Home > Lucent Technologies > Communications System > Lucent Technologies Remote Port Security Device Users Guide

Lucent Technologies Remote Port Security Device Users Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Lucent Technologies Remote Port Security Device Users Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    RPSD System Administration 
    Page 3-31 Command Functions 
    3
    I—ID Set
    Syntax and Parameters
    To set a log ID:
    i  
    To clear a log ID:
    i 
    Description
    Use the ID Set command to set a unique identifier for the RPSD Lock. It is useful 
    when more than one Lock is in operation. The Lock’s ID is added to the 
    beginning of status messages to identify the Lock concerned.
    Sample Command and Response
    In the sample, the log ID is added to the beginning of the status message. It will 
    appear here on all status messages once the ID is set.Parameter Description
    iID Set command
    The name you select to identify the Lock. The Log ID is 
    limited to eight alphanumeric characters.
    ENTER
    ENTER
    > i JPLock02
    JPLock02 004 08/17/96 15:42:21 Log ID Changed OK 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    RPSD System Administration 
    Page 3-32 Command Functions 
    3
    LR—List Restrictions
     Syntax and Parameters
    To list the time periods and days for time restrictions for all restriction IDs A to N:
    lr 
    To list the time period and day for time restriction for a specific restriction ID:
    lr 
    Description
    Use the List Restrictions command to list the administered time periods and days 
    during which time restrictions can be placed on one or more users. Up to 14 
    separate time periods can be created; each is assigned a single-character code 
    from “A” to “N.” Use the Change Restrictions command to set the restriction time 
    periods and to associate a code letter to each period of time and day defined 
    (see instructions on page 3-22). Then apply the code to a specific user or users 
    using the User Restriction command (see instructions on page 3-52). Parameter Description
    lrList Restrictions command
    A single character from A–N (14 possible restriction codes) 
    used as a code to identify the specific time periods and 
    days during which time restrictions may be placed on one or 
    more users. The code is assigned to the users you wish to 
    restrict for that period by using the User Restrictions 
    command (described on page 3-52). 
    ENTER
    ENTER 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    RPSD System Administration 
    Page 3-33 Command Functions 
    3
    Sample Command and Response
    The fields of the List Restriction screen are:
    Restriction IDA single character from A–N (14 possible restriction codes) 
    used as a code to identify the specific time periods and 
    days during which time restrictions can be placed on one or 
    more users.
    Start TimeThe time of day, in 24-hour clock format, when the restriction 
    begins
    End TimeThe time of day, in 24-hour clock format, when the restriction 
    ends
    Days of the 
    WeekThe days on which the restricted times take effect
    > lr
    Restriction ID Start Time End Time Days of Week
    A 18:00 24:00 Sat, Sun
    B 12:00 15:00 Sat, Sun
    C 16:00 20:00 Mon
    D 01:00 08:00 Mon, Tues, Wed, Thu, 
    Fri
    E 00:00 09:00 Thu
    --  End of List  --
    > 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    RPSD System Administration 
    Page 3-34 Command Functions 
    3
    LS—List Statistics
    Syntax and Parameters
    ls 
    Description
    Use the List Statistics command to display a statistical summary of call attempts 
    and failures, both cumulative and since the last time the statistical summary was 
    reset. Reset the summary by using the Reset Statistics command (see 
    instructions on page 3-46).
    Statistics are listed for administrative users, RPSD/Key (non-administrative) 
    users, and permanent users. Call attempts and failures to the administrative 
    interface are updated only if AUX security is enabled. See instructions for the Key 
    AUX Security command in the “Command Functions” section of Chapter 4.
    Sample Command and Response
    Parameter Description
    lsList Statistics command
    ENTER
    > ls
    ---RPSD/Lock Access Attempt Statistics  -  Last Reset: 08/14/96
    Since Last Reset  Cumulative
    RPSD/Key Admin. RPSD/Key Admin
    Successful Authentications   1   0    1   0
    Failed Attempts by Reason
    (1) No RPSD/Key Detected   0   0    0   0
    (2)  No Response   0   0    0   0
    (3)  Invalid User ID   1   0    1   0
    (4)  Blocked User   0   0    0   0
    (5)  Invalid Response   0   0    0   0
    (6)  Outgoing Call   0   0    0   0
    (7)  Ring  -  No answer   0   0    0   0
    (8)  Force Disconnect   0   0    0   0
    (9)  Restricted Time   0   0    0   0 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    RPSD System Administration 
    Page 3-35 Command Functions 
    3
    The fields of the List Statistics screen are:
    Last ResetThe date that the statistics kept in the Since Last Reset field 
    were reset to 0. Cumulative statistics are never reset to 0.
    Successful 
    Authenti-
    cationsThe number of times that a caller was successfully 
    authenticated by the Lock, both since the last time the 
    statistics were reset and cumulatively since the Lock was 
    installed.
    Failed 
    Attempts by 
    ReasonThe number of times that a caller failed in an access attempt 
    for each of the nine failure reasons. The statistics are broken 
    down into the number of failures since the last reset for 
    RPSD/Key (non-administrative) and administrative users, 
    and also the cumulative total since the Lock was installed for 
    RPSD/Key (non-administrative) and administrative users. For 
    a more detailed explanation of the failure reason codes, see 
    Table 3-2 on page 3-43
    . 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    RPSD System Administration 
    Page 3-36 Command Functions 
    3
    L—List User Table
    Syntax and Parameters
    To list information about all users:
    l 
    To list information about a specific user (full user ID) or for all users beginning 
    with specific characters (partial user ID):
    l  
    Description
    Use the List User Table command to list the user ID, whether the user is blocked 
    or unblocked, the user type, and a code letter for any time restrictions assigned 
    to the user.
    The information is listed about all users if no user ID is specified, about a 
    specified user if the full user ID is given, or about all users beginning with the 
    character(s) that is entered. For example, if you enter a, information is listed for 
    all user IDs beginning with the letter “a.”Parameter Description
    lList User command
    A unique identifier assigned to each user by the system 
    administrator using the Add User command. If no user ID is 
    entered, information is listed for all users. If the full user ID is 
    entered, information is listed for the specified user. If a 
    partial user ID is entered, information is listed for all users 
    beginning with the letter(s) entered. 
    ENTER
    ENTER 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    RPSD System Administration 
    Page 3-37 Command Functions 
    3
    Sample Command and Response 
    For the following sample command and response screens, the fields of the List 
    User Table screen are:
    User IDUser ID
    Blocked?Whether a Block command has been issued for that user. 
    The default is no block. If a user is not blocked, the field is 
    left blank. Blocks can be issued on permanent, 
    administrative, and non-administrative users.
    User TypeThe user type (which determines access level) and the 
    authentication mode. The user types are:
    P = Permanent (reserved for Lucent Technologies 
    personnel)
    R =  RPSD/Key (normal access level)
    A = Administrative (can change Lock parameters)
    For administrative users only:
    W = Password required for access
    K = Passkey required for access
    User type P is followed by either R or A to identify access 
    levels for permanent users.
    RestrictionsThe code letter for any time restrictions that have been 
    placed on the user. The default is no restrictions. 
    Restrictions can be placed on non-administrative, 
    administrative, and permanent users. To find the meaning 
    for the restrictions codes, use the List Restrictions command 
    (see instructions on page 3-26). 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    RPSD System Administration 
    Page 3-38 Command Functions 
    3
    Sample without specifying the [full_or_partial_user_id] parameter. Information 
    is listed for all users (fields included on the screen are described above):
    Sample with
     a specific user entered as the [full_or_partial_user_id] parameter. 
    Information is listed for the specified user only (fields included on the screen are 
    described on page 3-37):
    User ID Blocked? User Type? Restriction(s)
    ATT-INADS1 PR A B
    ATT-INADS2 PR B
    ATT-INADS3 PR
    ATT-INADS4 PR
    ATT-PECC01 PR
    ATT-TIER3G PR
    ATT-LABS01 PR
    ATT-LABS02 PR
    ATT-LABS03 PR
    ATT-TSC001 PR
    ATT-TSC002 PR
    KEY11 R A
    KEY12 B R C
    KEY13 B R D
    KEY14 AW A B
    KEY15 AW D
    KEY16 AK A
    KEY17 AK A
    KEY18 B R A
    > 1 KEY20
    User ID Blocked? User Type Restriction(s)
    KEY20 R A
    -- End of List -- 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    RPSD System Administration 
    Page 3-39 Command Functions 
    3
    Sample with a partial user ID entered as the [full_or_partial_user_id] 
    parameter. Information is listed for all users beginning with the characters 
    entered (fields included on the screen are described on page 3-37):
    > 1 KEY
    User ID Blocked? User Type Restriction(s)
    KEY11 R A
    KEY12 B R C
    KEY13 B R D
    KEY14 AW A B
    KEY15 AW D
    KEY16 AK A
    KEY17 AK A
    KEY18 B R A
    KEY19 R A 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    RPSD System Administration 
    Page 3-40 Command Functions 
    3
    LH—Log History
    Syntax and Parameters
    lh [-] [ALL] 
    Description
    Use the Log History command to display the last 500 status messages in the 
    System Activity Log. The System Activity Log retains a log history of status 
    messages generated by the RPSD Lock. Status messages include a history 
    (including date and time) of the following RPSD system activity:
    nAny RPSD system administration
    nCalls received attempting to access the host resource
    nThe outcome of any access attempts (connected or failed)
    nThe reason for the failure of call attempts
    nThe time the call was disconnected
    !Security Alert:
    If Lucent Technologies Key users are undergoing unexplained access 
    failures or are failing for reasons 2, 3, or 5 of Table 3-2 on page 3-43
    , report 
    it to Lucent Technologies.
    To protect the integrity of the Log History, a Message Authentication Code is 
    generated and shown on the Log History for each entry on the System Activity 
    Log. The Message Authentication Code is followed by a period (“.”) and the 
    sequence number of the message, for example, “CC85.000,” where “CC85” is 
    the Message Authentication Code and “000” is the message sequence number. Parameter Description
    lhLog History command
    [-]Include this parameter to list the Log History in descending 
    order by message sequence number. If this parameter is not 
    used, the Log History is listed in ascending order.
    [ALL]Use this parameter to remove the page breaks and list the 
    entire Log History buffer. Press   to pause and resume 
    the report on the screen. If this parameter is not used, the 
    report is listed 20 messages to a page.
    ENTER
    ENTER 
    						
    All Lucent Technologies manuals Comments (0)

    Related Manuals for Lucent Technologies Remote Port Security Device Users Guide