Home > Lucent Technologies > Communications System > Lucent Technologies Remote Port Security Device Users Guide

Lucent Technologies Remote Port Security Device Users Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Lucent Technologies Remote Port Security Device Users Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Customer Support Information 
    Page xiii Lucent Technologies Fraud Intervention 
    Lucent Technologies Fraud 
    Intervention
     If you suspect you are being victimized by toll fraud and you need technical 
    support or assistance, call the following:
    nFor DEFINITY and Voice Mail products, call the Technical Service Center 
    (TSC) at 1 800 242-2121.
    nFor system 25, MERLIN, and PARTNER products, call the National Service 
    Assistance Center (NSAC) at 1 800 628-2888. 
    Guarantee
    Lucent Technologies sells the Remote Port Security Device (RPSD) to provide an 
    additional layer of security for the remote administration port on Lucent 
    Technologies communications systems and other Lucent Technologies BCS 
    products. Lucent Technologies offers the following guarantee for the RPSD on 
    Lucent Technologies communications systems located within the United States.
    RPSD Lock with no Keys
    If the customer purchases an RPSD Lock with no Keys, Lucent Technologies will 
    pay for unauthorized calls that occur as a result of access to the system via the 
    remote administration port through the RPSD, provided the following conditions 
    are met:
    nThe RPSD was installed correctly on the remote administration port on the 
    Lucent Technologies communications system and configured at the time 
    of the fraud incident to accept only Lucent Technologies Keys.
    NOTE:
    In this context, correct installation means that the RPSD Lock is 
    installed consistent with installation instructions and in such a way as 
    to deny access in case of power failure.
    nThe customer provides RPSD documentation to Lucent Technologies 
    showing the time of access.
    nThe customer provides the communications system history log information 
    to Lucent Technologies showing the changes made to the system to allow 
    toll fraud at the time shown by the RPSD log.
    nThe customer provides telephone records to Lucent Technologies that 
    indicate the fraud was accomplished via the changes made at that time.
    nThe customer provides Lucent Technologies with access to all additional 
    information requested by Lucent Technologies regarding the fraud 
    incident. 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Customer Support Information 
    Page xiv Guarantee 
    RPSD Lock with Keys
    If the customer purchases RPSD Keys to access the systems protected by RPSD 
    Locks, Lucent Technologies does not assume responsibility for the use of 
    customer-purchased Keys. Accordingly, Lucent Technologies will pay for the 
    unauthorized calls that occur as a result of access to such systems via the 
    remote administration port through the RPSD provided the following conditions 
    are met:
    nThe RPSD Lock was installed correctly on the remote administration port 
    on the DEFINITY system at the time of the fraud incident.
    NOTE:
    In this context, correct installation means that the RPSD Lock is 
    installed consistent with installation instructions and in such a way as 
    to deny access in case of power failure.
    nThe customer provides RPSD documentation to Lucent Technologies 
    showing the time of access and 
    that the access was accomplished via a 
    Lucent Technologies ID
    .
    nThe customer provides the communications system history log information 
    to Lucent Technologies showing the changes made to the system to allow 
    toll fraud at the time shown by the RPSD log.
    nThe customer provides telephone records to Lucent Technologies that 
    indicate the fraud was accomplished via the changes made at that time.
    nThe customer provides Lucent Technologies with access to all additional 
    information requested by Lucent Technologies regarding the fraud 
    incident. 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Customer Support Information 
    Page xv Limited Warranty 
    Whether or not the customer uses Keys, the customer agrees to promptly take all 
    necessary steps to stop the toll fraud after becoming aware of it. Lucent 
    Technologies’ liability under this RPSD guarantee ceases two hours after the 
    customer becomes aware of the toll fraud incident. In no event shall Lucent 
    Technologies’ responsibility exceed the amount of the customer’s payment to the 
    network provider for the unauthorized calls. Lucent Technologies’ liability is 
    limited to the unauthorized calls and does not include consequential damages 
    such as lost profits due to phone lines being unavailable.
    Limited Warranty
    Lucent Technologies, Inc. warrants this equipment to be free of defects in 
    materials and workmanship for a period of one year from date of shipment. All 
    defects within this time will be repaired without charge upon return of the unit to 
    the factory.
    This warranty is null and void if the manufacturer determines that any 
    modifications have been made to the unit or the unit has been subjected to 
    physical or electrical stress.
    This warranty covers parts and labor only and does not include shipping costs, 
    travel expenses, or travel time.
    Installation of the equipment is the sole responsibility of the purchaser. The 
    manufacturer, its agents, or its distributors accept no responsibility for 
    malfunction or damage caused by improper treatment or connection of the unit.
    The manufacturer, its agents, or its distributors are not liable for any losses 
    incurred through use or malfunction of the equipment or any losses or damages 
    incurred by the use of the equipment in any means whatsoever.
    This warranty is limited to the repair of the equipment to its normal functioning 
    capability.
    This warranty is complete as stated and all other warranties, expressed or 
    implied, are invalid. The Remote Port Security Device should be installed only by 
    qualified personnel. No user-serviceable parts are contained within the units. 
    Installation or programming should not begin prior to review of all sections of this 
    manual.  
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Customer Support Information 
    Page xvi FCC Notification and Repair Information 
    FCC Notification and Repair 
    Information
    This equipment is registered with the FCC in accordance with Part 68 of its rules. 
    In compliance with those rules, you are advised of the following:
    nMeans of Connection. Connection of this equipment to the telephone 
    network shall be through a standard network interface jack, USOC RJ11C. 
    These USOCs must be ordered from your telephone company.
    nParty Lines and Coin Telephones. This equipment can not be used with 
    party lines or coin telephone lines.
    nNotification to the Telephone Companies. Before connecting this 
    equipment, you or your equipment supplier must notify your local 
    telephone company’s business office of the following:
    — The telephone number(s) you will be using with this equipment.
    — The appropriate registration number and ringer equivalence 
    number (REN), which can be found on the back or bottom of the 
    control unit.
    — For each jack, the sequence in which lines are to be connected, the 
    line types, the Facility Interface Code (FIC), and the Ringer 
    Equivalence Number (REN) by position when applicable.
    nRinger Equivalence Number (REN). The REN is used to determine the 
    number of devices that can be connected to the telephone line. Excessive 
    RENs on the line can result in the devices not ringing in response to an 
    incoming call. In most, but not all, areas the sum of the RENs should not 
    exceed five (5.0). To be certain of the number of devices that can be 
    connected to the line, as determined by the total RENs, contact the local 
    telephone company to determine the maximum REN for the calling area.
    nDisconnection. You must also notify your local telephone company if and 
    when this equipment is permanently disconnected from the line(s).  
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Customer Support Information 
    Page xvii Installation and Operational Procedures 
    Installation and Operational 
    Procedures
     This manual contains information about installation and operational procedures.
    nRepair Instructions. If you experience trouble because your equipment is 
    malfunctioning, the FCC requires that the equipment not be used and that 
    it be disconnected from the network until the problem has been corrected. 
    Repairs to this equipment can be made only by the manufacturers, their 
    authorized agents, or others who may be authorized by the FCC. In the 
    event repairs are needed on this equipment, contact your authorized 
    Lucent Technologies dealer or, in the USA only, contact the National 
    Service Assistance Center (NSAC) at 1 800 242-2121.
    nRights of the Local Telephone Company. If this equipment causes harm to 
    the telephone network, the local telephone company may discontinue your 
    service temporarily. If possible, they will notify you in advance. But if 
    advance notice is not practical, you will be notified as soon as possible. 
    You will also be informed of your right to file a complaint with the FCC.
    nChanges at Local Telephone Company. Your local telephone company 
    may make changes in its facilities, equipment, operations, or procedures 
    that affect the proper functioning of this equipment. If they do, you will be 
    notified in advance to give you an opportunity to maintain uninterrupted 
    telephone service.
    nNew Network Area and Exchange Codes. The communications system 
    software does not restrict access to any new area codes or exchange 
    codes established by a local telephone company. If the user has 
    established toll restrictions on the system that could restrict access, then 
    the user should check the lists of allowed and disallowed dial codes and 
    modify them as needed.
    nEqual Access Codes. This equipment is capable of providing users 
    access to interstate providers of operator services through the use of 
    access codes. Modifications of this equipment by call aggregators to 
    block access dialing codes is a violation of the Telephone Operator 
    Consumers Act of 1990.  
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Customer Support Information 
    Page xviii Federal Communication Commission (FCC) Electromagnetic Interference Information 
    Federal Communication Commission
    (FCC) Electromagnetic Interference
    Information
     This equipment has been tested and found to comply with the limits for a Class A 
    digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to 
    provide reasonable protection against harmful interference when the equipment 
    is operated in a commercial environment. This equipment generates, uses, and 
    can radiate radio frequency energy and, if not installed and used in accordance 
    with the instruction manual, may cause harmful interference to radio 
    communications.  
    						
    							About This Book 
    Page xix Intended Audiences 
    Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    About This Book
    Intended Audiences
    This document is intended for the following audience:
    nLucent Technologies technicians
    nRPSD system administrators
    nRPSD Key users
    Lucent Technologies technicians are the personnel from Lucent Technologies 
    who install the Remote Port Security Device (RPSD) Lock at the customer 
    premises. It is assumed that Lucent Technologies technicians are familiar with 
    the technical language used to describe the hardware components, cables, 
    connectors, and ports involved in the installation of the RPSD Lock. It is further 
    assumed that they will have the tools and equipment necessary for installation.
    RPSD system administrators are the customer personnel who administer and 
    maintain the RPSD Lock. It is assumed that RPSD system administrators are 
    familiar with menu-driven telecommunications hardware components. It is also 
    assumed that they understand the need for maintaining security in administering 
    the communications system.
    RPSD Key users are those who dial in to a channel locked with a Lock by using a 
    Key. It is assumed that Key users are familiar with placing calls via a modem, 
    either from a telephone, terminal, or PC.
    Responsibilities
    Lucent Technologies technicians are responsible for installing the RPSD Lock, 
    testing it upon installation, and making certain that a working product has been 
    installed. Lucent Technologies technicians also perform any replacement of the 
    Lock should it become necessary. Lucent Technologies technicians are not 
    responsible for the initialization of the Lock. The Lock is initialized prior to 
    delivery, and the Key devices that are used by Lucent Technologies are already 
    installed and initialized. 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    About This Book 
    Page xx Terms and Conventions 
    RPSD Keys purchased by the customer can be installed by Lucent Technologies 
    technicians at the customer’s request or installed by the customers.
    The troubleshooting material in this document may be used by the technician at 
    the time of installation, but it is written primarily for the customer. Failure of any 
    Lock or Key is always resolved by replacement of the failed device.
    The Lock commands and administration material is written for RPSD system 
    administrators. The material on Key commands and use is written for Key users.
    Supplying equipment peripheral to the Lock, such as terminals, modems, 
    printers, etc., is the customer’s responsibility. If any material is required in 
    addition to the material shipped in the RPSD package, it is billable to the 
    customer.
    Terms and Conventions
    The Remote Port Security Device (RPSD) Lock is often referred to as the Lock. 
    Similarly the RPSD Key is often referred to as the Key.
    Throughout this document, toll fraud security hazards are indicated by an 
    exclamation point inside a triangle and the words Security Alert.
    !Security Alert:
    Security Alert indicates the presence of a toll fraud security hazard. Toll 
    fraud is the unauthorized use of your telecommunications system by an 
    unauthorized party (for example, persons other than your company’s 
    employees, agents, subcontractors, or persons working on your company’s 
    behalf). Be sure to read “Your Responsibility for Your System’s Security” on 
    the inside front cover of this book and “Security of Your System: Preventing 
    Toll Fraud” in “About This Book.” 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    About This Book 
    Page xxi Typographical Conventions 
    Typographical Conventions
    Throughout this manual RPSD system responses are shown in italic, sans serif 
    type. For example:
    Call authentication completed
    Data that you enter is shown in bold sans serif type. For example:
    Block user 
    The   button at the end of the line tells you to press the Enter or Return key 
    to complete the command.
    NOTE:
    In this document, a remote caller’s computer terminal or personal computer 
    is referred to as the user’s terminal. The local terminal connected to the 
    RPSD Lock is referred to as the system administrator’s terminal or 
    administration terminal.
    How to Use This Book
    This is organized into chapters that give information on procedures necessary for 
    the proper installation and administration of your Remote Port Security Device.
    “Related Documents,” later in this section, provides a complete list of system 
    documentation, together with ordering information.
    If you have problems with your RPSD system, contact your system administrator. 
    If the problem cannot be solved by the system administrator, in the continental 
    U.S. your system will call our toll-free Helpline, available 24 hours a day, at 1 800 
    242-2121. Outside of the continental U.S., contact your Lucent Technologies 
    representative or local authorized dealer.
    ENTER
    ENTER 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    About This Book 
    Page xxii Product Safety Labels 
    Product Safety Labels
    Throughout these documents, hazardous situations are indicated by an 
    exclamation point inside a triangle and the word 
    caution or warning.
    !WARNING:
    Warning indicates the presence of a hazard that could cause death or 
    severe personal injury if the hazard is not avoided.
    !CAUTION:
    Caution indicates the presence of a hazard that could cause minor personal 
    injury or property damage if the hazard is not avoided.
    Related Documents
    In addition to this book, the document listed below is part of the documentation 
    set. Within the continental United States, order this document from the BCS 
    Publications Fulfillment Center by calling 1 800 457-1235.
    How to Comment on This Document
    We welcome your comments, both positive and negative. Please use the 
    feedback form on the next page to let us know how we can continue to serve you. 
    If the feedback form is missing, write directly to:
    Documentation Manager
    Lucent Technologies, Inc.
    211 Mount Airy Road
    Room 2W-226
    Basking Ridge, NJ 07920-2332Document No. Title
    555-025-6000
    GBCS Products Security Handbook 
    						
    All Lucent Technologies manuals Comments (0)

    Related Manuals for Lucent Technologies Remote Port Security Device Users Guide