Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies Remote Port Security Device Users Guide
Lucent Technologies Remote Port Security Device Users Guide
Have a look at the manual Lucent Technologies Remote Port Security Device Users Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
![](/img/blank.gif)
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 RPSD System Administration Page 3-21 Command Functions 3 B—Block User Syntax and Parameters b Description The Block user command is used to block an RPSD Key user from access to the RMATS channel. Both permanent and non-permanent users may be blocked. To determine whether a user is already blocked, use the List User Table command (see instructions on page 3-34). Sample Command and Response Parameter Description bBlock User command A unique identifier assigned to each user by the system administrator using the Add User command. Use the List User Table command to check user IDs (see instructions on page 3-34). ENTER > b KEY20 JPLock01 445 08/12/96 13:14:22 KEY20 -- User Blocked OK -- >
![](/img/blank.gif)
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 RPSD System Administration Page 3-22 Command Functions 3 CR—Change Restriction Syntax and Parameters To set restrictions: cr To clear restrictions: cr ,clear Parameter Description crChange Restriction command restr_idA single character from A–N (14 possible restriction codes) used as a code to identify the time periods and days during which usage of the RPSD system can be restricted. You can then assign the code to the users you wish to restrict for that period by using the User Restrictions command described on page 3-52. start (hh:mm)The beginning time of the restriction in 24-hour clock format. You must use the colon (:) as a separator between the hours and minutes. You must also use a leading zero (0) to enter any time that is less than 10:00, for example, 08:00. end(hh:mm)The ending time of the restriction in 24-hour clock format. You must use the colon (:) as a separator between the hours and minutes. You must also use a leading zero (0) to enter any time that is less than 10:00, for example, 08:00. day_noThe day or days of the week on which the restrictions will be in effect. Enter the day(s) in ascending order, in any combination (for example, 367), as a number(s) from 1–7 as follows: 1 = Monday 2 = Tuesday 3 = Wednesday 4 = Thursday 5 = Friday 6 = Saturday 7 = Sunday ENTER ENTER
![](/img/blank.gif)
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 RPSD System Administration Page 3-23 Command Functions 3 Description Use the Change Restriction command to set up the list of specific time periods and days during which restrictions may be placed on one or more users. Time restrictions block access to the RMATS channel for a specified period of time on a specified day or days. For example, you can block access to the channel from 10:00 a.m. to 3:00 p.m. on Saturdays and Sundays. Use the Change Restriction command to set the parameters of the restriction and to associate a code letter (restr_id) to each period of time and day defined. Then apply the code to a specific user or users by using the User Restriction command (see instructions on page 3-52). To see which codes correspond to which restrictions, use the List Restrictions command (see instructions on page 3-26). NOTE: To set overnight time restrictions, set two separate restrictions from time X until midnight (24:00) on one day and from time 00:00 to time Y on the next day. For example, if you want to restrict access from 8:00 p.m. on a Thursday until 8:00 a.m. on a Friday, restrict access from 20:00 on Thursday until 24:00 on Thursday and then restrict access from 00:00 on Friday until 08:00 on Friday. Also, when you use the User Restrictions command, assign both of these restrictions to users you want to restrict from overnight access. Sample Command and Response In the sample above, the code used to identify the first restriction time period is “A.” The beginning time for restriction ID “A” is 20:00, which is 8:00 p.m.; the ending time is 24:00, which is 12:00 a.m., and the day on which the restriction takes effect is Thursday. The code used to identify the second restriction time period is “B.” The beginning time for restriction ID B is 00:00, which is 12:00 a.m. (midnight); the ending time is 08:00, which is 8:00 a.m. The codes “A” and “B” are used to assign time restrictions to one or more users during the specified time periods and days (see instructions on page 3-52). cr A,20:00,24:00,4 JPLock01 191 08/16/96 10:20:43 Rest. ‘A’ Changed to START 2000 -- END 1700 Mon cr B,00:00,08:00,5 JPLock01 192 08/16/96 10:21:23 Rest. ‘B’ Changed to START 0800 -- END 1700 Wed >
![](/img/blank.gif)
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 RPSD System Administration Page 3-24 Command Functions 3 C—Clock Set Syntax and Parameters c Description Use the Clock Set command to set the current time for the RPSD Lock. Setting the correct time when the Lock is installed ensures the accuracy of the System Activity Log. Also, the clock is used by the Lock to activate and deactivate defined time restrictions. Sample Command and Response Parameter Description cClock Set command The current time in 24-hour clock format. You must use the colon (:) as a separator between the hours and minutes. You must also use a leading zero (0) to enter any time that is less than 10:00, for example 08:00. > c 13:13 JPLock01 199 08/17/96 15:15:00 Time Changed OK
![](/img/blank.gif)
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 RPSD System Administration Page 3-25 Command Functions 3 D—Date Set Syntax and Parameters d Description Use the Date Set command to set the date for the RPSD Lock. Setting the correct date at when the Lock is installed ensures the accuracy of the System Activity Log. Sample Command and Response Parameter Description dDate Set command The date in month, day, and year format. Use the slash (/) as a separator between the month, day, and year. Also use two digits for the month, day, and year entries. Include a leading zero (0) to enter any month or day that is less than 10, and use only the last two digits of the year, for example, 08/01/96. ENTER > d 08/17/96 JPLock01 198 08/17/96 15:14:13 Date Changed OK
![](/img/blank.gif)
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 RPSD System Administration Page 3-26 Command Functions 3 FH—Failure History Syntax and Parameters fh [-] [ALL] Description Use the Failure History command to display a log of the last 20 failed access attempts. The details include the date, time, user ID, device number, and a failure reason code. To protect the integrity of the Failure History, a Message Authentication Code is generated and shown with each Failure History entry. The Message Authentication Code is followed by a period (“.”) and the sequence number of the message, for example, “CC85.000,” where “CC85” is the Message Authentication Code and “000” is the message sequence number. If the [-] and [ALL] parameters are not used, the messages are displayed in ascending order by message sequence number, 20 to a page. “- More to Come -” appears at the bottom of the each page except the last page, and “- End of List -” appears at the bottom of the last page. Press to move from page to page. When you reach the last page (indicated by “- End of List -”) page, press to return to the menu of commands. When you want to capture a long Failure History to a file on a computer, include the [ALL] parameter. Page breaks are removed and the entire Failure History is listed. To pause the report shown on the screen, press . To resume the report on the screen, press again.Parameter Description fhFailure History command [-]Include this parameter to list the Failure History in descending order by message sequence number. If this parameter is not used, the Failure History is listed in ascending order. [ALL]Use this parameter to remove the page breaks and list the entire Failure History buffer. Press to pause and resume the report on the screen. If this parameter is not used, the report is listed 20 messages to a page. ENTER ENTER ENTER ENTER ENTER ENTER
![](/img/blank.gif)
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 RPSD System Administration Page 3-27 Command Functions 3 To capture a Failure History, use a communications software package (such as ProComm). After you save the Failure History as a file, you can open it in a word processing application and print it. To show the Failure History in descending order by message sequence number, include the [-] parameter. Sample Command and Response > fh --- RPSD/KEY Failure History --- Seq. Date Time User ID Device # Reason CC85.000 08/16/96 13:08:51 ATT-INADS1 12345 3 D4E2.001 08/16/96 13:09:42 ATT-INADS1 12345 4 A011.002 08/16/96 15:12:06 KEY20 73647 1 6FD2.003 08/16/96 15:20:51 KEY20 73647 8 12BB.004 08/16/96 15:24:19 ATT-INADS2 72333 7 7EF4.005 08/16/96 15:48:01 ATT-INADS2 72333 5 BE31.006 08/16/96 15:58:23 KEY11 82545 9 AEF3.007 08/16/96 16:08:51 KEY11 82545 2 4C23.008 08/17/96 08:08:18 ATT-INADS4 66600 6 DD52.009 08/17/96 08:28:13 ATT-INADS1 12345 5 21CC.010 08/17/96 08:58:37 ATT-INADS1 12345 8 66D3.011 08/17/96 14:03:32 KEY16 45458 2 B1A3.012 08/17/96 14:09:53 ATT-INADS1 12345 9 D311.013 08/17/96 14:18:10 KEY16 96549 9 C453.014 08/17/96 14:44:44 KEY16 96549 4 F67A.015 08/18/96 09:18:51 KEY12 37827 4 5534.016 08/18/96 09:21:48 KEY12 37827 4 E7A1.017 08/18/96 11:31:25 ATT-NCSC01 87654 5 BA14.018 08/18/96 11:48:11 ATT-NCSC01 87654 5 FF32.019 08/18/96 13:28:31 ATT-INADS1 12345 5 -- End of List --
![](/img/blank.gif)
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 RPSD System Administration Page 3-28 Command Functions 3 The fields of the Failure History screen are: SeqThe Message Authentication Code and message sequence number generated for each Failure History entry. The code is generated to protect the integrity of the Failure History. The Message Authentication Code is followed by a period (“.”) and the sequence number of each status message. The messages are numbered in sequence from 000 to 999 and then restart at 000. DateThe date of the access failure TimeThe time of the access failure User IDThe user ID of the RPSD Key used to access the channel Device #The device number of the RPSD Key used to access the channel. The device number is a number assigned to the Key by the Key user at initialization. ReasonThe call access failure code. The codes and their explanations are provided in Table 3-2 on page 3-43 . The List Statistics command can also be used to get a very brief description for each code (see instructions on page 3-34).
![](/img/blank.gif)
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 RPSD System Administration Page 3-29 Command Functions 3 FC—Force Connect Syntax and Parameters fc Description If a call comes in that you want to go through regardless of whether the caller has a Key, you can issue the Force Connect command while the Lock is in Verify mode and force the connection to be made. There is a window of about 20 seconds in Verify mode during which the Force Connect command may be issued. When you issue the Force Connect command, the Lock will request confirmation. To confirm the command, type y; to cancel the command, type n. If you issue the command when there is no call attempting to connect, an error message is displayed. !Security Alert: Use of the FC command provides a call with connection to the protected resource, bypassing the security normally provided by the Lock. Use this command only to connect an authorized caller directly to the host resource. Sample Command and Response Parameter Description fcForce Connect command ENTER JPLock01 193 08/17/96 13:43:55 Call Received >fc Force Connect Current Call (Y/N)? y JPLock01 194 08/17/96 13:44:16 Connected
![](/img/blank.gif)
Remote Port Security Device User’s Guide 555-024-402 Issue 1 October 1996 RPSD System Administration Page 3-30 Command Functions 3 FD—Force Disconnect Syntax and Parameters fd Description The Force Disconnect command disconnects a call in progress. You may use this command to clear the channel for a higher priority call. When you issue the Force Disconnect command, the Lock will request confirmation. To confirm the command, type y; to cancel the command, type n. If you issue the command when no call is in progress, an error message is displayed. Sample Command and Response Parameter Description fdForce Disconnect command ENTER JPLock01 195 08/17/96 14:23:55 Call Received JPLock01 196 08/17/96 14:24:04 KEY20 [#4321] Connected >fd Disconnect Current Call (Y/N) ? y JPLock01 197 08/17/96 14:58:39 Force Disconnect