166 MHz processor (minimum)

64 MB RAM

300 MB available (free) hard disk space

CD-ROM drive

Network Interface Adapter

Operating System

Microsoft Windows NT® Server 4.0 (with Service Pack 3) or later

Summary of Contents for Event Manager

Page 1: ...Part No 303142 A Rev 00 July 1998 Event Manager Description ...

Page 2: ...marks are the property of their respective owners Restricted Rights Legend Use duplication or disclosure by the United States Government is subject to restrictions as set forth in subparagraph c 1 ii of the Rights in Technical Data and Computer Software clause at DFARS 252 227 7013 Notwithstanding any other license agreement that may pertain to or accompany the delivery of this computer software t...

Page 3: ...IMITATION THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE In addition the program and information contained herein are licensed only pursuant to a license agreement that contains restrictions on use and disclosure that may incorporate by reference certain limitations and notices imposed by third parties ...

Page 4: ......

Page 5: ...ger Overview of the Event Manager 1 1 Features 1 2 Backup and Restore 1 2 Centralized Data Storage 1 2 Interaction with Third Party Applications 1 2 Secure Communications 1 2 System Administration 1 2 Interaction with Voice Services 1 3 Gateway Routing Manager 1 3 Voice Gateway 1 3 System Administration Using the Control Center 1 4 Administration Access 1 5 Security Management 1 6 System Requireme...

Page 6: ......

Page 7: ...303142 A Rev 00 vii Figures Figure 1 1 Control Center Main Screen EMS Selected 1 5 ...

Page 8: ......

Page 9: ...atures Note This document contains examples of windows displayed by Voice Services applications These are included to give you a point of reference while reading about features and procedures Most of these windows match or closely resemble those displayed by the applications However some windows displayed by the version of the application you are using may differ from those included in this docume...

Page 10: ...nt technical manuals and release notes free directly from the Internet Go to support baynetworks com library tpubs Find the Bay Networks products for which you need documentation Then locate the specific category and model or version for your hardware or software product Using Adobe Acrobat Reader you can open the manuals and release notes search for the sections you need and print them on most st...

Page 11: ...act the technical support staff for that distributor or reseller for assistance If you purchased a Bay Networks service program call one of the following Bay Networks Technical Solutions Centers Region Telephone number Fax number United States and Canada 800 2LANWAN then enter Express Routing Code ERC 322 when prompted to purchase or renew a service contract 978 916 8880 direct 978 916 3514 Europe...

Page 12: ...y Networks products Training programs can take place at your site or at a Bay Networks location For more information about training programs call one of the following numbers Region Telephone number United States and Canada 800 2LANWAN then enter Express Routing Code ERC 282 when prompted 978 916 3460 direct Europe Middle East and Africa 33 4 92 96 15 83 Asia Pacific 61 2 9927 8822 Tokyo and Japan...

Page 13: ...ices is encrypted The EMS provides an off server repository to safeguard data and perform data analysis without impacting server operations and therefore should run on a computer system not used for other Voice Service processes More than one EMS can be used to provide fault tolerance through data duplication Since the Voice Services reporting to the EMS may reside in different time zones all time...

Page 14: ... Oracle and Microsoft SQL Enterprise Manager Centralized Data Storage The EMS makes efficient use of computer processing resources because it makes it possible to access large amounts of data and generate reports from a central data location instead of from each Voice Service The data is stored on one computer system instead of several Interaction with Third Party Applications The SQL database use...

Page 15: ...er servers in the EMS When a server usually the gateway requests a transaction it contacts the CS for account information For more information about the Gateway Routing Manager features and capabilities refer to the Gateway Routing Manager Description Voice Gateway The Voice Gateway WGX brings calls placed using conventional telephones into an IP based data network This gives PSTN telephones the a...

Page 16: ... Gateway features and capabilities refer to the Voice Gateway Description System Administration Using the Control Center A database administrator at the customer site is responsible for sizing and maintaining the EMS database backing up and restoring data and securing the database itself Typically an administrator performs these tasks using Microsoft SQL Server Enterprise Manager or Oracle Workgro...

Page 17: ...n Access Each Voice Service maintains a list of authorized users each validated when they log into the Control Center The following list shows some of the permissions that can be enabled or disabled when assigning user access on the EMS Login Add Delete or Modify Control Center User Manage RSA Keys ...

Page 18: ...individual server and Control Center In order to communicate with other Voice Services an individual manager or the Control Center must have the appropriate security keys All Voice Services and Control Center applications have the default key when installed if the default key is disabled unique keys must be distributed to new servers or Control Centers through a key management system While communi...

Page 19: ...nts one of the following Microsoft SQL Server 6 5 with SQL Service Pack 3 or later Oracle Workgroup Server 7 3 2 2 1 and Oracle ODBC 2 5 3 1 3 for Windows NT Server 4 0 NT Network Protocol TCP IP Recommended Power backup uninterruptible power supply UPS ...

Page 20: ......

Reviews: