Home > Lucent Technologies > Communications System > Lucent Technologies Remote Port Security Device Users Guide

Lucent Technologies Remote Port Security Device Users Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Lucent Technologies Remote Port Security Device Users Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Key Administration and Use 
    Page 4-7 Command Functions 
    4
    A—Add Administrative User
    Syntax and Parameters
    a , [secret_key],  
    Description
    Use the Add Administrative User command to add an administrative user to the 
    list of users on the RPSD Key device. The administrative user can access the 
    RPSD Key to alter Key parameters. If AUX Security is enabled, the administrative 
    user must enter a password (or use a PassKey device) associated with the user 
    ID.
    Up to 60 RPSD/Key and administrative users may exist at any one time, ten of 
    whom are permanent RPSD/Key users; they cannot be changed.
    If you leave the [secret_key] field blank, the [secret_key] may be generated by 
    the Lock device or may be input as a 20-digit octal number.
    Sample Command and Response for Adding an 
    Administrative User Via a PassKey
    >A TONI,,K
    010 02/14/95 05:42:04 TONI -- Admin. User Added OK --
    >
    Enter These Digits into PassKey as Key1 or Key2:
    5740 4176 = 1276 6330 = 2620 =
    Test Challenge: 1234557 ...Reply:  770-1131
    See “PassKey Authentication Procedure” later in this chapter.Parameter Description
    aThe Add Administrative User command
    user_idA password up to 15 characters in length that 
    has been programmed into the Lock for a 
    particular Key
    secret_keyThe seed required by the Key’s encryption 
    device to perform encryption/decryption of the 
    challenge issued by the Lock during the 
    authentication process
    authentication_
    modeThe mode used to identify the Key user; either 
    password or PassKey mode work.
    ENTER 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Key Administration and Use 
    Page 4-8 Command Functions 
    4
    NOTE:
    If the [secret_key] is randomly assigned by the Lock device (in other words, 
    the field is omitted), the field must be delimited by a comma. Example:
     a sam,,ak. 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Key Administration and Use 
    Page 4-9 Command Functions 
    4
    AS—AUX Security
    Syntax and Parameters
    as 
    or
    as on 
    or
    as off 
    Description
    Use the AUX Security command to enable and disable security on the Key.
    NOTE:
    Do not enable AUX Security until administrative users are added.
    Sample Commands and Responses
    To determine the AUX Key status, type as .
    >AS
    AUX Port Security is OFF
    To enable AUX Security, type as on .
    >AS ON
    008 02/14/95 05:32:04 AUX Port Security is ON
    To disable AUX Security, type as off .
    >AS OFF
    014 02/14/95 04:20:53 AUX Port Security is OFF
    Parameter Description
    asThe AUX Security command to view the security 
    status of the Key
    as onThe AUX Security command to enable AUX 
    security on the Key
    as offThe AUX Security command to disable AUX 
    security on the Key
    ENTER
    ENTER
    ENTER
    ENTER
    ENTER
    ENTER 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Key Administration and Use 
    Page 4-10 Command Functions 
    4
    C—Clock Set
    Syntax and Parameters
    c  
    Description
    Use the Clock Set command to set the Key’s internal clock to ensure the 
    accuracy of the History Log. Set the clock to local time standards in 24-hour 
    clock format (for example, 16:00 for 4:00 PM).
    Use a colon (:) to separate the hours and minutes. Also use a leading zero if you 
    set the time less than 10:00.
    Sample Command and Response
    > c 13:15
    8/14/90 13:15:00 Time Changed OK
    Parameter Description
    cThe Clock Set command
    The time in hours and minutes
    ENTER 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Key Administration and Use 
    Page 4-11 Command Functions 
    4
    D—Date Set
    Syntax and Parameters
    d  
    Description
    Use the Date Set command to set the date for the RPSD Key’s internal calendar. 
    You should set the date when you begin using the Key to be certain that it is 
    correct. To check the date, use the Status Display command described in this 
    section.
    Use two digits for each part of the date, including a zero at the beginning for 
    months or days less than 10 (for example, 08/01/90). The last two digits are used 
    for the year. Also be certain to separate the month, day, and year with the slash 
    (/) character.
    Sample Command and Response
    > d 08/14/90
    08/14/90 13:14:13 Date Changed OK
    Parameter Description
    dThe Date Set command
    The date in month, day, and year format
    ENTER 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Key Administration and Use 
    Page 4-12 Command Functions 
    4
    H—History Display
    Syntax and Parameters
    h [-] [ALL] 
    Description
    Use the History Display command to display a log history of the last 1400 
    messages generated by or sent to the RPSD Key device. The messages appear 
    in ascending order, twenty to a page. See Table 5-1 in Chapter 5, 
    “Troubleshooting” for an explanation of the status messages sent to the Key by 
    the Lock when a connection attempt fails.
    To protect the integrity of the log history, a Message Authentication Code is 
    generated for each message created by or sent to the Lock or Key.
    A Sequence Number is assigned to each message. The sequence runs from 000 
    to 999 and then restarts at 000. The Sequence Number is appended to the 
    Message Authentication Code; the fields are delimited with a period.
    When you list the report with the ALL command, toggle   to pause and 
    resume the report. The [-] and [ALL] parameters may be used in combination.
    Sample Command and Response
    > h
    --- Log History ---
    2375.000 02/14/95 09:22:23 Lucent RPSD/Key - V2.0x - Reset
    EC32.001 02/14/95 09:22:58 User ID set to ATT-USER1A
    ABB8.002 02/14/95 09:23:00 Secret Key Loaded.Test Reply is 8190581
    54F2.003 02/14/95 09:23:07 Device Number set to 111
    82D2.004 02/14/95 09:23:07 Device Initialized OK
    86DD.005 02/14/95 09:23:08 Lucent RPSD/Key - V2.0x - Idel
    A315.006 02/14/95 09:23:37 Lucent RPSD/Key - V2.0x - Reset
    1A3D.007 02/14/95 09:23:38 Lucent RPSD/Key - V2.0x - Idle
    -- End of List --
    Parameter Description
    hThe History Display command
    -Use this to show the log history in descending 
    order.
    ALLUse this to remove page breaks and list the 
    entire log history buffer. Use it to capture a long 
    log history to a file.
    ENTER
    ENTER 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Key Administration and Use 
    Page 4-13 Command Functions 
    4
    The Fields of the History Display screen are:
    nMessage Authentication Code and Sequence Number—The first number 
    in a log history entry is actually two numbers separated by a decimal 
    point: the Message Authentication Code and the Sequence Number.
    nDate—The second field provides the date the message was generated.
    nTime—The second field provides the time the message was generated in 
    24-hour clock format.
    nMessage—The last field contains the status message.
    Failed attempts at access generate a message at the RPSD Lock that is sent to 
    the RPSD Key. There are nine causes for such failure, as described in Table 5-1, 
    found in Chapter 5, “Troubleshooting.” 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Key Administration and Use 
    Page 4-14 Command Functions 
    4
    I—Set Log ID
    Syntax and Parameters
    i 
    Description
    Use the Set Log ID command to identify which Key is associated with which 
    status message. This is especially important where multiple devices share a 
    single administration terminal. The command adds the ID to the beginning of 
    each message generated by the Key.
    Sample Command and Response
    > i KEY11
    KEY11 08/14/90 14:20:08 Log ID Changed OK
    Parameter Description
    iThe Set Log ID command
    log_idAn identifier of up to eight characters selected 
    by the user
    ENTER 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Key Administration and Use 
    Page 4-15 Command Functions 
    4
    L—List User Information
    Syntax and Parameters
    l 
    Description
    Use the List User Information command to list the user ID, device number, and 
    test response number for the Key. To use the List User Information command, 
    enter l   at the > prompt of the Key user’s terminal.
    Sample Command and Response
    >l
    User ID: KEY20
    Device Number: 12345
    Test Response: 8119704
    Parameter Description
    lThe List User Information command
    ENTER
    ENTER 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Key Administration and Use 
    Page 4-16 Command Functions 
    4
    LA—List Administrative Users
    Syntax and Parameters
    LA 
    or
    LA  
    Description
    Use this command to display a table showing information about RPSD 
    adminstrative users.
    If you do not specify a user ID, the List Administrative User Table lists information 
    for all RPSD administrative Key users. If you enter a full or partial user ID, the 
    command lists information for that specified user or for all users who have the 
    same beginning characters. For example, if you enter LA a, the command lists 
    information for all administrative user IDs that begin with “A.”
    Sample Command and Response
    >LA
    User ID User Type
    DAN AW
    SAM AK
    -- End of List --
    The fields on the List User Table screen are:
    nUser ID—the user ID of the RPSD Key used to access the channel
    nUser Type—the User Type (A = Administrative) and the Authentication 
    Mode (W = Password, K = PassKey) Parameter Description
    LAThe List Administrative Users command
    The characters entered to delineate the list of 
    administrative users; these can be a partial user 
    ID or a complete (full) user ID.
    ENTER
    ENTER 
    						
    All Lucent Technologies manuals Comments (0)

    Related Manuals for Lucent Technologies Remote Port Security Device Users Guide