Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies Remote Port Security Device Users Guide
Lucent Technologies Remote Port Security Device Users Guide
Have a look at the manual Lucent Technologies Remote Port Security Device Users Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
555-024-402 Comcode 107748717 Issue 1 October 1996 Remote Port Security Device User’s Guide
Copyright 1996, Lucent Technologies Lucent Technologies 555-024-402 All Rights ReservedIssue 1 Printed in U.S.A.October 1996 Notice Every effort was made to ensure that the information in this book was complete and accurate at the time of printing. However, information is subject to change. Your Responsibility for Your Systems Security Toll fraud is the unauthorized use of your telecommunications system by an unauthorized party, for example, persons other than your companys employees, agents, subcontractors, or persons working on your companys behalf. Note that there may be a risk of toll fraud associated with your telecommunications system, and if toll fraud occurs, it can result in substantial additional charges for your telecommunications services. You and your system manager are responsible for the security of your system, such as programming and configuring your equipment to prevent unauthorized use. The system manager is also responsible for reading all installation, in- struction, and system administration documents provided with this product in order to fully understand the features that can introduce risk of toll fraud and the steps that can be taken to reduce that risk. Lucent Technologies does not warrant that this product is immune from or will prevent unauthorized use of common-carrier telecommunication ser- vices or facilities accessed through or connected to it. Lucent Technologies will not be responsible for any charges that result from such unauthorized use. Federal Communication Commission (FCC) Statement This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequen- cy energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. For further FCC information, see “Customer Support Information” below. Trademarks DEFINITY, UNIX, AUDIX, DIMENSION, MERLIN, and PARTNER are registered trademarks of Lucent Technologies in the US and other countries. Ordering Information Call:Lucent Technologies Fulfillment Center Voice 1 800 457-1235International Voice 317 361-5353 Fax 1 800 457-1764International Fax 317 361-5355 Write:Lucent Technologies Fulfillment Center P.O. Box 4100 Crawfordsville, IN 47933 Order:Document No. Lucent Technologies 555-024-402 Comcode 10774877 Issue 2, July 1996 For more information about Lucent Technologies documents, refer to the section entitled “Related Documents” in “About This Book.” Support Telephone Number In the continental US, Lucent Technologies provides a toll-free customer helpline 24 hours a day. Call the Lucent Technologies Helpline at 1 800 242-2121 or your Lucent Technologies authorized dealer if you need assistance when installing, programming, or using your system. Outside the continental US, contact your local Lucent Technologies representative. Lucent Technologies Fraud Intervention If you suspect you are being victimized by toll fraud and you need technical support or assistance, call the BCS Tech- nical Service Center at 1 800 643-2353 or 1 800 242-2121. Warranty Lucent Technologies provides a limited warranty on this product. Refer to “Limited Warranty” in “Customer Support Information.”
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 Contents Page iii Contents Contents iii Customer Support Information xi nSupport Telephone Numberxi nSecurity of Your System: Preventing Toll Fraudxii nLucent Technologies Fraud Interventionxiii nGuaranteexiii RPSD Lock with no Keysxiii RPSD Lock with Keysxiv nLimited Warrantyxv nFCC Notification and Repair Informationxvi nInstallation and Operational Proceduresxvii nFederal Communication Commission (FCC) Electromagnetic Interference Informationxviii About This Book xix nIntended Audiencesxix nResponsibilitiesxix nTerms and Conventionsxx nTypographical Conventionsxxi nHow to Use This Bookxxi nProduct Safety Labelsxxii nRelated Documentsxxii nHow to Comment on This Documentxxii 1 Introduction 1-1 nRPSD System1-2 nHardware Components1-5 RPSD Lock1-5 RPSD Key1-7 Modems1-8 RPSD Lock or Key Administration Terminal1-9 RPSD Lock Administration Printer1-9 nSoftware Components1-10 nSystem Administration1-11 Time of Day Access1-11
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 Contents Page iv System Activity Log1-12 Single Point Administration1-14 Block Lucent Technologies and Other Key Users1-15 Force Connect/Disconnect1-15 Authorized Keys1-16 2 Installation 2-1 nRoom Layout/Environment2-2 Power Supply2-2 Location of Administration Terminal or Printer2-3 nInstallation2-4 Cables, Connectors, and Ports2-5 Installing the RPSD Lock2-5 Installing the RPSD Key2-16 Testing an Uninitialized Key2-18 Initializing the RPSD Lock2-18 Initializing the RPSD Key2-19 nTesting the RPSD Lock Installation2-20 3 RPSD System Administration 3-1 nMenu of Commands3-2 nCommand Functions3-5 A—Add User3-6 AH—Access History3-11 AA—Administrative Access History3-14 AF—Administrative Failure History3-17 AS—AUX Security3-19 B—Block User3-21 CR—Change Restriction3-22 C—Clock Set3-24 D—Date Set3-25 FH—Failure History3-26 FC—Force Connect3-29 FD—Force Disconnect3-30 I—ID Set3-31 LR—List Restrictions3-32 LS—List Statistics3-34
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 Contents Page v L—List User Table3-36 LH—Log History3-40 Q—Quit3-44 R—Remove User3-45 RS—Reset Statistics3-46 SC—Set Communications Parameters3-47 ST—Status Display3-48 T—Test User3-50 U—Unblock User3-51 UR—User Restrictions3-52 Help Screens3-54 4 Key Administration and Use 4-1 nRPSD Key User Command Set4-2 nInitialization Functions4-3 U—Set User ID4-3 K—Set Secret Key4-4 N—Set Device Number4-5 nCommand Functions4-6 A—Add Administrative User4-7 AS—AUX Security4-9 C—Clock Set4-10 D—Date Set4-11 H—History Display4-12 I—Set Log ID4-14 L—List User Information4-15 LA—List Administrative Users4-16 Q—Quit4-17 R—Remove Administrative User4-18 S—Status Display4-19 SC—Set Communications Parameters4-20 W—Wipe Out4-21 ?—Help4-22 nAuthentication4-23 Password Authentication4-23 PassKey Authentication4-24
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 Contents Page vi 5 Troubleshooting 5-1 nAccess Failure Messages.5-2 nTesting the RPSD Lock5-6 Built-in Diagnostics5-6 Hardware Replacement5-9 nReplacing the RPSD Lock or Key5-10 nSaving the Key Seed Value5-11 A Cables, Connectors, and Ports A-1 B Front Panel LEDs B-1 nRPSD LockB-2 nRPSD KeyB-3
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 Page ix When installing telephone equipment, always follow basic safety precautions to reduce the risk of fire, electrical shock, and injury to persons, including: n Read and understand all instructions. n Follow all warnings and instructions marked on or packed with the product. n Never install this unit or telephone wiring for it during a lightning storm. n Never install a telephone jack in a wet location unless the jack is specifically designed for wet locations. n Never touch uninsulated telephone wires or terminals unless the telephone wiring has been disconnected at the network interface. n Use caution when installing or modifying telephone lines. n Use only Lucent Technologies-manufactured circuit packs, carrier assemblies, and power units in the control unit. n Use only Lucent Technologies-recommended/approved accessories. n Do not install this product near water, for example, in a wet basement location. n Do not overload wall outlets, as this can result in the risk of fire or electrical shock. n Do not attach the power supply cord to building surfaces. Do not allow anything to rest on the power cord. Do not locate this product where the cord will be abused by persons walking on it. nUnplug the product from the wall outlet before cleaning. Use a damp cloth for cleaning. Do not use cleaners or aerosol cleaners. n Do not operate the system if chemical gas leakage is suspected in the area. Use telephones located in some other safe area to report the trouble. !WARNING: DO NOT open the RPSD Lock or Key devices. There are no user serviceable parts inside the units. Only an authorized technician should open a unit for required maintenance or upgrading purposes. SAVE THESE INSTRUCTIONS The exclamation point in an equilateral triangle is intended to alert the user to the presence of important operating and maintenance (servicing) instructions in the literature accompanying the product.
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 Page x
Customer Support Information Page xi Support Telephone Number Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 Customer Support Information Support Telephone Number In the USA only, Lucent Technologies provides a toll-tree customer Helpline, 1 800 242-2121, 24 hours a day. If you need assistance when installing, programming, or using your system, call the Helpline, or your Lucent Technologies authorized representative. Outside the USA, if you need assistance when installing, programming, or using your system, contact your Lucent Technologies authorized representative.
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 Customer Support Information Page xii Security of Your System: Preventing Toll Fraud Security of Your System: Preventing To l l F r a u d As a customer of a new communications device, you should be aware that there is an increasing problem of telephone toll fraud. Telephone toll fraud can occur in many forms, despite the numerous efforts of telephone companies and telephone equipment manufacturers to control it. Some individuals use electronic devices to prevent or falsify records of these calls. Others charge calls to someone else’s number by illegally using lost or stolen calling cards, billing innocent parties, clipping on to someone else’s line, or breaking into someone else’s telephone equipment physically or electronically. In certain instances, unauthorized individuals make connections to the telephone network through the use of remote access features. Common carriers are required by law to collect their tariffed charges. While these charges are fraudulent charges made by persons with criminal intent, applicable tariffs state that the customer of record is responsible for payment of all long- distance or other network charges. Lucent Technologies cannot be responsible for such charges and will not make any allowance or give any credit for charges that result from unauthorized access. To minimize the risk of unauthorized access to your communications system or device: nWhen possible, restrict the off-network capability of off- premises callers, using calling restrictions, Facility Restriction Levels, and Disallowed List capabilities. nWhen possible, block out-of-hours calling. nFrequently monitor system call detail reports for quicker detection of any unauthorized or abnormal calling patterns. nLimit outcalling to persons on a need-to-have basis. The communications system, through proper administration, can help you reduce the risk of unauthorized persons gaining access to the network. However, phone numbers and authorization codes can be compromised when overheard in a public location, lost through theft of a wallet or purse containing access information, or when treated carelessly (writing codes on a piece of paper and improperly discarding them). Additionally, hackers may use a computer to dial an access code and then publish the information to other hackers. Substantial charges can accumulate quickly. It is your responsibility to take appropriate steps to implement the features properly, to evaluate and administer the various restriction levels, and to protect and carefully distribute access codes. Under applicable tariffs, you will be responsible for payment of toll charges. Lucent Technologies cannot be responsible for such charges and will not make any allowance or give any credit resulting from unauthorized access.