Home > Lucent Technologies > Communications System > Lucent Technologies Remote Port Security Device Users Guide

Lucent Technologies Remote Port Security Device Users Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Lucent Technologies Remote Port Security Device Users Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    RPSD System Administration 
    Page 3-51 Command Functions 
    3
    U—Unblock User
    Syntax and Parameters
    u  
    Description
    The Unblock User command removes the block placed on an Key user’s access 
    to the Lock. Both permanent and non-permanent users may be unblocked. To 
    determine whether a user is blocked, or to check the user IDs, use the List User 
    Table command (see instructions on page 3-34).
    Sample Command and Response
    Parameter Description
    uUnblock User command
    A unique identifier assigned to each user by the system 
    administrator using the Add User command. Use the List 
    User Table command to check user IDs (see instructions on 
    page 3-34).
    ENTER
    > u KEY20
    JPLock01 446 08/12/96 13:19:22 KEY20 -- User Unblocked 
    OK --
    > 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    RPSD System Administration 
    Page 3-52 Command Functions 
    3
    UR—User Restrictions
    Syntax and Parameters
    To assign a time restriction:
    ur  
    To clear a time restriction:
    ur ,clear
    Description
    Use the User Restrictions command to assign time restrictions to one or more 
    users. The command assigns time restrictions identified by the restriction ID 
    code to a specified user if the full user ID is given, or to all users beginning with 
    the character(s) that is entered. For example, if you enter a, the time restriction is 
    assigned to all user IDs beginning with the letter “a.” You can enter any number 
    of restriction ID codes to assign the corresponding time restriction to the user(s) 
    up to all restriction ID codes (14). 
    To check that the restrictions were assigned as desired, use the List User Table 
    command (see instructions on page 3-34). To check parameters of the restriction 
    IDs, use the List Restrictions command (see instructions on page 3-26).Parameter Description
    urUser Restrictions command
    A unique identifier assigned to each user by the system 
    administrator using the Add User command. If the full user 
    ID is entered, the restriction is assigned to the specified user 
    only. If a partial user ID is entered, the time restriction is 
    assigned to all users beginning with the letter entered.
    A single character from “A” to “N” used as a code to identify 
    the specific time periods and days during which time 
    restrictions can be assigned to one or more users. 
    ENTER 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    RPSD System Administration 
    Page 3-53 Command Functions 
    3
    Sample Command and Response
    Sample with a specific user entered as the [full_or_partial_user_id] parameter. 
    The time restrictions identified by the restriction code IDs (“A,” “B,” and “C” in the 
    following example) are assigned for the specified user only:
    Sample with
     a partial user ID entered as the [full_or_partial_user_id] 
    parameter. The time restrictions identified by the restriction code IDs (“A,” “B,” 
    and “C” in the following example) are assigned to all users beginning with the 
    characters entered (“KEY” in the following example):
    > ur KEY20, abc
    193 08/16/96 11:33:21 KEY20 Assigned Restr. ‘ABC’
    > ur KEY, abc
    194 08/16/96 11:36:21 Restr. KEY11 Assigned Restr. ‘ABC’
    195 08/16/96 11:36:23 Restr. KEY12 Assigned Restr. ‘ABC’
    196 08/16/96 11:36:25 Restr. KEY13 Assigned Restr. ‘ABC’
    197 08/16/96 11:36:27 Restr. KEY14 Assigned Restr. ‘ABC’
    198 08/16/96 11:36:29 Restr. KEY15 Assigned Restr. ‘ABC’
    199 08/16/96 11:36:31 Restr. KEY16 Assigned Restr. ‘ABC’
    200 08/16/96 11:36:33 Restr. KEY17 Assigned Restr. ‘ABC’
    201 08/16/96 11:36:35 Restr. KEY18 Assigned Restr. ‘ABC’
    202 08/16/96 11:36:37 Restr. KEY19 Assigned Restr. ‘ABC’
    203 08/16/96 11:36:39 Restr. KEY20 Assigned Restr. ‘ABC’ 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    RPSD System Administration 
    Page 3-54 Command Functions 
    3
    Help Screens
    To obtain a help screen for any command, enter a question mark (?) followed by 
    the command and press  .
    Sample Help Request and Help Response
    ENTER
    > ?i
    Command: I - ID Set
    Function:Set ID to precede all log messages from this device.
    Format: I log_id
    Example: >I LOCK-A
    To clear ID type:I ** 
    						
    							Key Administration and Use 
    Page 4-1  
    4
    Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    4
    4Key Administration and Use
    When the system is working correctly, Key use and authentication is almost 
    invisible to the RPSD Key user. (Authentication is the process of identifying 
    proper users via passwords or the PassKey procedure.) The caller dials the port 
    being protected on the communications system from the caller’s terminal 
    connected to the Key, authentication takes place (during which time the LEDs on 
    the front panel of the RPSD Key indicate the status of the call), and the caller is 
    connected to the RMATS channel.
    However, before a Key can be used, you must initialize it by using certain 
    commands. Additional commands can be used after initialization to add and 
    remove users and to obtain various information. 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Key Administration and Use 
    Page 4-2 RPSD Key User Command Set 
    4
    RPSD Key User Command Set
    The RPSD Key displays a different Menu of Commands depending on whether or 
    not the device is initialized. The following is the Menu of Commands when the 
    Key is uninitialized:
    --- Menu of Commands ---
    L - List User Information
    H - History Display
    D - Date Set
    C - Clock Set
    I - Set Log ID
    S - Status Display
    SC - Set Comms. Params
    W - Wipe Out (erase) User ID, Secret Key, and Device ID
    A - Add Admin. User
    R - Remove Admin. User
    LA - List Admin. Users
    AS - AUX Security ON/OFF
    Q - Quit Admin. session
    ----- Initialization Functions -----
    U - Set User ID
    K - Set Secret Key
    N - Sets Device Number
    ------------------------------------
    -- For Help Type ‘?’ Followed by Command --
    The following is the Menu of Commands when the Key has been initialized:
    --- Menu of Commands ---
    L - List RPSD/Key User Information
    H - History Display
    D - Date Set
    C - Clock Set
    I - Set Log ID
    S - Status Display
    SC - Set Comms. Params
    W - Wipe Out (erase) User Id, Secret Key, and Device ID
    A - Add Admin. User
    R - Remove Admin. User
    LA - List Admin. Users
    AS - AUX Security ON/OFF
    Q - Quit Admin. session
    -- For Help Type ‘?’ Followed by Command --
    Initialization functions are eliminated from an initialized Key. 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Key Administration and Use 
    Page 4-3 Initialization Functions 
    4
    Initialization Functions
    As the name suggests, initialization fuctions are those you use to set up an 
    uninitialized Key. The commands are:
    nU—Set User ID
    nK—Set Secret Key
    nN—Set Device Number
    U—Set User ID
    Syntax and Parameters
    u 
    Description
    Use the Set User ID command to enter a name that will identify the RPSD Key to 
    the RPSD Lock. Use this command only when initializing a previously 
    uninitialized Key.
    To use this command, enter u  . The user ID entered must match 
    the user ID programmed into the Lock to identify that Key. If you assign the same 
    user ID to more than one Key, assign different device numbers to those Keys.
    Sample Command and Response
    > u KEY20
    08/14/90 14:00:01 User D set to KEY20
    Parameter Description
    uThe Set User ID command
    An alphanumeric identifier of up to ten 
    characters
    ENTER
    ENTER 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Key Administration and Use 
    Page 4-4 Initialization Functions 
    4
    K—Set Secret Key
    Syntax and Parameters
    K 
    Description
    Use the Set Secret Key command to enter the secret key information supplied by 
    the RPSD Lock when a new user is added to the list of authorized users. Use this 
    command only when initializing a previously uninitialized Key.
    To use this command, enter K  . The response includes a 
    Test Reply. The Test Reply should be matched against the one for your Key 
    given by the RPSD Lock. If the replies match, the Key has been correctly seeded 
    with the secret information. If the responses do not match, use the Wipe Out 
    command described in this section to return the Key to an uninitialized state and 
    initialize the Key again. Double-check that you have the correct secret key. If the 
    tests fail again, there is a problem with the Key and it should be replaced.
    Sample Command and Response
    > k f37b 159d 6abe 3e
    08/14/90 14:01:09 Secret Key Loaded. Test Reply is 8119704.
    Parameter Description
    kThe Set Secret Key command
    Secret key information returned by the Lock 
    when a new user name is added
    ENTER
    ENTER 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Key Administration and Use 
    Page 4-5 Initialization Functions 
    4
    N—Set Device Number
    Syntax and Parameters
    n 
    Description
    The Set Device Number command enters a number from 100 to 9999999 as an 
    identifier for the RPSD Key. Use this command when you have two or more RPSD 
    Keys with the same user ID. The device number is associated with the Key for the 
    purpose of identification by the Lock. Use this command to initialize a previously 
    uninitialized Key.
    To use this command, enter n . Do not duplicate 
    existing device numbers. The last four digits of the Key Lucent Technologies 
    serial number are recommended.
    Sample Command and Response
    > n 12345
    08/14/90 14:03:59 Device Number set to 12345
    Parameter Description
    nThe Set Device Number command
    An arbitrary number between 100 and 9999999 
    to be used as an identifier for a particular Key
    ENTER
    ENTER 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Key Administration and Use 
    Page 4-6 Command Functions 
    4
    Command Functions
    Command functions are those commands listed in the Menu of Commands after 
    the Key device has been initialized.The command functions are:
    nA—Add Administrative User
    nAS—AUX Security
    nC—Clock Set
    nD—Date Set
    nH—History Display
    nI—Set Log ID
    nL—List User Information
    nLA—List Administrative Users
    nQ—Quit
    nR—Remove Administrative User
    nS—Status Display
    nSC—Set Communications Parameters
    nW—Wipe Out
    n?—Help Screens 
    						
    All Lucent Technologies manuals Comments (0)

    Related Manuals for Lucent Technologies Remote Port Security Device Users Guide