Home > Lucent Technologies > Communications System > Lucent Technologies Remote Port Security Device Users Guide

Lucent Technologies Remote Port Security Device Users Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Lucent Technologies Remote Port Security Device Users Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							555-024-402
    Comcode 107748717
    Issue 1
    October 1996
    Remote Port Security Device
    User’s Guide 
    						
    							Copyright  1996, Lucent Technologies Lucent Technologies 555-024-402
    All Rights ReservedIssue 1
    Printed in U.S.A.October 1996
    Notice
    Every effort was made to ensure that the information in this book was complete and accurate at the time of printing.
    However, information is subject to change.
    Your Responsibility for Your Systems Security
    Toll fraud is the unauthorized use of your telecommunications system by an unauthorized party, for example, persons
    other than your companys employees, agents, subcontractors, or persons working on your companys behalf. Note
    that there may be a risk of toll fraud associated with your telecommunications system, and if toll fraud occurs, it can
    result in substantial additional charges for your telecommunications services.
    You and your system manager are responsible for the security of your system, such as programming and configuring
    your equipment to prevent unauthorized use. The system manager is also responsible for reading all installation, in-
    struction, and system administration documents provided with this product in order to fully understand the features
    that can introduce risk of toll fraud and the steps that can be taken to reduce that risk. Lucent Technologies does not
    warrant that this product is immune from or will prevent unauthorized use of common-carrier telecommunication ser-
    vices or facilities accessed through or connected to it. Lucent Technologies will not be responsible for any charges
    that result from such unauthorized use.
    Federal Communication Commission (FCC) Statement
    This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15
    of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the
    equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequen-
    cy energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference
    to radio communications. However, there is no guarantee that interference will not occur in a particular installation.
    For further FCC information, see “Customer Support Information” below.
    Trademarks
    DEFINITY, UNIX, AUDIX, DIMENSION, MERLIN, and PARTNER are registered trademarks of Lucent Technologies in
    the US and other countries.
    Ordering Information
    Call:Lucent Technologies Fulfillment Center
    Voice 1 800 457-1235International Voice 317 361-5353
    Fax 1 800 457-1764International Fax 317 361-5355
    Write:Lucent Technologies Fulfillment Center
    P.O. Box 4100
    Crawfordsville, IN 47933
    Order:Document No. Lucent Technologies 555-024-402
    Comcode 10774877
    Issue 2, July 1996
    For more information about Lucent Technologies documents, refer to the section entitled “Related Documents” in
    “About This Book.”
    Support Telephone Number
    In the continental US, Lucent Technologies provides a toll-free customer helpline 24 hours a day. Call the Lucent
    Technologies Helpline at 1 800 242-2121 or your Lucent Technologies authorized dealer if you need assistance when
    installing, programming, or using your system. Outside the continental US, contact your local Lucent Technologies
    representative.
    Lucent Technologies Fraud Intervention
    If you 
    suspect you are being victimized by toll fraud and you need technical support or assistance, call the BCS Tech-
    nical Service Center at 1 800 643-2353 or 1 800 242-2121.
    Warranty
    Lucent Technologies provides a limited warranty on this product. Refer to “Limited Warranty” in “Customer Support
    Information.” 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Contents 
    Page iii  
    Contents
    Contents iii
    Customer Support Information xi
    nSupport Telephone Numberxi
    nSecurity of Your System: Preventing Toll Fraudxii
    nLucent Technologies Fraud Interventionxiii
    nGuaranteexiii
    RPSD Lock with no Keysxiii
    RPSD Lock with Keysxiv
    nLimited Warrantyxv
    nFCC Notification and Repair Informationxvi
    nInstallation and Operational Proceduresxvii
    nFederal Communication Commission
    (FCC) Electromagnetic Interference
    Informationxviii
    About This Book xix
    nIntended Audiencesxix
    nResponsibilitiesxix
    nTerms and Conventionsxx
    nTypographical Conventionsxxi
    nHow to Use This Bookxxi
    nProduct Safety Labelsxxii
    nRelated Documentsxxii
    nHow to Comment on This Documentxxii
    1 Introduction 1-1
    nRPSD System1-2
    nHardware Components1-5
    RPSD Lock1-5
    RPSD Key1-7
    Modems1-8
    RPSD Lock or Key Administration Terminal1-9
    RPSD Lock Administration Printer1-9
    nSoftware Components1-10
    nSystem Administration1-11
    Time of Day Access1-11 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Contents 
    Page iv  
    System Activity Log1-12
    Single Point Administration1-14
    Block Lucent Technologies and Other Key Users1-15
    Force Connect/Disconnect1-15
    Authorized Keys1-16
    2 Installation 2-1
    nRoom Layout/Environment2-2
    Power Supply2-2
    Location of Administration Terminal or Printer2-3
    nInstallation2-4
    Cables, Connectors, and Ports2-5
    Installing the RPSD Lock2-5
    Installing the RPSD Key2-16
    Testing an Uninitialized Key2-18
    Initializing the RPSD Lock2-18
    Initializing the RPSD Key2-19
    nTesting the RPSD Lock Installation2-20
    3 RPSD System Administration 3-1
    nMenu of Commands3-2
    nCommand Functions3-5
    A—Add User3-6
    AH—Access History3-11
    AA—Administrative Access History3-14
    AF—Administrative Failure History3-17
    AS—AUX Security3-19
    B—Block User3-21
    CR—Change Restriction3-22
    C—Clock Set3-24
    D—Date Set3-25
    FH—Failure History3-26
    FC—Force Connect3-29
    FD—Force Disconnect3-30
    I—ID Set3-31
    LR—List Restrictions3-32
    LS—List Statistics3-34 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Contents 
    Page v  
    L—List User Table3-36
    LH—Log History3-40
    Q—Quit3-44
    R—Remove User3-45
    RS—Reset Statistics3-46
    SC—Set Communications Parameters3-47
    ST—Status Display3-48
    T—Test User3-50
    U—Unblock User3-51
    UR—User Restrictions3-52
    Help Screens3-54
    4 Key Administration and Use 4-1
    nRPSD Key User Command Set4-2
    nInitialization Functions4-3
    U—Set User ID4-3
    K—Set Secret Key4-4
    N—Set Device Number4-5
    nCommand Functions4-6
    A—Add Administrative User4-7
    AS—AUX Security4-9
    C—Clock Set4-10
    D—Date Set4-11
    H—History Display4-12
    I—Set Log ID4-14
    L—List User Information4-15
    LA—List Administrative Users4-16
    Q—Quit4-17
    R—Remove Administrative User4-18
    S—Status Display4-19
    SC—Set Communications Parameters4-20
    W—Wipe Out4-21
    ?—Help4-22
    nAuthentication4-23
    Password Authentication4-23
    PassKey Authentication4-24 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Contents 
    Page vi  
    5 Troubleshooting 5-1
    nAccess Failure Messages.5-2
    nTesting the RPSD Lock5-6
    Built-in Diagnostics5-6
    Hardware Replacement5-9
    nReplacing the RPSD Lock or Key5-10
    nSaving the Key Seed Value5-11
    A Cables, Connectors, and Ports A-1
    B Front Panel LEDs B-1
    nRPSD LockB-2
    nRPSD KeyB-3 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
     
    Page ix  
    When installing telephone equipment, always follow basic safety precautions to reduce 
    the risk of fire, electrical shock, and injury to persons, including:
    n Read and understand all instructions.
    n Follow all warnings and instructions marked on or packed with the 
    product.
    n Never install this unit or telephone wiring for it during a lightning storm.
    n Never install a telephone jack in a wet location unless the jack is 
    specifically designed for wet locations.
    n Never touch uninsulated telephone wires or terminals unless the 
    telephone wiring has been disconnected at the network interface.
    n Use caution when installing or modifying telephone lines.
    n Use only Lucent Technologies-manufactured circuit packs, carrier 
    assemblies, and power units in the  control unit.
    n Use only Lucent Technologies-recommended/approved accessories.
    n Do not install this product near water, for example, in a wet basement 
    location.
    n Do not overload wall outlets, as this can result in the risk of fire or 
    electrical shock.
    n Do not attach the power supply cord to building surfaces. Do not allow 
    anything to rest on the power cord. Do not locate this product where the 
    cord will be abused by persons walking on it.
    nUnplug the product from the wall outlet before cleaning. Use a damp cloth 
    for cleaning. Do not use cleaners or aerosol cleaners.
    n Do not operate the system if chemical gas leakage is suspected in the 
    area. Use telephones located in some other safe area to report the trouble.
    !WARNING:
    DO NOT open the RPSD Lock or Key devices. There are no user 
    serviceable parts inside the units. Only an authorized technician should 
    open a unit for required maintenance or upgrading purposes. 
    SAVE THESE INSTRUCTIONS
    The exclamation point in an equilateral triangle is 
    intended to alert the user to the presence of important 
    operating and maintenance (servicing) instructions in 
    the literature accompanying the product.
     
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
     
    Page x   
    						
    							Customer Support Information 
    Page xi Support Telephone Number 
    Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Customer Support Information
    Support Telephone Number
     In the USA only, Lucent Technologies provides a toll-tree customer Helpline, 
    1 800 242-2121, 24 hours a day. If you need assistance when installing, 
    programming, or using your system, call the Helpline, or your Lucent 
    Technologies authorized representative.
    Outside the USA, if you need assistance when installing, programming, or using 
    your system, contact your Lucent Technologies authorized representative.  
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Customer Support Information 
    Page xii Security of Your System: Preventing Toll Fraud 
    Security of Your System: Preventing 
    To l l  F r a u d
     As a customer of a new communications device, you should be aware that there 
    is an increasing problem of telephone toll fraud. Telephone toll fraud can occur in 
    many forms, despite the numerous efforts of telephone companies and 
    telephone equipment manufacturers to control it. Some individuals use electronic 
    devices to prevent or falsify records of these calls. Others charge calls to 
    someone else’s number by illegally using lost or stolen calling cards, billing 
    innocent parties, clipping on to someone else’s line, or breaking into someone 
    else’s telephone equipment physically or electronically. In certain instances, 
    unauthorized individuals make connections to the telephone network through the 
    use of remote access features.
    Common carriers are required by law to collect their tariffed charges. While these 
    charges are fraudulent charges made by persons with criminal intent, applicable 
    tariffs state that the customer of record is responsible for payment of all long- 
    distance or other network charges. Lucent Technologies cannot be responsible 
    for such charges and will not make any allowance or give any credit for charges 
    that result from unauthorized access. 
    To minimize the risk of unauthorized access to your communications system or 
    device:
    nWhen possible, restrict the off-network capability of off- premises callers, 
    using calling restrictions, Facility Restriction Levels, and Disallowed List 
    capabilities.
    nWhen possible, block out-of-hours calling.
    nFrequently monitor system call detail reports for quicker detection of any 
    unauthorized or abnormal calling patterns.
    nLimit outcalling to persons on a need-to-have basis.
    The communications system, through proper administration, can help you 
    reduce the risk of unauthorized persons gaining access to the network. However, 
    phone numbers and authorization codes can be compromised when overheard 
    in a public location, lost through theft of a wallet or purse containing access 
    information, or when treated carelessly (writing codes on a piece of paper and 
    improperly discarding them).
    Additionally, hackers may use a computer to dial an access code and then 
    publish the information to other hackers. Substantial charges can accumulate 
    quickly. It is your responsibility to take appropriate steps to implement the 
    features properly, to evaluate and administer the various restriction levels, and to 
    protect and carefully distribute access codes.
    Under applicable tariffs, you will be responsible for payment of toll charges. 
    Lucent Technologies cannot be responsible for such charges and will not make 
    any allowance or give any credit resulting from unauthorized access.  
    						
    All Lucent Technologies manuals Comments (0)

    Related Manuals for Lucent Technologies Remote Port Security Device Users Guide