Home > Lucent Technologies > Communications System > Lucent Technologies Remote Port Security Device Users Guide

Lucent Technologies Remote Port Security Device Users Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Lucent Technologies Remote Port Security Device Users Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    About This Book 
    Page xxiii How to Comment on This Document 
    FEEDBACK FORM
    Remote Port Security Device
    Title:Remote Port Security Device User’s Guide
    Order No.: 555-024-402 Date: October 1996
    1. Please rate the effectiveness of this book in the following areas:
    2. Please check ways you feel we could improve this book:
    o Improve the overviewo Add more exampleso Add troubleshooting informationo Improve the table of contentso Add more detailo Make it less technicalo Improve the organizationo Make it more conciseo Add more/better quick reference 
    aids
    o Include more illustrationso Add more step-by-o Improve the index/glossary
    step procedures
    o Other_____________________________________________________________________________________
    ___________________________________________________________________________________________
    ___________________________________________________________________________________________
    3. What did you like most about this book?
    ___________________________________________________________________________________________
    ___________________________________________________________________________________________
    4. Feel free to write any comments below or on an attached sheet.
    ___________________________________________________________________________________________
    ___________________________________________________________________________________________
    ___________________________________________________________________________________________
    ___________________________________________________________________________________________
    If we may contact you about your comments, please complete the following:
    Name:  _________________________ _________________________Telephone Number:  __________________
    Company/Organization:  ____________ ________________ ________Date:  ______________________________
    Address: ____________________________________________________________________________________
    Send completed forms to: Documentation Manager, Lucent Technologies, 211 Mount Airy Road, Room 2W226, 
    Basking Ridge, NJ  07920. Fax: (908) 953-6912.
    THIS FORM MAY BE PHOTOCOPIED
    ExcellentGoodFairPoorNot 
    Applicable
    Ease of Use
    Clarity
    Completeness
    Accuracy
    Organization
    Appearance
    Examples
    Illustrations
    Overall Satisfaction 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    About This Book 
    Page xxiv How to Comment on This Document  
    						
    							Introduction 
    Page 1-1  
    1
    Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    1
    1Introduction
    The Remote Port Security Device (RPSD) is a single-line dial-up port protection 
    system that prevents unauthorized access to a host resource. Host resource 
    dial-up ports are protected by installing the RPSD Lock on the analog telephone 
    line leading to the port. Access is provided only when the calling party uses the 
    RPSD Key, a unit installed on the analog telephone line at the calling party end. 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Introduction 
    Page 1-2 RPSD System 
    1
    RPSD System
    The RPSD system provides security and control for virtually any type of dial-up 
    port on any host resource, regardless of the type of modem associated with the 
    host’s dial-up ports. This document specifically targets Lucent Technologies 
    Business Communications Systems customers and users of the communications 
    systems listed below and supporting peripheral products; therefore, most 
    references in this document are specific to Business Communications Systems. 
    However, other applications of the RPSD system are possible.
    Lucent Technologies supports RPSD use on the following types of 
    communications systems:
    nSystem 75 (R1V2, R1V3)
    nSystem 85 (R1V1, R1V2, R2V1, R2V2, R2V3, R2V4)
    nDEFINITY® Enterprise Communications Server (ECS) (all models)
    nDIMENSION
    nOther communications systems with dial-up ports
    nAll voice-mail systems
    nAny product that supports analog tip-and-ring capability.
    With the RPSD Lock and Key system you can set the time of day that access to a 
    port is permitted, or you can block any or all access to the line by users of RPSD 
    Keys. In addition, a system activity log provides a real-time record of access 
    attempts and their outcomes. Session summaries track statistics on all 
    successful and failed attempts, providing convenient MIS data resources.
    As shown in Figure 1-1
    , the RPSD Lock is approximately the size of a modem 
    and is connected between the communications system modem and the central 
    office line. The RPSD Key is of similar size and is connected between the caller’s 
    modem and central office line.
    NOTE:
    In Figure 1-1, the term “Lucent Technologies Remote Operations” refers to 
    Technical Services Center remote administration and maintenance 
    operations, Bell Labs Field Support, and other entities. 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Introduction 
    Page 1-3 RPSD System 
    1
    Figure 1-1. RPSD Lock and Key Configuration
    The system administrator administers the RPSD Lock via a direct connection 
    from an administration terminal to the Lock. The administration interface is menu 
    driven.
    The RPSD system protects a port in the following manner: a call into the channel 
    to the protected host activates the RPSD Lock. Without involving the protected 
    host resource or its associated modem, the RPSD Lock verifies the caller’s 
    identity by using dual-tone, multifrequency (DTMF) signaling with the RPSD Key. 
    This process is as follows (see Figure 1-1
    ).
    1. The Lock, installed on tip and ring on the network side of any modem or 
    protected host resource, answers the incoming call.
    2. The Lock sends the caller a polling tone. If the calling party has an RPSD 
    Key, the Key responds with its User ID. If there is no Key on the calling 
    end, the Lock terminates the call.
    3. The Lock must recognize the Key’s User ID (the Lock must be previously 
    initialized with all valid Keys); if not, the Lock terminates the call.
    4. Using an algorithm governed by ANSI/DES standards, the Lock generates 
    a random 10-digit value (known as the “dynamic challenge,” for which 
    there are 10 billion possible values). Using a secret encryption key unique 
    to the calling RPSD Key’s User ID, the Lock encrypts the value.
    DEFINITY RPSDLOCK
    POWER RING
    INRING
    OUTCALL
    OUTLOCKED VERIFY CONNECTED
    DEFINITY RPSDKEY
    POWER RING
    INCALL
    OUTIDLE VERIFY CONNECTED
    Administration
    Terminal
    Administration
    Terminal or
    Printer
    Modem
    Communications
    System
    Modem
    Customer Remote
    Administration
    Terminals, Lucent
    Technologies
    Remote Operations,
    System Management
    Applications, etc.
    Public
    Telephone
    Network 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Introduction 
    Page 1-4 RPSD System 
    1
    5.The Lock stores this encrypted “expected value” and sends the dynamic 
    challenge to the Key.
    6. When the Key receives the challenge from the Lock, it uses the secret 
    encryption key unqiue to the user ID assigned to the Key and encrypts the 
    value the Lock sent. Following this, the Key calculates the necessary 
    response. The Key transmits this “expected value” to the Lock.
    7. The Lock compares the Key’s response to the expected value it 
    calculated and stored. If the Lock receives the precise value it expects, it 
    generates ringing and sends the call on to the protected resource.
    The entire sequence occurs in fewer than 20 seconds. 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Introduction 
    Page 1-5 Hardware Components 
    1
    Hardware Components
    To install a complete RPSD system, you need a Lock and a Key. A 
    communications system and modem are assumed to be at the customer site 
    already.
    NOTE:
    Although a printer is not essential to system operation, you should consider 
    dedicating  a serial printer to the RPSD Lock. (The printer should be set to 
    9600 kbps, N, 8, 1.) The System Activity Log can store up to 1400 
    messages, but the only means of retaining a more permanent record of 
    system activity is either to install a dedicated printer for the RPSD Lock or to 
    save all messages from the Lock to disk.
    The Lucent Technologies personnel who require access to the communications 
    system already have the Keys they need. Any additional RPSD Keys for customer 
    use must be ordered separately.
    The hardware components (both supplied and otherwise) and their requirements 
    are described in the following sections.
    RPSD Lock
    When you order the RPSD Lock, you receive:
    nThe Lock
    nPower supply
    n7-foot line cord with RJ11 modular connectors on each end
    n14-foot line cord with RJ11 modular connectors on each end
    nDB9 (male) to DB25 (female) cable
    If any other cables or connectors are required, they must be ordered separately. 
    In addition, any peripheral devices, such as the administration terminal or printer, 
    are customer supplied. Install the RPSD Lock between the maintenance and 
    administration channel and the communications system modem. 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Introduction 
    Page 1-6 Hardware Components 
    1
    The RPSD Lock is 5.75 inches wide by 9.5 inches long by 1.75 inches high. It has 
    seven LEDs on the front panel and four ports on the back panel (see Figure 1-2). 
    For a detailed description of the front panel LEDs, see Appendix B, “Front Panel 
    LEDs.” The back panel ports are:
    nRJ11 port for the modem connection, labeled SUBSCRIBER
    nRJ11 port for the central office line, labeled TELCO
    nFemale DB9 port for the terminal or printer (or a modem), labeled AUX. 
    PORT
    nAlarm leads to connect an external alarm
    nPort for the power supply (supplied with the RPSD Lock)
    Figure 1-2. RPSD Lock
    Power Monitor Function
    The Power Monitor function allows you to control the behavior of the RPSD during 
    power failure conditions. The POWER MONITOR button on the back of the Lock  
    enables or disables this function.
    SUBSCRIBER
    (MODEM) TELCO
    AUX. PORT
    +!
    12VDC
    1A
    ALARM
    LEADS
    POWER MONITOR
    RED
    GREEN BYPASSSECURE
    DEFINITY RPSDLOCK
    POWER RING
    INRING
    OUTCALL
    OUTLOCKED VERIFY CONNECTED
    Front
    Back 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Introduction 
    Page 1-7 Hardware Components 
    1
    In the event of a unit failure or a power failure, the RPSD blocks incoming and 
    outgoing calls to the port, protecting the port against unauthorized access. This 
    call blocking also prevents the communications system or other protected 
    resources from originating an alarm and blocks dial-up access to the port.
    However, you can push in the POWER MONITOR button on the back of the Lock 
    to enable the Power Monitor function. The green LED lights to indicate that the 
    Power Monitor function is enabled. When this function is enabled, the TELCO and 
    SUBSCRIBER ports are connected during a power failure, thereby bypassing the 
    Lock security. This bypassing permits incoming calls to the communications 
    system or other host resource.
    !Security Alert:
    When the POWER MONITOR button is IN during a unit or power failure, the 
    security of the RPSD Lock is bypassed. Leave the button in the OUT 
    position for security reasons.
    External Alarm
    You can connect alarm leads to the screw terminals on the back of the Lock. 
    When a Lock failure occurs, contacts inside the Lock close and send a signal out 
    the alarm terminals to the communications system or other external alarm.
    You can also use the Power Monitor function to generate a signal failure through 
    the alarm leads without bypassing the RPSD and compromising security. This is 
    called an 
    Alarm Only installation.
    RPSD Key
    The RPSD Key is similar to the RPSD Lock in size and appearance. When you 
    order the RPSD Key, you receive:
    nThe Key
    nPower supply
    n7-foot line cord with RJ11 modular connectors on each end
    n14-foot line cord with RJ11 modular connectors on each end
    nDB9 (male) to DB25 (female) cable
    Like the RPSD Lock, the RPSD Key has LEDs on the front panel and ports on the 
    back panel. For a detailed description of the front panel LEDs, see Appendix B, 
    “Front Panel LEDs.” The back panel ports are (see Figure 1-4):
    nRJ11 port for the central office line, labeled TELCO
    nRJ11 port for the modem connection, labeled SUBSCRIBER
    nFemale DB9 port for the terminal or printer, labeled AUX. PORT
    nPort for the power supply (supplied with the RPSD Key). 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    Introduction 
    Page 1-8 Hardware Components 
    1
    Install the RPSD Key between the Key user’s central office line and modem.
    Figure 1-3. RPSD Key
    Modems
    The RPSD Lock works with any modem that can be used with the 
    communications system. Similarly, the RPSD Key works with any modem that can 
    be used with a terminal.
    NOTE:
    Version 3 of the RPSD Lock and Key works with low- and high-speed 
    modems up to 28.8 kbps. Versions 1 and 2 work only with low-speed 
    modems up to 9.6 kbps.
    SUBSCRIBER
    (MODEM) TELCO
    AUX. PORT
    +!
    12VDC
    1A
    Front
    Back
    DEFINITY RPSDKEY
    POWER RING
    INCALL
    OUTIDLE VERIFY CONNECTED 
    						
    All Lucent Technologies manuals Comments (0)

    Related Manuals for Lucent Technologies Remote Port Security Device Users Guide