Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies Remote Port Security Device Users Guide
Lucent Technologies Remote Port Security Device Users Guide
Have a look at the manual Lucent Technologies Remote Port Security Device Users Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 About This Book Page xxiii How to Comment on This Document FEEDBACK FORM Remote Port Security Device Title:Remote Port Security Device User’s Guide Order No.: 555-024-402 Date: October 1996 1. Please rate the effectiveness of this book in the following areas: 2. Please check ways you feel we could improve this book: o Improve the overviewo Add more exampleso Add troubleshooting informationo Improve the table of contentso Add more detailo Make it less technicalo Improve the organizationo Make it more conciseo Add more/better quick reference aids o Include more illustrationso Add more step-by-o Improve the index/glossary step procedures o Other_____________________________________________________________________________________ ___________________________________________________________________________________________ ___________________________________________________________________________________________ 3. What did you like most about this book? ___________________________________________________________________________________________ ___________________________________________________________________________________________ 4. Feel free to write any comments below or on an attached sheet. ___________________________________________________________________________________________ ___________________________________________________________________________________________ ___________________________________________________________________________________________ ___________________________________________________________________________________________ If we may contact you about your comments, please complete the following: Name: _________________________ _________________________Telephone Number: __________________ Company/Organization: ____________ ________________ ________Date: ______________________________ Address: ____________________________________________________________________________________ Send completed forms to: Documentation Manager, Lucent Technologies, 211 Mount Airy Road, Room 2W226, Basking Ridge, NJ 07920. Fax: (908) 953-6912. THIS FORM MAY BE PHOTOCOPIED ExcellentGoodFairPoorNot Applicable Ease of Use Clarity Completeness Accuracy Organization Appearance Examples Illustrations Overall Satisfaction
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 About This Book Page xxiv How to Comment on This Document
Introduction Page 1-1 1 Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 1 1Introduction The Remote Port Security Device (RPSD) is a single-line dial-up port protection system that prevents unauthorized access to a host resource. Host resource dial-up ports are protected by installing the RPSD Lock on the analog telephone line leading to the port. Access is provided only when the calling party uses the RPSD Key, a unit installed on the analog telephone line at the calling party end.
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 Introduction Page 1-2 RPSD System 1 RPSD System The RPSD system provides security and control for virtually any type of dial-up port on any host resource, regardless of the type of modem associated with the host’s dial-up ports. This document specifically targets Lucent Technologies Business Communications Systems customers and users of the communications systems listed below and supporting peripheral products; therefore, most references in this document are specific to Business Communications Systems. However, other applications of the RPSD system are possible. Lucent Technologies supports RPSD use on the following types of communications systems: nSystem 75 (R1V2, R1V3) nSystem 85 (R1V1, R1V2, R2V1, R2V2, R2V3, R2V4) nDEFINITY® Enterprise Communications Server (ECS) (all models) nDIMENSION nOther communications systems with dial-up ports nAll voice-mail systems nAny product that supports analog tip-and-ring capability. With the RPSD Lock and Key system you can set the time of day that access to a port is permitted, or you can block any or all access to the line by users of RPSD Keys. In addition, a system activity log provides a real-time record of access attempts and their outcomes. Session summaries track statistics on all successful and failed attempts, providing convenient MIS data resources. As shown in Figure 1-1 , the RPSD Lock is approximately the size of a modem and is connected between the communications system modem and the central office line. The RPSD Key is of similar size and is connected between the caller’s modem and central office line. NOTE: In Figure 1-1, the term “Lucent Technologies Remote Operations” refers to Technical Services Center remote administration and maintenance operations, Bell Labs Field Support, and other entities.
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 Introduction Page 1-3 RPSD System 1 Figure 1-1. RPSD Lock and Key Configuration The system administrator administers the RPSD Lock via a direct connection from an administration terminal to the Lock. The administration interface is menu driven. The RPSD system protects a port in the following manner: a call into the channel to the protected host activates the RPSD Lock. Without involving the protected host resource or its associated modem, the RPSD Lock verifies the caller’s identity by using dual-tone, multifrequency (DTMF) signaling with the RPSD Key. This process is as follows (see Figure 1-1 ). 1. The Lock, installed on tip and ring on the network side of any modem or protected host resource, answers the incoming call. 2. The Lock sends the caller a polling tone. If the calling party has an RPSD Key, the Key responds with its User ID. If there is no Key on the calling end, the Lock terminates the call. 3. The Lock must recognize the Key’s User ID (the Lock must be previously initialized with all valid Keys); if not, the Lock terminates the call. 4. Using an algorithm governed by ANSI/DES standards, the Lock generates a random 10-digit value (known as the “dynamic challenge,” for which there are 10 billion possible values). Using a secret encryption key unique to the calling RPSD Key’s User ID, the Lock encrypts the value. DEFINITY RPSDLOCK POWER RING INRING OUTCALL OUTLOCKED VERIFY CONNECTED DEFINITY RPSDKEY POWER RING INCALL OUTIDLE VERIFY CONNECTED Administration Terminal Administration Terminal or Printer Modem Communications System Modem Customer Remote Administration Terminals, Lucent Technologies Remote Operations, System Management Applications, etc. Public Telephone Network
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 Introduction Page 1-4 RPSD System 1 5.The Lock stores this encrypted “expected value” and sends the dynamic challenge to the Key. 6. When the Key receives the challenge from the Lock, it uses the secret encryption key unqiue to the user ID assigned to the Key and encrypts the value the Lock sent. Following this, the Key calculates the necessary response. The Key transmits this “expected value” to the Lock. 7. The Lock compares the Key’s response to the expected value it calculated and stored. If the Lock receives the precise value it expects, it generates ringing and sends the call on to the protected resource. The entire sequence occurs in fewer than 20 seconds.
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 Introduction Page 1-5 Hardware Components 1 Hardware Components To install a complete RPSD system, you need a Lock and a Key. A communications system and modem are assumed to be at the customer site already. NOTE: Although a printer is not essential to system operation, you should consider dedicating a serial printer to the RPSD Lock. (The printer should be set to 9600 kbps, N, 8, 1.) The System Activity Log can store up to 1400 messages, but the only means of retaining a more permanent record of system activity is either to install a dedicated printer for the RPSD Lock or to save all messages from the Lock to disk. The Lucent Technologies personnel who require access to the communications system already have the Keys they need. Any additional RPSD Keys for customer use must be ordered separately. The hardware components (both supplied and otherwise) and their requirements are described in the following sections. RPSD Lock When you order the RPSD Lock, you receive: nThe Lock nPower supply n7-foot line cord with RJ11 modular connectors on each end n14-foot line cord with RJ11 modular connectors on each end nDB9 (male) to DB25 (female) cable If any other cables or connectors are required, they must be ordered separately. In addition, any peripheral devices, such as the administration terminal or printer, are customer supplied. Install the RPSD Lock between the maintenance and administration channel and the communications system modem.
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 Introduction Page 1-6 Hardware Components 1 The RPSD Lock is 5.75 inches wide by 9.5 inches long by 1.75 inches high. It has seven LEDs on the front panel and four ports on the back panel (see Figure 1-2). For a detailed description of the front panel LEDs, see Appendix B, “Front Panel LEDs.” The back panel ports are: nRJ11 port for the modem connection, labeled SUBSCRIBER nRJ11 port for the central office line, labeled TELCO nFemale DB9 port for the terminal or printer (or a modem), labeled AUX. PORT nAlarm leads to connect an external alarm nPort for the power supply (supplied with the RPSD Lock) Figure 1-2. RPSD Lock Power Monitor Function The Power Monitor function allows you to control the behavior of the RPSD during power failure conditions. The POWER MONITOR button on the back of the Lock enables or disables this function. SUBSCRIBER (MODEM) TELCO AUX. PORT +! 12VDC 1A ALARM LEADS POWER MONITOR RED GREEN BYPASSSECURE DEFINITY RPSDLOCK POWER RING INRING OUTCALL OUTLOCKED VERIFY CONNECTED Front Back
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 Introduction Page 1-7 Hardware Components 1 In the event of a unit failure or a power failure, the RPSD blocks incoming and outgoing calls to the port, protecting the port against unauthorized access. This call blocking also prevents the communications system or other protected resources from originating an alarm and blocks dial-up access to the port. However, you can push in the POWER MONITOR button on the back of the Lock to enable the Power Monitor function. The green LED lights to indicate that the Power Monitor function is enabled. When this function is enabled, the TELCO and SUBSCRIBER ports are connected during a power failure, thereby bypassing the Lock security. This bypassing permits incoming calls to the communications system or other host resource. !Security Alert: When the POWER MONITOR button is IN during a unit or power failure, the security of the RPSD Lock is bypassed. Leave the button in the OUT position for security reasons. External Alarm You can connect alarm leads to the screw terminals on the back of the Lock. When a Lock failure occurs, contacts inside the Lock close and send a signal out the alarm terminals to the communications system or other external alarm. You can also use the Power Monitor function to generate a signal failure through the alarm leads without bypassing the RPSD and compromising security. This is called an Alarm Only installation. RPSD Key The RPSD Key is similar to the RPSD Lock in size and appearance. When you order the RPSD Key, you receive: nThe Key nPower supply n7-foot line cord with RJ11 modular connectors on each end n14-foot line cord with RJ11 modular connectors on each end nDB9 (male) to DB25 (female) cable Like the RPSD Lock, the RPSD Key has LEDs on the front panel and ports on the back panel. For a detailed description of the front panel LEDs, see Appendix B, “Front Panel LEDs.” The back panel ports are (see Figure 1-4): nRJ11 port for the central office line, labeled TELCO nRJ11 port for the modem connection, labeled SUBSCRIBER nFemale DB9 port for the terminal or printer, labeled AUX. PORT nPort for the power supply (supplied with the RPSD Key).
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 Introduction Page 1-8 Hardware Components 1 Install the RPSD Key between the Key user’s central office line and modem. Figure 1-3. RPSD Key Modems The RPSD Lock works with any modem that can be used with the communications system. Similarly, the RPSD Key works with any modem that can be used with a terminal. NOTE: Version 3 of the RPSD Lock and Key works with low- and high-speed modems up to 28.8 kbps. Versions 1 and 2 work only with low-speed modems up to 9.6 kbps. SUBSCRIBER (MODEM) TELCO AUX. PORT +! 12VDC 1A Front Back DEFINITY RPSDKEY POWER RING INCALL OUTIDLE VERIFY CONNECTED