Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies Remote Port Security Device Users Guide
Lucent Technologies Remote Port Security Device Users Guide
Have a look at the manual Lucent Technologies Remote Port Security Device Users Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
![](/img/blank.gif)
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 Customer Support Information Page xiii Lucent Technologies Fraud Intervention Lucent Technologies Fraud Intervention If you suspect you are being victimized by toll fraud and you need technical support or assistance, call the following: nFor DEFINITY and Voice Mail products, call the Technical Service Center (TSC) at 1 800 242-2121. nFor system 25, MERLIN, and PARTNER products, call the National Service Assistance Center (NSAC) at 1 800 628-2888. Guarantee Lucent Technologies sells the Remote Port Security Device (RPSD) to provide an additional layer of security for the remote administration port on Lucent Technologies communications systems and other Lucent Technologies BCS products. Lucent Technologies offers the following guarantee for the RPSD on Lucent Technologies communications systems located within the United States. RPSD Lock with no Keys If the customer purchases an RPSD Lock with no Keys, Lucent Technologies will pay for unauthorized calls that occur as a result of access to the system via the remote administration port through the RPSD, provided the following conditions are met: nThe RPSD was installed correctly on the remote administration port on the Lucent Technologies communications system and configured at the time of the fraud incident to accept only Lucent Technologies Keys. NOTE: In this context, correct installation means that the RPSD Lock is installed consistent with installation instructions and in such a way as to deny access in case of power failure. nThe customer provides RPSD documentation to Lucent Technologies showing the time of access. nThe customer provides the communications system history log information to Lucent Technologies showing the changes made to the system to allow toll fraud at the time shown by the RPSD log. nThe customer provides telephone records to Lucent Technologies that indicate the fraud was accomplished via the changes made at that time. nThe customer provides Lucent Technologies with access to all additional information requested by Lucent Technologies regarding the fraud incident.
![](/img/blank.gif)
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 Customer Support Information Page xiv Guarantee RPSD Lock with Keys If the customer purchases RPSD Keys to access the systems protected by RPSD Locks, Lucent Technologies does not assume responsibility for the use of customer-purchased Keys. Accordingly, Lucent Technologies will pay for the unauthorized calls that occur as a result of access to such systems via the remote administration port through the RPSD provided the following conditions are met: nThe RPSD Lock was installed correctly on the remote administration port on the DEFINITY system at the time of the fraud incident. NOTE: In this context, correct installation means that the RPSD Lock is installed consistent with installation instructions and in such a way as to deny access in case of power failure. nThe customer provides RPSD documentation to Lucent Technologies showing the time of access and that the access was accomplished via a Lucent Technologies ID . nThe customer provides the communications system history log information to Lucent Technologies showing the changes made to the system to allow toll fraud at the time shown by the RPSD log. nThe customer provides telephone records to Lucent Technologies that indicate the fraud was accomplished via the changes made at that time. nThe customer provides Lucent Technologies with access to all additional information requested by Lucent Technologies regarding the fraud incident.
![](/img/blank.gif)
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 Customer Support Information Page xv Limited Warranty Whether or not the customer uses Keys, the customer agrees to promptly take all necessary steps to stop the toll fraud after becoming aware of it. Lucent Technologies’ liability under this RPSD guarantee ceases two hours after the customer becomes aware of the toll fraud incident. In no event shall Lucent Technologies’ responsibility exceed the amount of the customer’s payment to the network provider for the unauthorized calls. Lucent Technologies’ liability is limited to the unauthorized calls and does not include consequential damages such as lost profits due to phone lines being unavailable. Limited Warranty Lucent Technologies, Inc. warrants this equipment to be free of defects in materials and workmanship for a period of one year from date of shipment. All defects within this time will be repaired without charge upon return of the unit to the factory. This warranty is null and void if the manufacturer determines that any modifications have been made to the unit or the unit has been subjected to physical or electrical stress. This warranty covers parts and labor only and does not include shipping costs, travel expenses, or travel time. Installation of the equipment is the sole responsibility of the purchaser. The manufacturer, its agents, or its distributors accept no responsibility for malfunction or damage caused by improper treatment or connection of the unit. The manufacturer, its agents, or its distributors are not liable for any losses incurred through use or malfunction of the equipment or any losses or damages incurred by the use of the equipment in any means whatsoever. This warranty is limited to the repair of the equipment to its normal functioning capability. This warranty is complete as stated and all other warranties, expressed or implied, are invalid. The Remote Port Security Device should be installed only by qualified personnel. No user-serviceable parts are contained within the units. Installation or programming should not begin prior to review of all sections of this manual.
![](/img/blank.gif)
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 Customer Support Information Page xvi FCC Notification and Repair Information FCC Notification and Repair Information This equipment is registered with the FCC in accordance with Part 68 of its rules. In compliance with those rules, you are advised of the following: nMeans of Connection. Connection of this equipment to the telephone network shall be through a standard network interface jack, USOC RJ11C. These USOCs must be ordered from your telephone company. nParty Lines and Coin Telephones. This equipment can not be used with party lines or coin telephone lines. nNotification to the Telephone Companies. Before connecting this equipment, you or your equipment supplier must notify your local telephone company’s business office of the following: — The telephone number(s) you will be using with this equipment. — The appropriate registration number and ringer equivalence number (REN), which can be found on the back or bottom of the control unit. — For each jack, the sequence in which lines are to be connected, the line types, the Facility Interface Code (FIC), and the Ringer Equivalence Number (REN) by position when applicable. nRinger Equivalence Number (REN). The REN is used to determine the number of devices that can be connected to the telephone line. Excessive RENs on the line can result in the devices not ringing in response to an incoming call. In most, but not all, areas the sum of the RENs should not exceed five (5.0). To be certain of the number of devices that can be connected to the line, as determined by the total RENs, contact the local telephone company to determine the maximum REN for the calling area. nDisconnection. You must also notify your local telephone company if and when this equipment is permanently disconnected from the line(s).
![](/img/blank.gif)
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 Customer Support Information Page xvii Installation and Operational Procedures Installation and Operational Procedures This manual contains information about installation and operational procedures. nRepair Instructions. If you experience trouble because your equipment is malfunctioning, the FCC requires that the equipment not be used and that it be disconnected from the network until the problem has been corrected. Repairs to this equipment can be made only by the manufacturers, their authorized agents, or others who may be authorized by the FCC. In the event repairs are needed on this equipment, contact your authorized Lucent Technologies dealer or, in the USA only, contact the National Service Assistance Center (NSAC) at 1 800 242-2121. nRights of the Local Telephone Company. If this equipment causes harm to the telephone network, the local telephone company may discontinue your service temporarily. If possible, they will notify you in advance. But if advance notice is not practical, you will be notified as soon as possible. You will also be informed of your right to file a complaint with the FCC. nChanges at Local Telephone Company. Your local telephone company may make changes in its facilities, equipment, operations, or procedures that affect the proper functioning of this equipment. If they do, you will be notified in advance to give you an opportunity to maintain uninterrupted telephone service. nNew Network Area and Exchange Codes. The communications system software does not restrict access to any new area codes or exchange codes established by a local telephone company. If the user has established toll restrictions on the system that could restrict access, then the user should check the lists of allowed and disallowed dial codes and modify them as needed. nEqual Access Codes. This equipment is capable of providing users access to interstate providers of operator services through the use of access codes. Modifications of this equipment by call aggregators to block access dialing codes is a violation of the Telephone Operator Consumers Act of 1990.
![](/img/blank.gif)
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 Customer Support Information Page xviii Federal Communication Commission (FCC) Electromagnetic Interference Information Federal Communication Commission (FCC) Electromagnetic Interference Information This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications.
![](/img/blank.gif)
About This Book Page xix Intended Audiences Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 About This Book Intended Audiences This document is intended for the following audience: nLucent Technologies technicians nRPSD system administrators nRPSD Key users Lucent Technologies technicians are the personnel from Lucent Technologies who install the Remote Port Security Device (RPSD) Lock at the customer premises. It is assumed that Lucent Technologies technicians are familiar with the technical language used to describe the hardware components, cables, connectors, and ports involved in the installation of the RPSD Lock. It is further assumed that they will have the tools and equipment necessary for installation. RPSD system administrators are the customer personnel who administer and maintain the RPSD Lock. It is assumed that RPSD system administrators are familiar with menu-driven telecommunications hardware components. It is also assumed that they understand the need for maintaining security in administering the communications system. RPSD Key users are those who dial in to a channel locked with a Lock by using a Key. It is assumed that Key users are familiar with placing calls via a modem, either from a telephone, terminal, or PC. Responsibilities Lucent Technologies technicians are responsible for installing the RPSD Lock, testing it upon installation, and making certain that a working product has been installed. Lucent Technologies technicians also perform any replacement of the Lock should it become necessary. Lucent Technologies technicians are not responsible for the initialization of the Lock. The Lock is initialized prior to delivery, and the Key devices that are used by Lucent Technologies are already installed and initialized.
![](/img/blank.gif)
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 About This Book Page xx Terms and Conventions RPSD Keys purchased by the customer can be installed by Lucent Technologies technicians at the customer’s request or installed by the customers. The troubleshooting material in this document may be used by the technician at the time of installation, but it is written primarily for the customer. Failure of any Lock or Key is always resolved by replacement of the failed device. The Lock commands and administration material is written for RPSD system administrators. The material on Key commands and use is written for Key users. Supplying equipment peripheral to the Lock, such as terminals, modems, printers, etc., is the customer’s responsibility. If any material is required in addition to the material shipped in the RPSD package, it is billable to the customer. Terms and Conventions The Remote Port Security Device (RPSD) Lock is often referred to as the Lock. Similarly the RPSD Key is often referred to as the Key. Throughout this document, toll fraud security hazards are indicated by an exclamation point inside a triangle and the words Security Alert. !Security Alert: Security Alert indicates the presence of a toll fraud security hazard. Toll fraud is the unauthorized use of your telecommunications system by an unauthorized party (for example, persons other than your company’s employees, agents, subcontractors, or persons working on your company’s behalf). Be sure to read “Your Responsibility for Your System’s Security” on the inside front cover of this book and “Security of Your System: Preventing Toll Fraud” in “About This Book.”
![](/img/blank.gif)
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 About This Book Page xxi Typographical Conventions Typographical Conventions Throughout this manual RPSD system responses are shown in italic, sans serif type. For example: Call authentication completed Data that you enter is shown in bold sans serif type. For example: Block user The button at the end of the line tells you to press the Enter or Return key to complete the command. NOTE: In this document, a remote caller’s computer terminal or personal computer is referred to as the user’s terminal. The local terminal connected to the RPSD Lock is referred to as the system administrator’s terminal or administration terminal. How to Use This Book This is organized into chapters that give information on procedures necessary for the proper installation and administration of your Remote Port Security Device. “Related Documents,” later in this section, provides a complete list of system documentation, together with ordering information. If you have problems with your RPSD system, contact your system administrator. If the problem cannot be solved by the system administrator, in the continental U.S. your system will call our toll-free Helpline, available 24 hours a day, at 1 800 242-2121. Outside of the continental U.S., contact your Lucent Technologies representative or local authorized dealer. ENTER ENTER
![](/img/blank.gif)
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 About This Book Page xxii Product Safety Labels Product Safety Labels Throughout these documents, hazardous situations are indicated by an exclamation point inside a triangle and the word caution or warning. !WARNING: Warning indicates the presence of a hazard that could cause death or severe personal injury if the hazard is not avoided. !CAUTION: Caution indicates the presence of a hazard that could cause minor personal injury or property damage if the hazard is not avoided. Related Documents In addition to this book, the document listed below is part of the documentation set. Within the continental United States, order this document from the BCS Publications Fulfillment Center by calling 1 800 457-1235. How to Comment on This Document We welcome your comments, both positive and negative. Please use the feedback form on the next page to let us know how we can continue to serve you. If the feedback form is missing, write directly to: Documentation Manager Lucent Technologies, Inc. 211 Mount Airy Road Room 2W-226 Basking Ridge, NJ 07920-2332Document No. Title 555-025-6000 GBCS Products Security Handbook