Home > Lucent Technologies > Communications System > Lucent Technologies Remote Port Security Device Users Guide

Lucent Technologies Remote Port Security Device Users Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Lucent Technologies Remote Port Security Device Users Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    RPSD System Administration 
    Page 3-21 Command Functions 
    3
    B—Block User
    Syntax and Parameters
    b  
    Description
    The Block user command is used to block an RPSD Key user from access to the 
    RMATS channel. Both permanent and non-permanent users may be blocked. To 
    determine whether a user is already blocked, use the List User Table command 
    (see instructions on page 3-34). 
    Sample Command and Response
    Parameter Description
    bBlock User command
    A unique identifier assigned to each user by the system 
    administrator using the Add User command. Use the List 
    User Table command to check user IDs (see instructions on 
    page 3-34).
    ENTER
    > b KEY20
    JPLock01 445 08/12/96 13:14:22 KEY20 -- User Blocked OK --
    > 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    RPSD System Administration 
    Page 3-22 Command Functions 
    3
    CR—Change Restriction
    Syntax and Parameters
    To set restrictions:
    cr  
    To clear restrictions:
    cr ,clear 
    Parameter Description
    crChange Restriction command
    restr_idA single character from A–N (14 possible restriction codes) 
    used as a code to identify the time periods and days during 
    which usage of the RPSD system can be restricted. You can 
    then assign the code to the users you wish to restrict for that 
    period by using the User Restrictions command described 
    on page 3-52.
    start
    (hh:mm)The beginning time of the restriction in 24-hour clock format.
    You must use the colon (:) as a separator between the hours 
    and minutes. You must also use a leading zero (0) to enter 
    any time that is less than 10:00, for example, 08:00.
    end(hh:mm)The ending time of the restriction in 24-hour clock format. 
    You must use the colon (:) as a separator between the hours 
    and minutes. You must also use a leading zero (0) to enter 
    any time that is less than 10:00, for example, 08:00.
    day_noThe day or days of the week on which the restrictions will be 
    in effect. Enter the day(s) in ascending order, in any 
    combination (for example, 367), as a number(s) from 1–7 as 
    follows:
    1 = Monday
    2 = Tuesday
    3 = Wednesday
    4 = Thursday
    5 = Friday
    6 = Saturday
    7 = Sunday
    ENTER
    ENTER 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    RPSD System Administration 
    Page 3-23 Command Functions 
    3
    Description
    Use the Change Restriction command to set up the list of specific time periods 
    and days during which restrictions may be placed on one or more users. Time 
    restrictions block access to the RMATS channel for a specified period of time on 
    a specified day or days. For example, you can block access to the channel from 
    10:00 a.m. to 3:00 p.m. on Saturdays and Sundays.
    Use the Change Restriction command to set the parameters of the restriction and 
    to associate a code letter (restr_id) to each period of time and day defined. Then 
    apply the code to a specific user or users by using the User Restriction 
    command (see instructions on page 3-52). To see which codes correspond to 
    which restrictions, use the List Restrictions command (see instructions on page 
    3-26).
    NOTE:
    To set overnight time restrictions, set two separate restrictions from time X 
    until midnight (24:00) on one day and from time 00:00 to time Y on the next 
    day. For example, if you want to restrict access from 8:00 p.m. on a 
    Thursday until 8:00 a.m. on a Friday, restrict access from 20:00 on 
    Thursday until 24:00 on Thursday and then restrict access from 00:00 on 
    Friday until 08:00 on Friday. Also, when you use the User Restrictions 
    command, assign both of these restrictions to users you want to restrict 
    from overnight access. 
    Sample Command and Response
    In the sample above, the code used to identify the first restriction time period is 
    “A.” The beginning time for restriction ID “A” is 20:00, which is 8:00 p.m.; the 
    ending time is 24:00, which is 12:00 a.m., and the day on which the restriction 
    takes effect is Thursday. The code used to identify the second restriction time 
    period is “B.” The beginning time for restriction ID B is 00:00, which is 12:00 a.m. 
    (midnight); the ending time is 08:00, which is 8:00 a.m. The codes “A” and “B” 
    are used to assign time restrictions to one or more users during the specified 
    time periods and days (see instructions on page 3-52).
    cr A,20:00,24:00,4
    JPLock01 191 08/16/96 10:20:43 Rest. ‘A’ Changed to START 2000 -- END 1700 Mon
    cr B,00:00,08:00,5
    JPLock01 192 08/16/96 10:21:23 Rest. ‘B’ Changed to START 0800 -- END 1700 Wed
    > 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    RPSD System Administration 
    Page 3-24 Command Functions 
    3
    C—Clock Set
    Syntax and Parameters
    c  
    Description
    Use the Clock Set command to set the current time for the RPSD Lock. Setting 
    the correct time when the Lock is installed ensures the accuracy of the System 
    Activity Log. Also, the clock is used by the Lock to activate and deactivate 
    defined time restrictions.
    Sample Command and Response
    Parameter Description
    cClock Set command
    The current time in 24-hour clock format.
    You must use the colon (:) as a separator between the hours 
    and minutes. You must also use a leading zero (0) to enter 
    any time that is less than 10:00, for example 08:00.
    > c 13:13
    JPLock01 199 08/17/96  15:15:00 Time Changed OK 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    RPSD System Administration 
    Page 3-25 Command Functions 
    3
    D—Date Set
    Syntax and Parameters
    d  
    Description
    Use the Date Set command to set the date for the RPSD Lock. Setting the correct 
    date at when the Lock is installed ensures the accuracy of the System Activity 
    Log. 
    Sample Command and Response
    Parameter Description
    dDate Set command
    The date in month, day, and year format. Use the slash (/) as 
    a separator between the month, day, and year. Also use two 
    digits for the month, day, and year entries. Include a leading 
    zero (0) to enter any month or day that is less than 10, and 
    use only the last two digits of the year, for example, 
    08/01/96.
    ENTER
    > d 08/17/96
    JPLock01 198 08/17/96  15:14:13 Date Changed OK 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    RPSD System Administration 
    Page 3-26 Command Functions 
    3
    FH—Failure History
    Syntax and Parameters
    fh [-] [ALL] 
    Description
    Use the Failure History command to display a log of the last 20 failed access 
    attempts. The details include the date, time, user ID, device number, and a 
    failure reason code.
    To protect the integrity of the Failure History, a Message Authentication Code is 
    generated and shown with each Failure History entry. The Message 
    Authentication Code is followed by a period (“.”) and the sequence number of 
    the message, for example, “CC85.000,” where “CC85” is the Message 
    Authentication Code and “000” is the message sequence number. 
    If the [-] and [ALL] parameters are not used, the messages are displayed in 
    ascending order by message sequence number, 20 to a page. “- More to Come 
    -” appears at the bottom of the each page except the last page, and “- End of 
    List -” appears at the bottom of the last page. Press   to move from page 
    to page. When you reach the last page (indicated by “- End of List -”) page, 
    press   to return to the menu of commands.
    When you want to capture a long Failure History to a file on a computer, include 
    the [ALL] parameter. Page breaks are removed and the entire Failure History is 
    listed. To pause the report shown on the screen, press  . To resume the 
    report on the screen, press   again.Parameter Description
    fhFailure History command
    [-]Include this parameter to list the Failure History in 
    descending order by message sequence number. If this 
    parameter is not used, the Failure History is listed in 
    ascending order.
    [ALL]Use this parameter to remove the page breaks and list the 
    entire Failure History buffer. Press   to pause and 
    resume the report on the screen. If this parameter is not 
    used, the report is listed 20 messages to a page.
    ENTER
    ENTER
    ENTER
    ENTER
    ENTER
    ENTER 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    RPSD System Administration 
    Page 3-27 Command Functions 
    3
    To capture a Failure History, use a communications software package (such as 
    ProComm). After you save the Failure History as a file, you can open it in a word 
    processing application and print it.
    To show the Failure History in descending order by message sequence number, 
    include the [-] parameter.
    Sample Command and Response
    > fh
    --- RPSD/KEY Failure History ---
       Seq. Date Time User ID Device # Reason
    CC85.000 08/16/96 13:08:51 ATT-INADS1 12345 3
    D4E2.001 08/16/96 13:09:42 ATT-INADS1 12345 4
    A011.002 08/16/96 15:12:06 KEY20 73647 1
    6FD2.003 08/16/96 15:20:51 KEY20 73647 8
    12BB.004 08/16/96 15:24:19 ATT-INADS2 72333 7
    7EF4.005 08/16/96 15:48:01 ATT-INADS2 72333 5
    BE31.006 08/16/96 15:58:23 KEY11 82545 9
    AEF3.007 08/16/96 16:08:51 KEY11 82545 2
    4C23.008 08/17/96 08:08:18 ATT-INADS4 66600 6
    DD52.009 08/17/96 08:28:13 ATT-INADS1 12345 5
    21CC.010 08/17/96 08:58:37 ATT-INADS1 12345 8
    66D3.011 08/17/96 14:03:32 KEY16 45458 2
    B1A3.012 08/17/96 14:09:53 ATT-INADS1 12345 9
    D311.013 08/17/96 14:18:10 KEY16 96549 9
    C453.014 08/17/96 14:44:44 KEY16 96549 4
    F67A.015 08/18/96 09:18:51 KEY12 37827 4
    5534.016 08/18/96 09:21:48 KEY12 37827 4
    E7A1.017 08/18/96 11:31:25 ATT-NCSC01 87654 5
    BA14.018 08/18/96 11:48:11 ATT-NCSC01 87654 5
    FF32.019 08/18/96 13:28:31 ATT-INADS1 12345 5
    -- End of List -- 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    RPSD System Administration 
    Page 3-28 Command Functions 
    3
    The fields of the Failure History screen are:
    SeqThe Message Authentication Code and message sequence 
    number generated for each Failure History entry. The code 
    is generated to protect the integrity of the Failure History. 
    The Message Authentication Code is followed by a period 
    (“.”) and the sequence number of each status message. The 
    messages are numbered in sequence from 000 to 999 and 
    then restart at 000.
    DateThe date of the access failure
    TimeThe time of the access failure
    User IDThe user ID of the RPSD Key used to access the channel
    Device #The device number of the RPSD Key used to access the 
    channel. The device number is a number assigned to the 
    Key by the Key user at initialization.
    ReasonThe call access failure code. The codes and their 
    explanations are provided in Table 3-2 on page 3-43
    . The 
    List Statistics command can also be used to get a very brief 
    description for each code (see instructions on page 3-34). 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    RPSD System Administration 
    Page 3-29 Command Functions 
    3
    FC—Force Connect
    Syntax and Parameters
    fc 
    Description
    If a call comes in that you want to go through regardless of whether the caller has 
    a Key, you can issue the Force Connect command while the Lock is in Verify 
    mode and force the connection to be made. There is a window of about 20 
    seconds in Verify mode during which the Force Connect command may be 
    issued.
    When you issue the Force Connect command, the Lock will request confirmation. 
    To confirm the command, type y; to cancel the command, type n. If you issue the 
    command when there is no call attempting to connect, an error message is 
    displayed.
    !Security Alert:
    Use of the FC command provides a call with connection to the protected 
    resource, bypassing the security normally provided by the Lock. Use this 
    command only to connect an authorized caller directly to the host resource.
    Sample Command and Response
    Parameter Description
    fcForce Connect command
    ENTER
    JPLock01 193 08/17/96 13:43:55 Call Received
    >fc
    Force Connect Current Call   (Y/N)? y
    JPLock01 194 08/17/96 13:44:16  Connected 
    						
    							Remote Port Security Device
    User’s Guide  555-024-402  Issue 1
    October 1996
    RPSD System Administration 
    Page 3-30 Command Functions 
    3
    FD—Force Disconnect
    Syntax and Parameters
    fd 
    Description
    The Force Disconnect command disconnects a call in progress. You may use 
    this command to clear the channel for a higher priority call.
    When you issue the Force Disconnect command, the Lock will request 
    confirmation. To confirm the command, type y; to cancel the command, type n. If 
    you issue the command when no call is in progress, an error message is 
    displayed.
    Sample Command and Response
    Parameter Description
    fdForce Disconnect command
    ENTER
    JPLock01 195 08/17/96  14:23:55  Call Received
    JPLock01 196 08/17/96  14:24:04  KEY20 [#4321] Connected
    >fd
    Disconnect Current Call  (Y/N)  ? y
    JPLock01 197 08/17/96  14:58:39 Force Disconnect 
    						
    All Lucent Technologies manuals Comments (0)

    Related Manuals for Lucent Technologies Remote Port Security Device Users Guide