background image

Remote Port Security Device
User’s Guide  

555-024-402  

Issue 1

October 1996

RPSD System Administration 

Page 3-22

Command Functions 

3

CR—Change Restriction

Syntax and Parameters

To set restrictions:

cr <restr_id,start(hh:mm),end(hh:mm),day_no.>

 

To clear restrictions:

cr <restr_id>,clear 

Parameter

Description

cr

Change Restriction command

restr_id

A single character from A–N (14 possible restriction codes) 
used as a code to identify the time periods and days during 
which usage of the RPSD system can be restricted. You can 
then assign the code to the users you wish to restrict for that 
period by using the User Restrictions command described 
on page 3-52.

start
(hh:mm)

The beginning time of the restriction in 24-hour clock format.

You must use the colon (:) as a separator between the hours 
and minutes. You must also use a leading zero (0) to enter 
any time that is less than 10:00, for example, 08:00.

end(hh:mm)

The ending time of the restriction in 24-hour clock format. 

You must use the colon (:) as a separator between the hours 
and minutes. You must also use a leading zero (0) to enter 
any time that is less than 10:00, for example, 08:00.

day_no

The day or days of the week on which the restrictions will be 
in effect. Enter the day(s) in ascending order, in any 
combination (for example, 367), as a number(s) from 1–7 as 
follows:

1 = Monday
2 = Tuesday
3 = Wednesday
4 = Thursday
5 = Friday
6 = Saturday
7 = Sunday

ENTER

ENTER

Summary of Contents for 555-024-402

Page 1: ...555 024 402 Comcode 107748717 Issue 1 October 1996 Remote Port Security Device User s Guide ...

Page 2: ...t 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment This equipment generates uses and can radiate radio frequen cy energy and if not installed and used in accordance with the instruction manual may cause harmful interference to radio communications However there is no guarantee that...

Page 3: ...ation and Operational Procedures xvii Federal Communication Commission FCC Electromagnetic Interference Information xviii About This Book xix Intended Audiences xix Responsibilities xix Terms and Conventions xx Typographical Conventions xxi How to Use This Book xxi Product Safety Labels xxii Related Documents xxii How to Comment on This Document xxii 1 Introduction 1 1 RPSD System 1 2 Hardware Com...

Page 4: ...nstalling the RPSD Lock 2 5 Installing the RPSD Key 2 16 Testing an Uninitialized Key 2 18 Initializing the RPSD Lock 2 18 Initializing the RPSD Key 2 19 Testing the RPSD Lock Installation 2 20 3 RPSD System Administration 3 1 Menu of Commands 3 2 Command Functions 3 5 A Add User 3 6 AH Access History 3 11 AA Administrative Access History 3 14 AF Administrative Failure History 3 17 AS AUX Security...

Page 5: ... and Use 4 1 RPSD Key User Command Set 4 2 Initialization Functions 4 3 U Set User ID 4 3 K Set Secret Key 4 4 N Set Device Number 4 5 Command Functions 4 6 A Add Administrative User 4 7 AS AUX Security 4 9 C Clock Set 4 10 D Date Set 4 11 H History Display 4 12 I Set Log ID 4 14 L List User Information 4 15 LA List Administrative Users 4 16 Q Quit 4 17 R Remove Administrative User 4 18 S Status D...

Page 6: ...Page vi 5 Troubleshooting 5 1 Access Failure Messages 5 2 Testing the RPSD Lock 5 6 Built in Diagnostics 5 6 Hardware Replacement 5 9 Replacing the RPSD Lock or Key 5 10 Saving the Key Seed Value 5 11 A Cables Connectors and Ports A 1 B Front Panel LEDs B 1 RPSD Lock B 2 RPSD Key B 3 ...

Page 7: ... approved accessories Do not install this product near water for example in a wet basement location Do not overload wall outlets as this can result in the risk of fire or electrical shock Do not attach the power supply cord to building surfaces Do not allow anything to rest on the power cord Do not locate this product where the cord will be abused by persons walking on it Unplug the product from t...

Page 8: ...Remote Port Security Device User s Guide 555 024 402 Issue 1 October 1996 Page x ...

Page 9: ... the USA only Lucent Technologies provides a toll tree customer Helpline 1 800 242 2121 24 hours a day If you need assistance when installing programming or using your system call the Helpline or your Lucent Technologies authorized representative Outside the USA if you need assistance when installing programming or using your system contact your Lucent Technologies authorized representative ...

Page 10: ...give any credit for charges that result from unauthorized access To minimize the risk of unauthorized access to your communications system or device When possible restrict the off network capability of off premises callers using calling restrictions Facility Restriction Levels and Disallowed List capabilities When possible block out of hours calling Frequently monitor system call detail reports fo...

Page 11: ... with no Keys Lucent Technologies will pay for unauthorized calls that occur as a result of access to the system via the remote administration port through the RPSD provided the following conditions are met The RPSD was installed correctly on the remote administration port on the Lucent Technologies communications system and configured at the time of the fraud incident to accept only Lucent Techno...

Page 12: ...of the fraud incident NOTE In this context correct installation means that the RPSD Lock is installed consistent with installation instructions and in such a way as to deny access in case of power failure The customer provides RPSD documentation to Lucent Technologies showing the time of access and that the access was accomplished via a Lucent Technologies ID The customer provides the communicatio...

Page 13: ... unit to the factory This warranty is null and void if the manufacturer determines that any modifications have been made to the unit or the unit has been subjected to physical or electrical stress This warranty covers parts and labor only and does not include shipping costs travel expenses or travel time Installation of the equipment is the sole responsibility of the purchaser The manufacturer its...

Page 14: ...the following The telephone number s you will be using with this equipment The appropriate registration number and ringer equivalence number REN which can be found on the back or bottom of the control unit For each jack the sequence in which lines are to be connected the line types the Facility Interface Code FIC and the Ringer Equivalence Number REN by position when applicable Ringer Equivalence ...

Page 15: ...mporarily If possible they will notify you in advance But if advance notice is not practical you will be notified as soon as possible You will also be informed of your right to file a complaint with the FCC Changes at Local Telephone Company Your local telephone company may make changes in its facilities equipment operations or procedures that affect the proper functioning of this equipment If the...

Page 16: ...is equipment has been tested and found to comply with the limits for a Class A digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the ...

Page 17: ...onnel who administer and maintain the RPSD Lock It is assumed that RPSD system administrators are familiar with menu driven telecommunications hardware components It is also assumed that they understand the need for maintaining security in administering the communications system RPSD Key users are those who dial in to a channel locked with a Lock by using a Key It is assumed that Key users are fam...

Page 18: ...ters etc is the customer s responsibility If any material is required in addition to the material shipped in the RPSD package it is billable to the customer Terms and Conventions The Remote Port Security Device RPSD Lock is often referred to as the Lock Similarly the RPSD Key is often referred to as the Key Throughout this document toll fraud security hazards are indicated by an exclamation point ...

Page 19: ...inal connected to the RPSD Lock is referred to as the system administrator s terminal or administration terminal How to Use This Book This is organized into chapters that give information on procedures necessary for the proper installation and administration of your Remote Port Security Device Related Documents later in this section provides a complete list of system documentation together with or...

Page 20: ...sonal injury or property damage if the hazard is not avoided Related Documents In addition to this book the document listed below is part of the documentation set Within the continental United States order this document from the BCS Publications Fulfillment Center by calling 1 800 457 1235 How to Comment on This Document We welcome your comments both positive and negative Please use the feedback f...

Page 21: ..._____________________________________________________________________ ___________________________________________________________________________________________ 4 Feel free to write any comments below or on an attached sheet ___________________________________________________________________________________________ __________________________________________________________________________________...

Page 22: ...Remote Port Security Device User s Guide 555 024 402 Issue 1 October 1996 About This Book Page xxiv How to Comment on This Document ...

Page 23: ...s a single line dial up port protection system that prevents unauthorized access to a host resource Host resource dial up ports are protected by installing the RPSD Lock on the analog telephone line leading to the port Access is provided only when the calling party uses the RPSD Key a unit installed on the analog telephone line at the calling party end ...

Page 24: ...ommunications Server ECS all models DIMENSION Other communications systems with dial up ports All voice mail systems Any product that supports analog tip and ring capability With the RPSD Lock and Key system you can set the time of day that access to a port is permitted or you can block any or all access to the line by users of RPSD Keys In addition a system activity log provides a real time recor...

Page 25: ...incoming call 2 The Lock sends the caller a polling tone If the calling party has an RPSD Key the Key responds with its User ID If there is no Key on the calling end the Lock terminates the call 3 The Lock must recognize the Key s User ID the Lock must be previously initialized with all valid Keys if not the Lock terminates the call 4 Using an algorithm governed by ANSI DES standards the Lock gene...

Page 26: ... secret encryption key unqiue to the user ID assigned to the Key and encrypts the value the Lock sent Following this the Key calculates the necessary response The Key transmits this expected value to the Lock 7 The Lock compares the Key s response to the expected value it calculated and stored If the Lock receives the precise value it expects it generates ringing and sends the call on to the prote...

Page 27: ...ve all messages from the Lock to disk The Lucent Technologies personnel who require access to the communications system already have the Keys they need Any additional RPSD Keys for customer use must be ordered separately The hardware components both supplied and otherwise and their requirements are described in the following sections RPSD Lock When you order the RPSD Lock you receive The Lock Powe...

Page 28: ...RIBER RJ11 port for the central office line labeled TELCO Female DB9 port for the terminal or printer or a modem labeled AUX PORT Alarm leads to connect an external alarm Port for the power supply supplied with the RPSD Lock Figure 1 2 RPSD Lock Power Monitor Function The Power Monitor function allows you to control the behavior of the RPSD during power failure conditions The POWER MONITOR button ...

Page 29: ...e OUT position for security reasons External Alarm You can connect alarm leads to the screw terminals on the back of the Lock When a Lock failure occurs contacts inside the Lock close and send a signal out the alarm terminals to the communications system or other external alarm You can also use the Power Monitor function to generate a signal failure through the alarm leads without bypassing the RP...

Page 30: ...PSD Lock works with any modem that can be used with the communications system Similarly the RPSD Key works with any modem that can be used with a terminal NOTE Version 3 of the RPSD Lock and Key works with low and high speed modems up to 28 8 kbps Versions 1 and 2 work only with low speed modems up to 9 6 kbps SUBSCRIBER MODEM TELCO AUX PORT 12VDC 1A Front Back DEFINITY RPSD KEY POWER RING IN CALL...

Page 31: ...PSD Lock or Key This RS 232 cable is not supplied The AUX PORT is the same port used if a printer is installed You may wish to install a switch to make changing the AUX PORT connection easier for example from a terminal to a printer The terminal should initially be set to 9600 bps and 8 bits no parity These are the factory default settings of the Lock and the Key You may change these parameters la...

Page 32: ...he software for the RPSD system is contained within the hardware components and does not need to be loaded separately If you are not installing an RPSD Key you need only set the date and time for the RPSD Lock and in the case of multiple Locks a Lock ID If you are installing RPSD Keys you must do some additional initialization on the Lock s ...

Page 33: ...tantial barrier to unauthorized access to a dial up communication port The Remote Port Security Device is not impregnable but is an important addition to the tools and measures used by system managers to prevent unauthorized access to dial up ports Time of Day Access The RPSD Lock can be administered to prevent access from one or more Key or from all Keys during specified times of day The default ...

Page 34: ...disconnected As a new message is generated the oldest message in the buffer is deleted The most recent 20 messages are displayed on the first page in real time on the RPSD Lock administration terminal That is the oldest message scrolls off the screen on the administration terminal as the new message is added to the bottom When a printer is connected to the RPSD Lock administration terminal each ne...

Page 35: ... second means of identifying the calling party lh Log History CC85 000 7 12 96 13 23 18 KEY20 User Removed OK D4E2 001 7 12 96 13 23 51 KEY19 User Added OK A011 002 7 12 96 13 24 12 KEY20 Admin User Added OK 6FD2 003 7 12 96 13 26 51 Call Received 12BB 004 7 12 96 13 26 59 Attempt by KEY20 4321 Failed 4 Blocked User 7EF4 005 7 12 96 13 27 00 KEY20 4321 Disconnected BE31 006 7 12 96 13 27 06 Lucent...

Page 36: ...g History and how to use the List Statistics command see Chapter 3 RPSD System Administration Single Point Administration You can use a single administration terminal or printer to administer multiple Locks To use a single administration terminal for multiple Locks administer the Locks from teletype tty ports via the UNIX Operating System To use a single printer for multiple Locks connect a printe...

Page 37: ... message is sent to the Key user s administration terminal To block a Key user or Key users use the Block User command described in the System Administrator Command Set section of Chapter 3 Force Connect Disconnect The RPSD Lock can be forced to connect an incoming call from any source or to disconnect a call in progress A connection can be forced or a call disconnected whether or not the caller i...

Page 38: ... the INADS system ATT INADS1 ATT INADS2 ATT INADS3 ATT INADS4 User IDs reserved for Key users and engineers at the Technical Services Center in Englewood Colorado all products ATT TSC001 ATT TSC002 User ID reserved for Lucent Technologies personnel at the Tier 3 location at the Denver Works Factory ATT PECC01 User ID reserved for Bell Laboratories field support for System 85 and DEFINITY Enterpris...

Page 39: ...Page 1 17 System Administration 1 NOTE A single Key can be used to access multiple Locks See the Add User command for the procedure for adding users and the Remove User command for the procedure for removing users both described in the System Administrator Command Set section of Chapter 3 ...

Page 40: ...Remote Port Security Device User s Guide 555 024 402 Issue 1 October 1996 Introduction Page 1 18 System Administration 1 ...

Page 41: ... October 1996 2 2 Installation This chapter describes the recommended room layout and environment hardware components installation procedures and testing for the RPSD See Appendix A Cables Connectors and Ports for quick reference materials on the installation of the hardware components ...

Page 42: ...ck installation label the Locks according to which lines they protect to prevent confusion Power Supply The RPSD Lock and the RPSD Key are both powered by ordinary AC outlets or by AC to 12 VDC coverters connected to AC outlets These need not be grounded three prong outlets If necessary you can use extension cords However it is best to connect the Lock to the Uninterruptible Power Supply UPS conne...

Page 43: ...rface must be considered To overcome the RS 232 restrictions adjust the baud rate of the administration terminal or other equipment connected to the AUX PORT as follows Cables of 0 to 50 feet a maximum 9600 bps Cables of 50 to 100 feet a maximum of 4800 bps Cables of 100 to 2000 feet a maximum of 2400 bps CAUTION To minimize noise induction cable distance should not exceed 50 feet Set the link spe...

Page 44: ...no one tries to administer the communications system while the channel is disconnected You can inform the TSC by calling 800 242 2121 and referring to Services Methods Procedures Talkline Case Number 910207 INADS database updates must be performed for the INADS product connection call to be directed through a permanent Lucent Technologies RPSD Key Without INADS updates Lucent Technologies remote m...

Page 45: ...ferent ways including an RJ11 adapter or a multiple pair gang plug If one is not already present install an RJ11 port on the central office line to facilitate installation of the RPSD Lock and also to make subsequent service easier Label all connections Table 2 1 Cables Connectors and Ports Part From To Modular connector Communications system RJ11 at external modem 7 foot cable with modular connec...

Page 46: ...terminal via the AUX PORT on the back of the Lock and power it from an AC outlet or Uninterruptible Power Supply UPS On System 85 and DEFINITY Generic 2 the modems are external to the communications system Check that the modems are plugged into the UPS since a power outage that results in either the RPSD Lock or the modem being inaccessible also results in the RMATS channel being inaccessible SUBS...

Page 47: ...ith RJ11 modular connectors DB9 male to DB25 female cable RS 232 cable Administration terminal for the Lock RPSD Lock power supply AC outlet or outlet on the UPS NOTE NOTE The 7 foot and 14 foot telephone line cords are provided with the RPSD Lock If additional length cords are needed the customer must supply them Connecting the RPSD Lock to the Central Office Line You need the following component...

Page 48: ...e RMATS channel 2 Locate the central office line for the RMATS port and install an RJ11 receptacle on the central office line 3 Connect one end of the 14 foot telephone line cord with RJ11 connectors to the central office line 4 Plug the RJ11 connector on the other end of the telephone line cord into the TELCO port on the back of the RPSD Lock SUBSCRIBER MODEM TELCO AUX PORT 12VDC 1A ALARM LEADS P...

Page 49: ...ccompanying that modem The following components are needed to connect the RPSD Lock to the communications system modem RPSD Lock Communications system modem assigned to the RMATS channel 7 foot line cord with RJ11 connectors To connect the RPSD Lock to the communications system modem follow these steps see Figure 2 3 1 Using the 7 foot line cord with RJ11 connectors on both ends insert one connect...

Page 50: ... 024 402 Issue 1 October 1996 Installation Page 2 10 Installation 2 Figure 2 3 RPSD Lock to Modem SUBSCRIBER MODEM TELCO AUX PORT 12VDC 1A ALARM LEADS POWER MONITOR RED GREEN BYPASS SECURE Communications System Modem RJ11 Connector RJ11 Connector ...

Page 51: ... end NOTE NOTE Install an A B switch if you are going to connect both a terminal and a printer This enables the administrator to change equipment without the trouble of disconnecting and reconnecting the plugs Follow the directions for connecting a terminal to the AUX PORT to install the A B switch To connect the RPSD Lock to the administration terminal or printer follow these steps see Figure 2 4...

Page 52: ...n Obtain further information for the terminal or printer from the documentation accompanying them Figure 2 5 and Figure 2 6 illustrate the pin cable connections from the DB25 end of the Lock or Key cable to data terminal equipment DTE and data communications equipment DCE SUBSCRIBER MODEM TELCO AUX PORT 12VDC 1A ALARM LEADS POWER MONITOR RED GREEN BYPASS SECURE DB9 9 Pin DB25 25 Pin Adapter RPSD A...

Page 53: ...ary Port Terminal and Printer Pinouts DB9 DB25 Signal To DTE DB25 Pin To DCE DB25 Pin 1 Not used 2 2 TXD input 2 3 3 3 RXD output 3 2 7 4 RTS input 4 6 8 5 CTS output 5 5 6 6 DSR output 6 4 5 7 Ground 7 7 1 8 CD output 8 20 9 Positive Test Voltage 10 19 Not used 4 20 DTR input 20 8 21 Not used 9 22 RI output 22 22 23 25 Not used ...

Page 54: ...25 End of the Cable to DTE Figure 2 6 Connections from DB25 End of Cable to DCE RPSD DCE 2 3 4 5 6 7 8 20 22 2 3 4 5 6 7 8 20 22 Transmit Data Receive Data Request to Send Clear to Send Data Set Ready Signal Ground Data Carrier Detect Data Terminal Ready Ring Indicator Terminal or Printer DTE RPSD DCE 2 3 4 5 6 7 8 20 2 3 4 5 6 7 8 20 Printer DCE ...

Page 55: ... other end into an AC wall outlet or an available outlet on the UPS see Figure 2 10 The red Power LED on the front panel of the Lock goes on and remains on while the other LEDs on the front panel of the Lock should blink three times and then settle into a Locked condition If there is any failure of the LEDs for example they do not blink three times or the Power light does not come on the Lock is d...

Page 56: ...ed to provide Alarm Lead connections for alarming RPSD Key failures Refer to External Alarm earlier in this chapter Connecting the RPSD Key to the Terminal The RPSD Key is connected to the terminal via the AUX PORT on the back of the Key and the terminal s RS 232 port See Table 2 2 for the pinouts for the AUX PORT connection The AUX PORT for the Key is connected in the same manner as the AUX PORT ...

Page 57: ... of the Key The following components are needed to connect the Key to the caller s modem RPSD Key Modem 7 foot line cord with RJ11 connectors To connect the Key to the caller s modem follow these steps see Figure 2 3 the connection is the same for the Key as for the Lock 1 Using the 7 foot line cord with RJ11 connectors on both ends insert one connector into the SUBSCRIBER port on the back of the ...

Page 58: ...ated RPSD Lock either directly via the telephone or via an application on the terminal If the connection is good the yellow VERIFY light comes on first followed by the green CONNECTION light This should occur in less than 30 seconds The CONNECTION LED remains lit until the call is ended If the connection fails the red IDLE light comes on Initializing the RPSD Lock Initialization of the RPSD Lock i...

Page 59: ...ed on the RPSD Lock See Chapter 4 Key Administration and Use for the Set Communications Parameters command to change the default settings if desired on the RPSD Key Initializing the RPSD Key Initialization of an RPSD Key involves both the Key and the RPSD Lock On the Lock you must add the Key User ID in question by using the Add User command See System Administrator Command Set in Chapter 3 for th...

Page 60: ...s functioning properly 3 Have the technical support center call the RMATS channel If access is successful the installation is working properly If access is unsuccessful refer to Chapter 5 Troubleshooting After a successful access of the port has shown the Lock to be working properly try dialing out through the RMATS channel via the Lock If you have trouble with making an outgoing call the tip and ...

Page 61: ...rs may take many actions to enhance overall telecommunication security These actions include but are not limited to providing physical security for RPSD installation sites locked rooms cabinets etc and wiring room sites Monitor the RPSD System Activity Log for patterns of activity such as repeated denied call attempts Contact your computer security group for assistance NOTE Save the seed value for...

Page 62: ...ystem administrator is shown in Figure 3 1 Figure 3 1 Menu of Commands NOTE The menu of Commands is available at any time by pressing on the RPSD administration terminal The commands are not case sensitive Menu of Commands A Add User LH Log History FC Force Connect B Block User AH Access History FD Force Disconnect U Unblock User FH Failure History T Test User AA Admin Access Hist D Date Set R Rem...

Page 63: ...rial port Set Comm Parameters page 3 47 Add administrative RPSD Key non administrative user to Lock Add User page 3 6 Determine code to be matched by a code from the user Test User page 3 50 Enable or disable security on the AUX administrative port AUX Security page 3 19 Specify time restrictions for access to the Lock Change Restrictions page 3 22 Assign specified time restrictions to users User ...

Page 64: ...age 3 44 User information lists List user ID whether the user is blocked user type permanent administrative RPSD Key non administrative password or passkey requirement for administrative users and assigned restrictions List User Table page 3 36 List specific time periods and days during which time restrictions may be placed on one or more users List Restrictions page 3 32 Show whether a user is bl...

Page 65: ...duration of the call Access History page 3 11 List the details of the last 500 failed access attempts including Message Authentication Code message sequence number date time user ID device number and failure reason Failure History page 3 26 List the details of the last 100 administrative access attempts including Message Authentication Code message sequence number date time user ID and duration of...

Page 66: ... is not case sensitive secret_key The the pre defined number of up to 14 hexadecimal digits used to administer a single Key for multiple Locks This parameter can be specified by the system administrator or randomly assigned by the Lock If this field is omitted the field must be delimited by a comma it is randomly generated by the Lock a The administrative user designation authentication _ mode Ide...

Page 67: ... Denver Works Factory ATT PECC01 User ID reserved for Bell Laboratories field support for System 85 and DEFINITY Enterprise Communications Server ECS Generic 2 ATT LABS01 User ID reserved for Bell Laboratories field support for System 75 and DEFINITY ECS Generic 1 ATT LABS02 User ID reserved for Bell Laboratories field support for AUDIX ATT LABS03 In addition to normal access capabilities administ...

Page 68: ...ame secret key information is used when adding that Key to other Locks The information is used to generate the test response The secret key chosen by the administrator is the key information to be added to the RPSD Key If this option is not used the RPSD Lock generates the secret key information randomly The RPSD Lock returns secret information and a test response when a user is added This informa...

Page 69: ... parameter specified Adding an administrative user requiring password authentication a KEY20 JPLock01 443 08 12 96 13 14 22 KEY20 User Added OK Enter this secret key into the RPSD Key Unit F37B 159D 6ABE 3E Test Response is 8119704 a KEY20 F47B159D6ABE3E JPLock02 443 08 14 96 01 57 43 KEY21 User Added OK Enter this secret key into the RPSD Key Unit F47B 159D 6ABE 3E Test Response is 4296425 a JOE ...

Page 70: ...the existing passkey can be entered so a new one does not have to be assigned a KEY20 ak JPLock02 443 08 14 96 01 57 43 KEY21 Admin User Added OK Enter These Digits into PassKey as Key1 or Key2 7652 0034 2106 4704 3320 Test Challenge 1234567 Reply 832 5113 a KEY20 58940085427656086626 ak JPLock02 443 08 14 96 01 57 43 KEY20 Admin User Added OK Enter These Digits into PassKey as Key1 or Key2 5894 0...

Page 71: ...message sequence number 20 to a page More to Come appears at the bottom of the each page except the last page and End of List appears at the bottom of the last page Press to move from page to page When you reach the last page indicated by End of List press to return to the menu of commands When you want to capture a long Access History to a file on a computer include the ALL parameter Page breaks ...

Page 72: ... 06 Outdial 0 5 08 D4E2 003 08 16 96 15 20 51 Outdial 0 2 14 12BB 004 08 16 96 15 24 19 ATT INADS2 72333 0 8 46 7EF4 005 08 16 96 15 48 01 ATT INADS2 72333 0 1 59 BE31 006 08 16 96 15 58 23 KEY11 82545 0 7 22 A3F3 007 08 16 96 16 08 51 KEY11 82545 0 3 20 4C23 008 08 17 96 08 08 18 Outdial 0 9 49 DD52 009 08 17 96 08 28 13 ATT INADS1 12345 0 28 11 21CC 010 08 17 96 08 58 37 ATT INADS1 12345 0 1 02 ...

Page 73: ...h status message The messages are numbered in sequence from 000 to 999 and then restart at 000 Date The date that the access took place Time The time that the access call came in User ID The user ID of the Key used to access the RMATS channel If the call was an outgoing call on the channel no user ID is displayed but the call is identified as Outdial Device The device number of the Key used to acc...

Page 74: ... More to Come appears at the bottom of the each page except the last page and End of List appears at the bottom of the last page Press to move from page to page When you reach the last page indicated by End of List press to return to the menu of commands When you want to capture a long Administrative Access History to a file on a computer include the ALL parameter Page breaks are removed and the e...

Page 75: ... 16 96 13 09 42 KEY11 1 20 33 CC34 002 08 16 96 15 12 06 KEY20 0 5 08 D4E2 003 08 16 96 15 20 51 KEY20 0 2 14 12BB 004 08 16 96 15 24 19 ATT INADS2 0 8 46 7EF4 005 08 16 96 15 48 01 ATT INADS2 0 1 59 BE31 006 08 16 96 15 58 23 KEY11 0 7 22 A3F3 007 08 16 96 16 08 51 KEY11 0 3 20 4C23 008 08 17 96 08 08 18 KEY20 0 9 49 DD52 009 08 17 96 08 28 13 ATT INADS1 0 28 11 21CC 010 08 17 96 08 58 37 ATT INA...

Page 76: ...e code is generated to protect the integrity of the Administrative Access History The Message Authentication Code is followed by a period and the sequence number of each status message The messages are numbered in sequence from 000 to 999 and then restart at 000 Date The date that the access took place Time The time that the access call came in User ID The user ID of the administrative Key used to...

Page 77: ...More to Come appears at the bottom of the each page except the last page and End of List appears at the bottom of the last page Press to move from page to page When you reach the last page indicated by End of List page press to return to the menu of commands When you want to capture a long Administrative Failure History to a file on a computer include the ALL parameter Page breaks are removed and ...

Page 78: ...erated to protect the integrity of the Failure History The Message Authentication Code is followed by a period and the sequence number of each status message The messages are numbered in sequence from 000 to 999 and then restart at 000 Date The date of the access failure Time The time of the access failure User ID The user ID of the RPSD Key used to attempt to access the channel Device The device ...

Page 79: ...ON and no administrative users have been added an appropriate warning message will be displayed when the RPSD system is powered up When AUX Port security is disabled administrative access to the RPSD system is allowed without authentication by any terminal connected to the AUX port When AUX Port security is enabled the administrative user must press twice to activate an administrative session and ...

Page 80: ...s high When the administrative session is terminated the Carrier Detect Signal CD goes low for one second If DTR goes low during an administrative session the session is terminated Sample Command and Response Determining AUX port status AUX Security command with no arguments Enabling AUX Security Disabling AUX Security NOTE When the current administrative session is completed by using the Quit com...

Page 81: ...h permanent and non permanent users may be blocked To determine whether a user is already blocked use the List User Table command see instructions on page 3 34 Sample Command and Response Parameter Description b Block User command user_id A unique identifier assigned to each user by the system administrator using the Add User command Use the List User Table command to check user IDs see instructio...

Page 82: ...ng the User Restrictions command described on page 3 52 start hh mm The beginning time of the restriction in 24 hour clock format You must use the colon as a separator between the hours and minutes You must also use a leading zero 0 to enter any time that is less than 10 00 for example 08 00 end hh mm The ending time of the restriction in 24 hour clock format You must use the colon as a separator ...

Page 83: ...from time 00 00 to time Y on the next day For example if you want to restrict access from 8 00 p m on a Thursday until 8 00 a m on a Friday restrict access from 20 00 on Thursday until 24 00 on Thursday and then restrict access from 00 00 on Friday until 08 00 on Friday Also when you use the User Restrictions command assign both of these restrictions to users you want to restrict from overnight ac...

Page 84: ...Lock is installed ensures the accuracy of the System Activity Log Also the clock is used by the Lock to activate and deactivate defined time restrictions Sample Command and Response Parameter Description c Clock Set command hh mm The current time in 24 hour clock format You must use the colon as a separator between the hours and minutes You must also use a leading zero 0 to enter any time that is ...

Page 85: ... installed ensures the accuracy of the System Activity Log Sample Command and Response Parameter Description d Date Set command mm dd yy The date in month day and year format Use the slash as a separator between the month day and year Also use two digits for the month day and year entries Include a leading zero 0 to enter any month or day that is less than 10 and use only the last two digits of th...

Page 86: ... 20 to a page More to Come appears at the bottom of the each page except the last page and End of List appears at the bottom of the last page Press to move from page to page When you reach the last page indicated by End of List page press to return to the menu of commands When you want to capture a long Failure History to a file on a computer include the ALL parameter Page breaks are removed and t...

Page 87: ...45 4 A011 002 08 16 96 15 12 06 KEY20 73647 1 6FD2 003 08 16 96 15 20 51 KEY20 73647 8 12BB 004 08 16 96 15 24 19 ATT INADS2 72333 7 7EF4 005 08 16 96 15 48 01 ATT INADS2 72333 5 BE31 006 08 16 96 15 58 23 KEY11 82545 9 AEF3 007 08 16 96 16 08 51 KEY11 82545 2 4C23 008 08 17 96 08 08 18 ATT INADS4 66600 6 DD52 009 08 17 96 08 28 13 ATT INADS1 12345 5 21CC 010 08 17 96 08 58 37 ATT INADS1 12345 8 6...

Page 88: ... number of each status message The messages are numbered in sequence from 000 to 999 and then restart at 000 Date The date of the access failure Time The time of the access failure User ID The user ID of the RPSD Key used to access the channel Device The device number of the RPSD Key used to access the channel The device number is a number assigned to the Key by the Key user at initialization Reas...

Page 89: ... issued When you issue the Force Connect command the Lock will request confirmation To confirm the command type y to cancel the command type n If you issue the command when there is no call attempting to connect an error message is displayed Security Alert Use of the FC command provides a call with connection to the protected resource bypassing the security normally provided by the Lock Use this c...

Page 90: ...igher priority call When you issue the Force Disconnect command the Lock will request confirmation To confirm the command type y to cancel the command type n If you issue the command when no call is in progress an error message is displayed Sample Command and Response Parameter Description fd Force Disconnect command ENTER JPLock01 195 08 17 96 14 23 55 Call Received JPLock01 196 08 17 96 14 24 04...

Page 91: ...en more than one Lock is in operation The Lock s ID is added to the beginning of status messages to identify the Lock concerned Sample Command and Response In the sample the log ID is added to the beginning of the status message It will appear here on all status messages once the ID is set Parameter Description i ID Set command log_id The name you select to identify the Lock The Log ID is limited ...

Page 92: ...ods can be created each is assigned a single character code from A to N Use the Change Restrictions command to set the restriction time periods and to associate a code letter to each period of time and day defined see instructions on page 3 22 Then apply the code to a specific user or users using the User Restriction command see instructions on page 3 52 Parameter Description lr List Restrictions ...

Page 93: ...fy the specific time periods and days during which time restrictions can be placed on one or more users Start Time The time of day in 24 hour clock format when the restriction begins End Time The time of day in 24 hour clock format when the restriction ends Days of the Week The days on which the restricted times take effect lr Restriction ID Start Time End Time Days of Week A 18 00 24 00 Sat Sun B...

Page 94: ... users and permanent users Call attempts and failures to the administrative interface are updated only if AUX security is enabled See instructions for the Key AUX Security command in the Command Functions section of Chapter 4 Sample Command and Response Parameter Description ls List Statistics command ENTER ls RPSD Lock Access Attempt Statistics Last Reset 08 14 96 Since Last Reset Cumulative RPSD...

Page 95: ...y authenticated by the Lock both since the last time the statistics were reset and cumulatively since the Lock was installed Failed Attempts by Reason The number of times that a caller failed in an access attempt for each of the nine failure reasons The statistics are broken down into the number of failures since the last reset for RPSD Key non administrative and administrative users and also the ...

Page 96: ... assigned to the user The information is listed about all users if no user ID is specified about a specified user if the full user ID is given or about all users beginning with the character s that is entered For example if you enter a information is listed for all user IDs beginning with the letter a Parameter Description l List User command full_ or_ partial_user_ id A unique identifier assigned...

Page 97: ...r type which determines access level and the authentication mode The user types are P Permanent reserved for Lucent Technologies personnel R RPSD Key normal access level A Administrative can change Lock parameters For administrative users only W Password required for access K Passkey required for access User type P is followed by either R or A to identify access levels for permanent users Restrict...

Page 98: ...ered as the full_or_partial_user_id parameter Information is listed for the specified user only fields included on the screen are described on page 3 37 User ID Blocked User Type Restriction s ATT INADS1 PR A B ATT INADS2 PR B ATT INADS3 PR ATT INADS4 PR ATT PECC01 PR ATT TIER3G PR ATT LABS01 PR ATT LABS02 PR ATT LABS03 PR ATT TSC001 PR ATT TSC002 PR KEY11 R A KEY12 B R C KEY13 B R D KEY14 AW A B ...

Page 99: ...a partial user ID entered as the full_or_partial_user_id parameter Information is listed for all users beginning with the characters entered fields included on the screen are described on page 3 37 1 KEY User ID Blocked User Type Restriction s KEY11 R A KEY12 B R C KEY13 B R D KEY14 AW A B KEY15 AW D KEY16 AK A KEY17 AK A KEY18 B R A KEY19 R A ...

Page 100: ...s are undergoing unexplained access failures or are failing for reasons 2 3 or 5 of Table 3 2 on page 3 43 report it to Lucent Technologies To protect the integrity of the Log History a Message Authentication Code is generated and shown on the Log History for each entry on the System Activity Log The Message Authentication Code is followed by a period and the sequence number of the message for exa...

Page 101: ... the last page indicated by End of List page press to return to the menu of commands When you want to capture a long History Log to a file on a computer include the ALL parameter Page breaks are removed and the entire Log History is listed To pause the report shown on the screen press To resume the report on the screen press again To capture a Log History use a communications software package such...

Page 102: ...age lh Log History CC85 000 7 12 96 13 23 18 KEY20 User Removed OK D4E2 001 7 12 96 13 23 51 KEY19 User Added OK A011 002 7 12 96 13 24 12 KEY20 Admin User Added OK 6FD2 003 7 12 96 13 26 51 Call Received 12BB 004 7 12 96 13 26 59 Attempt by KEY20 4321 Failed 4 Blocked User 7EF4 005 7 12 96 13 27 00 KEY20 4321 Disconnected BE31 006 7 12 96 13 27 06 Lucent RPSD Lock V1 0 Idle Locked A3F3 007 7 12 9...

Page 103: ...tatus Message Meaning 1 No RPSD Key Detected No RPSD Key was detected on the caller s line 2 No Response No response was returned from the RPSD Key when the RPSD Lock sent the challenge 3 Invalid User ID The RPSD Key user s ID is not in the table of users on the RPSD Lock 4 Blocked User The RPSD Key user was deliberately blocked by the administrator on the RPSD Lock 5 Invalid Response The RPSD Key...

Page 104: ...rative users must press twice and use a password or passkey to begin a new administrative session Security Alert It is recommended that you use the Quit command to terminate all administrative sessions to prevent unauthorized administrative access NOTE AUX Security must be enabled before an administrative session can be activated Sample Command and Response Parameter Description Q Quit command ENT...

Page 105: ...secret key information was retained In such a case the Key does not need to be reinitialized See the Initializing an RPSD Key in Chapter 2 for the procedure When a Remove User command is issued the RPSD Lock requests a y or an n as confirmation of the removal To check the user IDs or to check for permanent status use the List User Table command see instructions on page 3 34 Sample Command and Resp...

Page 106: ...on Use the Reset Statistics command to reset the access attempts statistics to zero This command does not reset cumulative totals Use the List Statistics command to obtain the access attempts statistics see instructions on page 3 34 Sample Command and Response Parameter Description rs Reset Statistics command ENTER rs Are You Sure Y N y JPLock01 447 08 14 96 14 20 43 Statistics Reset ...

Page 107: ...er Description sc Set Communications Parameters command speed length_ parity The communications link speed in bits per second bps and the character length in bps and parity on the serial port The options for speed are 300 600 1200 2400 4800 9600 or 19200 bps trailing zeros may be omitted for example you can enter 24 for 2400 bps If either speed or length_ parity are omitted the current entry is le...

Page 108: ...on st Status Display command Lucent Technologies RPSD JPLock01 The version number of the equipment Firmware The version number of the firmware Init Code Where and when the device was initialized Current Date The current date If the date is wrong you can correct it by using the Date Set command see instructions on page 3 31 Time The current time If the time is wrong you can correct it by using the ...

Page 109: ... RPSD Lock To set a Log ID use the ID Set command see instructions on page 3 31 Comms Set to The setting of the communications parameters To change the communications parameters use the Set Communications Parameters command see instructions on page 3 14 The default setting is 9600 baud at eight bits no parity Current Status The current status of the Lock ...

Page 110: ...with the passkey requirement the code is used in response to the challenge 1234567 Obtain the Test Response on the RPSD Key by using the List User Information command on the RPSD Key user s terminal See Chapter 4 Key Administration and Use for details on the Key List User Information command To check the user IDs use the List User Table command see instructions on page 3 34 Sample Command and Resp...

Page 111: ...and non permanent users may be unblocked To determine whether a user is blocked or to check the user IDs use the List User Table command see instructions on page 3 34 Sample Command and Response Parameter Description u Unblock User command user_id A unique identifier assigned to each user by the system administrator using the Add User command Use the List User Table command to check user IDs see i...

Page 112: ...n enter any number of restriction ID codes to assign the corresponding time restriction to the user s up to all restriction ID codes 14 To check that the restrictions were assigned as desired use the List User Table command see instructions on page 3 34 To check parameters of the restriction IDs use the List Restrictions command see instructions on page 3 26 Parameter Description ur User Restricti...

Page 113: ... C in the following example are assigned to all users beginning with the characters entered KEY in the following example ur KEY20 abc 193 08 16 96 11 33 21 KEY20 Assigned Restr ABC ur KEY abc 194 08 16 96 11 36 21 Restr KEY11 Assigned Restr ABC 195 08 16 96 11 36 23 Restr KEY12 Assigned Restr ABC 196 08 16 96 11 36 25 Restr KEY13 Assigned Restr ABC 197 08 16 96 11 36 27 Restr KEY14 Assigned Restr ...

Page 114: ... 54 Command Functions 3 Help Screens To obtain a help screen for any command enter a question mark followed by the command and press Sample Help Request and Help Response ENTER i Command I ID Set Function Set ID to precede all log messages from this device Format I log_id Example I LOCK A To clear ID type I ...

Page 115: ...sswords or the PassKey procedure The caller dials the port being protected on the communications system from the caller s terminal connected to the Key authentication takes place during which time the LEDs on the front panel of the RPSD Key indicate the status of the call and the caller is connected to the RMATS channel However before a Key can be used you must initialize it by using certain comma...

Page 116: ...ecret Key and Device ID A Add Admin User R Remove Admin User LA List Admin Users AS AUX Security ON OFF Q Quit Admin session Initialization Functions U Set User ID K Set Secret Key N Sets Device Number For Help Type Followed by Command The following is the Menu of Commands when the Key has been initialized Menu of Commands L List RPSD Key User Information H History Display D Date Set C Clock Set I...

Page 117: ...n Use the Set User ID command to enter a name that will identify the RPSD Key to the RPSD Lock Use this command only when initializing a previously uninitialized Key To use this command enter u user_id The user ID entered must match the user ID programmed into the Lock to identify that Key If you assign the same user ID to more than one Key assign different device numbers to those Keys Sample Comm...

Page 118: ...est Reply should be matched against the one for your Key given by the RPSD Lock If the replies match the Key has been correctly seeded with the secret information If the responses do not match use the Wipe Out command described in this section to return the Key to an uninitialized state and initialize the Key again Double check that you have the correct secret key If the tests fail again there is ...

Page 119: ...D The device number is associated with the Key for the purpose of identification by the Lock Use this command to initialize a previously uninitialized Key To use this command enter n device_number Do not duplicate existing device numbers The last four digits of the Key Lucent Technologies serial number are recommended Sample Command and Response n 12345 08 14 90 14 03 59 Device Number set to 12345...

Page 120: ...those commands listed in the Menu of Commands after the Key device has been initialized The command functions are A Add Administrative User AS AUX Security C Clock Set D Date Set H History Display I Set Log ID L List User Information LA List Administrative Users Q Quit R Remove Administrative User S Status Display SC Set Communications Parameters W Wipe Out Help Screens ...

Page 121: ...ed If you leave the secret_key field blank the secret_key may be generated by the Lock device or may be input as a 20 digit octal number Sample Command and Response for Adding an Administrative User Via a PassKey A TONI K 010 02 14 95 05 42 04 TONI Admin User Added OK Enter These Digits into PassKey as Key1 or Key2 5740 4176 1276 6330 2620 Test Challenge 1234557 Reply 770 1131 See PassKey Authenti...

Page 122: ...555 024 402 Issue 1 October 1996 Key Administration and Use Page 4 8 Command Functions 4 NOTE If the secret_key is randomly assigned by the Lock device in other words the field is omitted the field must be delimited by a comma Example a sam ak ...

Page 123: ... added Sample Commands and Responses To determine the AUX Key status type as AS AUX Port Security is OFF To enable AUX Security type as on AS ON 008 02 14 95 05 32 04 AUX Port Security is ON To disable AUX Security type as off AS OFF 014 02 14 95 04 20 53 AUX Port Security is OFF Parameter Description as The AUX Security command to view the security status of the Key as on The AUX Security command...

Page 124: ...he Key s internal clock to ensure the accuracy of the History Log Set the clock to local time standards in 24 hour clock format for example 16 00 for 4 00 PM Use a colon to separate the hours and minutes Also use a leading zero if you set the time less than 10 00 Sample Command and Response c 13 15 8 14 90 13 15 00 Time Changed OK Parameter Description c The Clock Set command hh mm The time in hou...

Page 125: ... be certain that it is correct To check the date use the Status Display command described in this section Use two digits for each part of the date including a zero at the beginning for months or days less than 10 for example 08 01 90 The last two digits are used for the year Also be certain to separate the month day and year with the slash character Sample Command and Response d 08 14 90 08 14 90 ...

Page 126: ...e Sequence Number is appended to the Message Authentication Code the fields are delimited with a period When you list the report with the ALL command toggle to pause and resume the report The and ALL parameters may be used in combination Sample Command and Response h Log History 2375 000 02 14 95 09 22 23 Lucent RPSD Key V2 0x Reset EC32 001 02 14 95 09 22 58 User ID set to ATT USER1A ABB8 002 02 ...

Page 127: ...ers separated by a decimal point the Message Authentication Code and the Sequence Number Date The second field provides the date the message was generated Time The second field provides the time the message was generated in 24 hour clock format Message The last field contains the status message Failed attempts at access generate a message at the RPSD Lock that is sent to the RPSD Key There are nin...

Page 128: ...tify which Key is associated with which status message This is especially important where multiple devices share a single administration terminal The command adds the ID to the beginning of each message generated by the Key Sample Command and Response i KEY11 KEY11 08 14 90 14 20 08 Log ID Changed OK Parameter Description i The Set Log ID command log_id An identifier of up to eight characters sele...

Page 129: ...ters l Description Use the List User Information command to list the user ID device number and test response number for the Key To use the List User Information command enter l at the prompt of the Key user s terminal Sample Command and Response l User ID KEY20 Device Number 12345 Test Response 8119704 Parameter Description l The List User Information command ENTER ENTER ...

Page 130: ...ormation for that specified user or for all users who have the same beginning characters For example if you enter LA a the command lists information for all administrative user IDs that begin with A Sample Command and Response LA User ID User Type DAN AW SAM AK End of List The fields on the List User Table screen are User ID the user ID of the RPSD Key used to access the channel User Type the User...

Page 131: ...administrative session and return the RPSD Key device to a secure mode NOTE AUX Security AS must be enabled to have an administrative session To re access the administrative session press twice and authenticate yourself via the Password or PassKey mode Sample Command and Response Q Admin Session Terminated 017 02 14 95 04 23 18 TONI Admin Session Terminated Parameter Description Q The Quit command...

Page 132: ...iption Use the Remove Administrative User command to remove an administrative user from the Administrative Table The system prompts for confirmation prior to removing the adminstrative user Sample Command and Response R TONI Are You Sure Y N Y 011 02 14 95 05 43 05 TONI User Removed OK Parameter Description r The Remove Administrative User command user_id The user ID programmed for that Key ENTER ...

Page 133: ...ware gives the version number of the firmware Init Code tells where and when the device was initialized Current Date gives the current date If the date is wrong it can be corrected by using the Date Set command described in this section Time gives the current time If the time is wrong it can be corrected by using the Time Set command described in this section Log ID provides the Log ID of the RPSD...

Page 134: ... 8 bit no parity The options for speed and length_parity are Speed 300 600 1200 4800 9600 or 19 200 bps trailing zeros may be omitted meaning you may enter sc 24 for 2400 bps Length_parity 8N 8 bits no parity 7N 7 bits no parity 7E 7 bits even parity 70 7 bits odd parity NOTE If you omit either speed or length_parity the current entry is left unchanged Sample Command and Response sc 1200 7E 08 14 ...

Page 135: ...alized state If you use the Wipe Out command the Key cannot access the Lock until the entire initialization procedure is performed again For this reason be sure you want to return the Key to an uninitialized state before using this command The RPSD Key requests confirmation of the Wipe Out command Sample Command and Response w THIS FUNCTION RENDERS DEVICE UNABLE TO ACCESS RPSD LOCK Are You Sure Yo...

Page 136: ...escription To obtain a help screen for any command enter a question mark followed by the command and Sample Command and Response i Command I ID Set Function Set ID to precede all log messages from this device Format I log_id Example I KEY A To clear ID type I Parameter Description The Help command command Any one of the commands used on an initialized Key ENTER ENTER ...

Page 137: ...pear on your computer screen Passwords can contain any printable ASCII character including a space NOTE Although user IDs are not case sensitive passwords are case sensitive therefore note whether you enter the password in upper or lower case Security Alert Passwords should be as long as allowed Passwords should be hard to guess and therefore should not contain all the same numbers for example 888...

Page 138: ... your identification via the PassKey 1 Press twice RPSD prompts for the user ID 2 Type the pre authorized administrative ID and press 3 Turn the PassKey on and press the red button 4 Enter your Personal Identification Number PIN and press RPSD displays a challenge on the screen 5 Type the challenge into the PassKey and press The PassKey displays a response 6 Type the response into the terminal and...

Page 139: ... See Replacing the RPSD Lock or Key in this chapter When access is successful status messages like the following appear on the RPSD Key user s administration terminal connected via the Key Auxiliary Port 07 12 90 13 58 27 Calling Out 07 12 90 13 58 37 Dialing Complete 07 12 90 13 59 07 Authentication Complete 07 12 90 14 05 41 Lucent RPSD Key V1 1 Idle However access attempts may not always be suc...

Page 140: ...er fails to gain access to the RMATS channel because the administrator has put a block on that Key or because access has been restricted for that time of day the system is functioning properly However the Lock reports this action as a Key user being unable to gain access You can also obtain an access failure message for the most recent call attempt by using the Last Call Status Test See Last Call ...

Page 141: ...vel of service 3 Invalid User ID The RPSD Key user ID is not in the table of users on the RPSD Lock Add the Key user to the user table if it is someone you want to have access to the RMATS channel This message may indicate an unauthorized attempt at access Check the Test Responses to make sure the RPSD Lock and RPSD Key Test Responses match If access for this Key is desired and the Test Responses ...

Page 142: ...uninitialized state Then use the Key initialization commands also found in Chapter 4 6 Outgoing Call An outgoing call is being placed from the Lock This is not proper usage so the Lock disconnects the call No action necessary This is not a call failure 7 Ring No Answer The Lock rang the modem but the modem did not pick up Run the Modem Ring test described on page 5 8 and follow the directions for ...

Page 143: ...berate restriction placed on access to the Lock by the administrator If you must have access at this time contact the system administrator The administrator may bypass the time restriction in one of the following ways removing the time restriction on that Key user or using the Force Connect Command See Chapter 3 for instructions on removing time restrictions or using the Force Connect command Tabl...

Page 144: ...nd perform the diagnostics the second to physically replace various pieces of hardware Built in Diagnostics The RPSD system provides three diagnostic tests which are used to determine the cause of access failures These are Self Check test Last Call Status test Modem Ring test All three tests are performed by dialing the RMATS channel from a touch tone telephone and entering a code for the test you...

Page 145: ...come for the last call attempt to the Lock The test responds either with slow beeps the number of which corresponds to the nine status messages explained in Table 5 1 or three fast beeps which means that the last call attempt was successful Follow these steps to perform the Last Call Status Test 1 Dial the RMATS channel from a touch tone telephone When the call is answered you will hear a tone ind...

Page 146: ...connection to the RPSD Lock 2 Press 3 on the telephone pad The RPSD Lock responds to the command by ringing the modem While the Lock rings the modem you hear a simulated ring on the telephone receiver When the modem picks up you hear the answer tone The answer tone will not last long enough for the modem to perform handshaking The Lock then sends three quick beeps to your telephone and disconnects...

Page 147: ... Test is in the communications system modem follow these steps 1 Disconnect the modular telephone plug from the communications system modem and connect a touch tone telephone to the modem 2 Call the RMATS channel from another touch tone telephone and perform the Modem Ring Test described on page 5 8 3 If the phone you substituted for the modem rings have someone answer it If the connection is fine...

Page 148: ... may remove the RPSD Lock from the line and to maintain access to the RMATS channel connect the modem directly to the CO line Do this only if the Force Connect command fails as well See Chapter 3 for further information on the Force Connect command Security Alert Without the Lock the line is not secure Lucent Technologies technicians should consider a failed Lock or Key a Severity 4 trouble Custom...

Page 149: ...initialize the replacement Lock with the same information as the original Security Alert Save the secret information in a secure location to maintain the security of the system If the security of the Seed Value is breached RPSD security itself is lost The RPSD Lock and Key should be reinitialized with a new secret key NOTE The RPSD Secret Key Seed Value must be physically protected and secured Luc...

Page 150: ...Remote Port Security Device User s Guide 555 024 402 Issue 1 October 1996 Troubleshooting Page 5 12 Saving the Key Seed Value 5 ...

Page 151: ...t Security Device User s Guide 555 024 402 Issue 1 October 1996 A 0 Cables Connectors and Ports Table A 1 shows the cables connectors and ports for installing the RPSD system This table includes optional connections as well as the basic configuration ...

Page 152: ...ith RPSD Lock RPSD Lock CO line or modem 14 ft cable with modular connector on each end Supplied with RPSD Lock RPSD Lock CO line or modem RJ11 wall jack XXXXXX CO line RJ11 TELCO jack on RPSD Key EIA RS 232 cable XXXXXX DB9 DB25 cable at RPSD Lock DB25 at administration terminal or printer or A B switch DB9 to DB25 cable XXXXXX RPSD Lock Cable to administration terminal or printer or A B switch D...

Page 153: ...te Port Security Device User s Guide 555 024 402 Issue 1 October 1996 B A Front Panel LEDs Both the RPSD Lock and the RPSD Key have seven LEDs on their front panels This appendix explains the meaning of each LED and its various states ...

Page 154: ...s of the RPSD Lock when the different LEDs are lit Table B 1 Lock LEDs and Meanings LED 1 2 3 4 5 6 7 Meaning On On Off Off Off Off Off An incoming call is being processed On Off On Off Off Off Off The RPSD Lock is ringing the modem On Off Off On Off Off Off An outgoing call is in progress from the modem On Off Off Off On Off Off The Lock is idle and in a ready condition able to accept incoming ca...

Page 155: ...atus of the RPSD Key when the different LEDs are lit Table B 2 Key LEDs and Meanings LED 1 2 3 4 5 6 7 Meaning On On Off Off Off Off Off An incoming call is being processed On Off On Off Off Off Off Blinks on power up On Off Off On Off Off Off An outgoing call is in progress from the modem On Off Off Off On Off Off The Key is idle and in a ready condition able to place outgoing calls or process in...

Page 156: ...Remote Port Security Device User s Guide 555 024 402 Issue 1 October 1996 Front Panel LEDs Page B 4 RPSD Key B ...

Reviews: