Copyright
1999 Lucent Technologies
585-212-011
All Rights Reserved
Comcode 108366030
Printed in U.S.A.
Issue 1
March 1999
Notice
While reasonable efforts were made to ensure that the information in this document was complete and accurate at the time of printing, Lucent
Technologies can assume no responsibility for any errors or liability for any direct or consequential damages resulting from use of the information.
Changes and/or corrections to the information contained in this document may be incorporated into future issues.
Responsibility for Your System’s Security
Toll fraud is the unauthorized use of your telecommunications system by an unauthorized party, for example, persons other than your company’s
employees, agents, subcontractors, or persons working on your company’s behalf. Note that there may be a risk of toll fraud associated with your
telecommunications system, and if toll fraud occurs, it can result in substantial additional charges for your telecommunications services.
You and your System Manager are responsible for the security of your system, such as programming and configuring your equipment to prevent
unauthorized use. The System Manager is also responsible for reading all installation, instruction, and system administration documents provided
with this product in order to fully understand the features that can introduce risk of toll fraud and the steps that can be taken to reduce that risk.
Lucent Technologies does not warrant that this product is immune from or will prevent unauthorized use of common carrier telecommunication
services or facilities accessed through or connected to it. Lucent Technologies will not be responsible for any charges that result from such
unauthorized use.
Trademark Notice
DEFINITY and INTUITY are registered trademarks of Lucent Technologies.
Disclaimer
Intellectual property related to this product (including trademarks) and registered to AT&T Corporation has been transferred to Lucent Technologies
Incorporated.
Any references within this text to American Telephone and Telegraph Corporation or AT&T should be interpreted as references to Lucent
Technologies Incorporated. The exception is cross references to books published prior to
December 31, 1996, which retain their original AT&T titles.
Heritage Statement
Lucent Technologies — formed as a result of AT&T’s planned restructuring — designs, builds, and delivers a wide range of public and private
networks, communication systems and software, consumer and business telephone systems, and microelectronics components. The world-
renowned Bell Laboratories is the research and development arm for the company.
Ordering Information
You can download a copy of this Guide and the ASG Guard/ASG Guard Plus Getting Started Guide from the Lucent website at
http://www.lucentdocs.com.
Fraud Intervention
If you suspect you are being victimized by toll fraud and you need technical support or assistance, call the Lucent Technologies National Customer
Care Center at 1 800 643-2353. For international customers, contact your local Center of Excellence.
To Get Help
If you need assistance with administration and configuration of the ASG Guard, call Ion Networks, Inc. at
1 732 494-4440. Their technical support staff is available 9:00 a.m. to 5:00 p.m. EST Monday through Friday. This call may be billable. If you
believe you have a repair problem, call Lucent Technologies at 1 800 242-2121 or your local Authorized Dealer. For international customers,
contact your local Center of Excellence.
To resolve the problem as quickly as possible, describe the problem and note the steps that you have taken to resolve it. Also note the status of the
LEDs on the front panel.
Home Page
The home page for Lucent Technologies is
http://www.lucent.com .
Summary of Contents for Lucent Technologies Access Security Gateway Guard
Page 12: ...x Page intentionally left blank ...
Page 28: ...ASG Guard Overview 16 Page intentionally left blank ...
Page 36: ...Physical Connections 24 Page intentionally left blank ...
Page 60: ...Modem Port Setup 48 Page intentionally left blank ...
Page 82: ...Modifying the User Database 70 Page intentionally left blank ...
Page 120: ...Action and Event Tables 108 Page intentionally left blank ...
Page 158: ...User Connectivity 146 Page intentionally left blank ...
Page 188: ...Log Functions 176 Page intentionally left blank ...
Page 236: ...Troubleshooting 224 Page intentionally left blank ...
Page 252: ...Internal Battery Replacement 240 Page intentionally left blank ...
Page 258: ...Glossary of Command References 246 Page intentionally left blank ...