Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies Remote Port Security Device Users Guide
Lucent Technologies Remote Port Security Device Users Guide
Have a look at the manual Lucent Technologies Remote Port Security Device Users Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 RPSD System Administration Page 3-51 Command Functions 3 U—Unblock User Syntax and Parameters u Description The Unblock User command removes the block placed on an Key user’s access to the Lock. Both permanent and non-permanent users may be unblocked. To determine whether a user is blocked, or to check the user IDs, use the List User Table command (see instructions on page 3-34). Sample Command and Response Parameter Description uUnblock User command A unique identifier assigned to each user by the system administrator using the Add User command. Use the List User Table command to check user IDs (see instructions on page 3-34). ENTER > u KEY20 JPLock01 446 08/12/96 13:19:22 KEY20 -- User Unblocked OK -- >
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 RPSD System Administration Page 3-52 Command Functions 3 UR—User Restrictions Syntax and Parameters To assign a time restriction: ur To clear a time restriction: ur ,clear Description Use the User Restrictions command to assign time restrictions to one or more users. The command assigns time restrictions identified by the restriction ID code to a specified user if the full user ID is given, or to all users beginning with the character(s) that is entered. For example, if you enter a, the time restriction is assigned to all user IDs beginning with the letter “a.” You can enter any number of restriction ID codes to assign the corresponding time restriction to the user(s) up to all restriction ID codes (14). To check that the restrictions were assigned as desired, use the List User Table command (see instructions on page 3-34). To check parameters of the restriction IDs, use the List Restrictions command (see instructions on page 3-26).Parameter Description urUser Restrictions command A unique identifier assigned to each user by the system administrator using the Add User command. If the full user ID is entered, the restriction is assigned to the specified user only. If a partial user ID is entered, the time restriction is assigned to all users beginning with the letter entered. A single character from “A” to “N” used as a code to identify the specific time periods and days during which time restrictions can be assigned to one or more users. ENTER
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 RPSD System Administration Page 3-53 Command Functions 3 Sample Command and Response Sample with a specific user entered as the [full_or_partial_user_id] parameter. The time restrictions identified by the restriction code IDs (“A,” “B,” and “C” in the following example) are assigned for the specified user only: Sample with a partial user ID entered as the [full_or_partial_user_id] parameter. The time restrictions identified by the restriction code IDs (“A,” “B,” and “C” in the following example) are assigned to all users beginning with the characters entered (“KEY” in the following example): > ur KEY20, abc 193 08/16/96 11:33:21 KEY20 Assigned Restr. ‘ABC’ > ur KEY, abc 194 08/16/96 11:36:21 Restr. KEY11 Assigned Restr. ‘ABC’ 195 08/16/96 11:36:23 Restr. KEY12 Assigned Restr. ‘ABC’ 196 08/16/96 11:36:25 Restr. KEY13 Assigned Restr. ‘ABC’ 197 08/16/96 11:36:27 Restr. KEY14 Assigned Restr. ‘ABC’ 198 08/16/96 11:36:29 Restr. KEY15 Assigned Restr. ‘ABC’ 199 08/16/96 11:36:31 Restr. KEY16 Assigned Restr. ‘ABC’ 200 08/16/96 11:36:33 Restr. KEY17 Assigned Restr. ‘ABC’ 201 08/16/96 11:36:35 Restr. KEY18 Assigned Restr. ‘ABC’ 202 08/16/96 11:36:37 Restr. KEY19 Assigned Restr. ‘ABC’ 203 08/16/96 11:36:39 Restr. KEY20 Assigned Restr. ‘ABC’
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 RPSD System Administration Page 3-54 Command Functions 3 Help Screens To obtain a help screen for any command, enter a question mark (?) followed by the command and press . Sample Help Request and Help Response ENTER > ?i Command: I - ID Set Function:Set ID to precede all log messages from this device. Format: I log_id Example: >I LOCK-A To clear ID type:I **
Key Administration and Use Page 4-1 4 Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 4 4Key Administration and Use When the system is working correctly, Key use and authentication is almost invisible to the RPSD Key user. (Authentication is the process of identifying proper users via passwords or the PassKey procedure.) The caller dials the port being protected on the communications system from the caller’s terminal connected to the Key, authentication takes place (during which time the LEDs on the front panel of the RPSD Key indicate the status of the call), and the caller is connected to the RMATS channel. However, before a Key can be used, you must initialize it by using certain commands. Additional commands can be used after initialization to add and remove users and to obtain various information.
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 Key Administration and Use Page 4-2 RPSD Key User Command Set 4 RPSD Key User Command Set The RPSD Key displays a different Menu of Commands depending on whether or not the device is initialized. The following is the Menu of Commands when the Key is uninitialized: --- Menu of Commands --- L - List User Information H - History Display D - Date Set C - Clock Set I - Set Log ID S - Status Display SC - Set Comms. Params W - Wipe Out (erase) User ID, Secret Key, and Device ID A - Add Admin. User R - Remove Admin. User LA - List Admin. Users AS - AUX Security ON/OFF Q - Quit Admin. session ----- Initialization Functions ----- U - Set User ID K - Set Secret Key N - Sets Device Number ------------------------------------ -- For Help Type ‘?’ Followed by Command -- The following is the Menu of Commands when the Key has been initialized: --- Menu of Commands --- L - List RPSD/Key User Information H - History Display D - Date Set C - Clock Set I - Set Log ID S - Status Display SC - Set Comms. Params W - Wipe Out (erase) User Id, Secret Key, and Device ID A - Add Admin. User R - Remove Admin. User LA - List Admin. Users AS - AUX Security ON/OFF Q - Quit Admin. session -- For Help Type ‘?’ Followed by Command -- Initialization functions are eliminated from an initialized Key.
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 Key Administration and Use Page 4-3 Initialization Functions 4 Initialization Functions As the name suggests, initialization fuctions are those you use to set up an uninitialized Key. The commands are: nU—Set User ID nK—Set Secret Key nN—Set Device Number U—Set User ID Syntax and Parameters u Description Use the Set User ID command to enter a name that will identify the RPSD Key to the RPSD Lock. Use this command only when initializing a previously uninitialized Key. To use this command, enter u . The user ID entered must match the user ID programmed into the Lock to identify that Key. If you assign the same user ID to more than one Key, assign different device numbers to those Keys. Sample Command and Response > u KEY20 08/14/90 14:00:01 User D set to KEY20 Parameter Description uThe Set User ID command An alphanumeric identifier of up to ten characters ENTER ENTER
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 Key Administration and Use Page 4-4 Initialization Functions 4 K—Set Secret Key Syntax and Parameters K Description Use the Set Secret Key command to enter the secret key information supplied by the RPSD Lock when a new user is added to the list of authorized users. Use this command only when initializing a previously uninitialized Key. To use this command, enter K . The response includes a Test Reply. The Test Reply should be matched against the one for your Key given by the RPSD Lock. If the replies match, the Key has been correctly seeded with the secret information. If the responses do not match, use the Wipe Out command described in this section to return the Key to an uninitialized state and initialize the Key again. Double-check that you have the correct secret key. If the tests fail again, there is a problem with the Key and it should be replaced. Sample Command and Response > k f37b 159d 6abe 3e 08/14/90 14:01:09 Secret Key Loaded. Test Reply is 8119704. Parameter Description kThe Set Secret Key command Secret key information returned by the Lock when a new user name is added ENTER ENTER
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 Key Administration and Use Page 4-5 Initialization Functions 4 N—Set Device Number Syntax and Parameters n Description The Set Device Number command enters a number from 100 to 9999999 as an identifier for the RPSD Key. Use this command when you have two or more RPSD Keys with the same user ID. The device number is associated with the Key for the purpose of identification by the Lock. Use this command to initialize a previously uninitialized Key. To use this command, enter n . Do not duplicate existing device numbers. The last four digits of the Key Lucent Technologies serial number are recommended. Sample Command and Response > n 12345 08/14/90 14:03:59 Device Number set to 12345 Parameter Description nThe Set Device Number command An arbitrary number between 100 and 9999999 to be used as an identifier for a particular Key ENTER ENTER
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 Key Administration and Use Page 4-6 Command Functions 4 Command Functions Command functions are those commands listed in the Menu of Commands after the Key device has been initialized.The command functions are: nA—Add Administrative User nAS—AUX Security nC—Clock Set nD—Date Set nH—History Display nI—Set Log ID nL—List User Information nLA—List Administrative Users nQ—Quit nR—Remove Administrative User nS—Status Display nSC—Set Communications Parameters nW—Wipe Out n?—Help Screens