Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies Remote Port Security Device Users Guide
Lucent Technologies Remote Port Security Device Users Guide
Have a look at the manual Lucent Technologies Remote Port Security Device Users Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
![](/img/blank.gif)
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 RPSD System Administration Page 3-31 Command Functions 3 I—ID Set Syntax and Parameters To set a log ID: i To clear a log ID: i Description Use the ID Set command to set a unique identifier for the RPSD Lock. It is useful when more than one Lock is in operation. The Lock’s ID is added to the beginning of status messages to identify the Lock concerned. Sample Command and Response In the sample, the log ID is added to the beginning of the status message. It will appear here on all status messages once the ID is set.Parameter Description iID Set command The name you select to identify the Lock. The Log ID is limited to eight alphanumeric characters. ENTER ENTER > i JPLock02 JPLock02 004 08/17/96 15:42:21 Log ID Changed OK
![](/img/blank.gif)
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 RPSD System Administration Page 3-32 Command Functions 3 LR—List Restrictions Syntax and Parameters To list the time periods and days for time restrictions for all restriction IDs A to N: lr To list the time period and day for time restriction for a specific restriction ID: lr Description Use the List Restrictions command to list the administered time periods and days during which time restrictions can be placed on one or more users. Up to 14 separate time periods can be created; each is assigned a single-character code from “A” to “N.” Use the Change Restrictions command to set the restriction time periods and to associate a code letter to each period of time and day defined (see instructions on page 3-22). Then apply the code to a specific user or users using the User Restriction command (see instructions on page 3-52). Parameter Description lrList Restrictions command A single character from A–N (14 possible restriction codes) used as a code to identify the specific time periods and days during which time restrictions may be placed on one or more users. The code is assigned to the users you wish to restrict for that period by using the User Restrictions command (described on page 3-52). ENTER ENTER
![](/img/blank.gif)
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 RPSD System Administration Page 3-33 Command Functions 3 Sample Command and Response The fields of the List Restriction screen are: Restriction IDA single character from A–N (14 possible restriction codes) used as a code to identify the specific time periods and days during which time restrictions can be placed on one or more users. Start TimeThe time of day, in 24-hour clock format, when the restriction begins End TimeThe time of day, in 24-hour clock format, when the restriction ends Days of the WeekThe days on which the restricted times take effect > lr Restriction ID Start Time End Time Days of Week A 18:00 24:00 Sat, Sun B 12:00 15:00 Sat, Sun C 16:00 20:00 Mon D 01:00 08:00 Mon, Tues, Wed, Thu, Fri E 00:00 09:00 Thu -- End of List -- >
![](/img/blank.gif)
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 RPSD System Administration Page 3-34 Command Functions 3 LS—List Statistics Syntax and Parameters ls Description Use the List Statistics command to display a statistical summary of call attempts and failures, both cumulative and since the last time the statistical summary was reset. Reset the summary by using the Reset Statistics command (see instructions on page 3-46). Statistics are listed for administrative users, RPSD/Key (non-administrative) users, and permanent users. Call attempts and failures to the administrative interface are updated only if AUX security is enabled. See instructions for the Key AUX Security command in the “Command Functions” section of Chapter 4. Sample Command and Response Parameter Description lsList Statistics command ENTER > ls ---RPSD/Lock Access Attempt Statistics - Last Reset: 08/14/96 Since Last Reset Cumulative RPSD/Key Admin. RPSD/Key Admin Successful Authentications 1 0 1 0 Failed Attempts by Reason (1) No RPSD/Key Detected 0 0 0 0 (2) No Response 0 0 0 0 (3) Invalid User ID 1 0 1 0 (4) Blocked User 0 0 0 0 (5) Invalid Response 0 0 0 0 (6) Outgoing Call 0 0 0 0 (7) Ring - No answer 0 0 0 0 (8) Force Disconnect 0 0 0 0 (9) Restricted Time 0 0 0 0
![](/img/blank.gif)
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 RPSD System Administration Page 3-35 Command Functions 3 The fields of the List Statistics screen are: Last ResetThe date that the statistics kept in the Since Last Reset field were reset to 0. Cumulative statistics are never reset to 0. Successful Authenti- cationsThe number of times that a caller was successfully authenticated by the Lock, both since the last time the statistics were reset and cumulatively since the Lock was installed. Failed Attempts by ReasonThe number of times that a caller failed in an access attempt for each of the nine failure reasons. The statistics are broken down into the number of failures since the last reset for RPSD/Key (non-administrative) and administrative users, and also the cumulative total since the Lock was installed for RPSD/Key (non-administrative) and administrative users. For a more detailed explanation of the failure reason codes, see Table 3-2 on page 3-43 .
![](/img/blank.gif)
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 RPSD System Administration Page 3-36 Command Functions 3 L—List User Table Syntax and Parameters To list information about all users: l To list information about a specific user (full user ID) or for all users beginning with specific characters (partial user ID): l Description Use the List User Table command to list the user ID, whether the user is blocked or unblocked, the user type, and a code letter for any time restrictions assigned to the user. The information is listed about all users if no user ID is specified, about a specified user if the full user ID is given, or about all users beginning with the character(s) that is entered. For example, if you enter a, information is listed for all user IDs beginning with the letter “a.”Parameter Description lList User command A unique identifier assigned to each user by the system administrator using the Add User command. If no user ID is entered, information is listed for all users. If the full user ID is entered, information is listed for the specified user. If a partial user ID is entered, information is listed for all users beginning with the letter(s) entered. ENTER ENTER
![](/img/blank.gif)
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 RPSD System Administration Page 3-37 Command Functions 3 Sample Command and Response For the following sample command and response screens, the fields of the List User Table screen are: User IDUser ID Blocked?Whether a Block command has been issued for that user. The default is no block. If a user is not blocked, the field is left blank. Blocks can be issued on permanent, administrative, and non-administrative users. User TypeThe user type (which determines access level) and the authentication mode. The user types are: P = Permanent (reserved for Lucent Technologies personnel) R = RPSD/Key (normal access level) A = Administrative (can change Lock parameters) For administrative users only: W = Password required for access K = Passkey required for access User type P is followed by either R or A to identify access levels for permanent users. RestrictionsThe code letter for any time restrictions that have been placed on the user. The default is no restrictions. Restrictions can be placed on non-administrative, administrative, and permanent users. To find the meaning for the restrictions codes, use the List Restrictions command (see instructions on page 3-26).
![](/img/blank.gif)
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 RPSD System Administration Page 3-38 Command Functions 3 Sample without specifying the [full_or_partial_user_id] parameter. Information is listed for all users (fields included on the screen are described above): Sample with a specific user entered as the [full_or_partial_user_id] parameter. Information is listed for the specified user only (fields included on the screen are described on page 3-37): User ID Blocked? User Type? Restriction(s) ATT-INADS1 PR A B ATT-INADS2 PR B ATT-INADS3 PR ATT-INADS4 PR ATT-PECC01 PR ATT-TIER3G PR ATT-LABS01 PR ATT-LABS02 PR ATT-LABS03 PR ATT-TSC001 PR ATT-TSC002 PR KEY11 R A KEY12 B R C KEY13 B R D KEY14 AW A B KEY15 AW D KEY16 AK A KEY17 AK A KEY18 B R A > 1 KEY20 User ID Blocked? User Type Restriction(s) KEY20 R A -- End of List --
![](/img/blank.gif)
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 RPSD System Administration Page 3-39 Command Functions 3 Sample with a partial user ID entered as the [full_or_partial_user_id] parameter. Information is listed for all users beginning with the characters entered (fields included on the screen are described on page 3-37): > 1 KEY User ID Blocked? User Type Restriction(s) KEY11 R A KEY12 B R C KEY13 B R D KEY14 AW A B KEY15 AW D KEY16 AK A KEY17 AK A KEY18 B R A KEY19 R A
![](/img/blank.gif)
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 RPSD System Administration Page 3-40 Command Functions 3 LH—Log History Syntax and Parameters lh [-] [ALL] Description Use the Log History command to display the last 500 status messages in the System Activity Log. The System Activity Log retains a log history of status messages generated by the RPSD Lock. Status messages include a history (including date and time) of the following RPSD system activity: nAny RPSD system administration nCalls received attempting to access the host resource nThe outcome of any access attempts (connected or failed) nThe reason for the failure of call attempts nThe time the call was disconnected !Security Alert: If Lucent Technologies Key users are undergoing unexplained access failures or are failing for reasons 2, 3, or 5 of Table 3-2 on page 3-43 , report it to Lucent Technologies. To protect the integrity of the Log History, a Message Authentication Code is generated and shown on the Log History for each entry on the System Activity Log. The Message Authentication Code is followed by a period (“.”) and the sequence number of the message, for example, “CC85.000,” where “CC85” is the Message Authentication Code and “000” is the message sequence number. Parameter Description lhLog History command [-]Include this parameter to list the Log History in descending order by message sequence number. If this parameter is not used, the Log History is listed in ascending order. [ALL]Use this parameter to remove the page breaks and list the entire Log History buffer. Press to pause and resume the report on the screen. If this parameter is not used, the report is listed 20 messages to a page. ENTER ENTER