Mitel SMART L CALL CONTROLLER Hardware Installation Manual
Have a look at the manual Mitel SMART L CALL CONTROLLER Hardware Installation Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 55 Mitel manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
SECTION MITL8350-048-l OO-Nk / COMPUTER PORT (RS-232) [Dl Figure 4-3, Controller I/O Connections SMART-l CONTROLLER POWER SUPPLY RJ2lX CA3lA Figure 4-4, Typical Controller Installation Configuration Page 17
SECTION WTL8350-048-100-NA CENTRAL OFFICE LINES MDF DF CENTRAL OFFICE “SPLIT” TYPE DEMARC. STATION BLOCK MODEM OR OTHER PROTECTED EQUIPMENT - -- _ - -- - - -- _ “66 BLOCK” OR RJZlX MDF OR CA21A (T) TIP (R) RING - -- _ RJ3lX CA318 Figure 4-5, Typical Connection Configuration Figure 4-6, W-232 Interface Connector (Viewed from outside Dialer) pllJl SIGNAL 1 FRAME GND 2 RxD (Signal in) 3 TxD (Signal Out) 4,5 TIED TOGETHER 6,8,20 TIED TOGETHER 7 GND Page 18
SECTION MITL8350-048-100-NA Figure 4-7, USOC RJ31WCA31A Jack and Cable Assy. Page 19
SECTION MITL8350-048-l OO-NA procedure: 1) 2) 3) 4) 5) 6) 7) 4.12 This completes the mechanical installation of the SMarT-1’” Security Access Controller. Continue by programming the unit from the terminal. Refer to Figure 4-3. Connect a suitable Earth Ground to the screw mount [Al provided on the connector panel. This connec- tion MUST be made for the unit to function properly. Plug the Power Pack jack into the Controller power connection [Bl. Plug the Power Pack AC line cord into a suitable (1 IOV-60Hz) AC receptacle. Using the supplied RJ31XKA31A cables, insert one end of a cable in a jack on the Controller [Cl. Connect the other end of the cable used in step 4 to the Telco-supplied jack. Repeat steps 4 and 5 above for the appropriate number of times depending upon the model of Controller being installed (4-, 2-, or l-line units). Connect a suitable terminal to the RS-232 Computer Port [Dl via a suitable cable. Configuration of this cable is described in paragraph 4.13 below. RS-232 Port Configuration 4.13 The RS-232 Computer Port connector (refer to Figure 4-6) is a female connector configured as “DCE”. Only the TxD (pin 3), the RxD (pin 2), and the GND (pin 1) lines are used by the Controller. Pins 4 through 6, 8, and 20 are shorted internally for the convenience of the user. This port is used for programming and call recording output. 4.14 During programming, a suitable terminal must be connected to this port. For call recording output, a suitable printer is con- nected in place of the terminal. Refer to Part 6 paragraph 6.05 for the configuration of the terminal or the printer. RJBlWCA31A USOC Jack and Cable 4.15 Figure 4-7 illustrates the USOC RJ31XKA31A Connector and ,, cable assembly as used by the SAC. Figure 4-5 illustrates the installation wiring of the Telco-supplied RJ31XKABlA USOC jack and other connections from the Central Office through to the Modem or i other protected equipment. For the unit to operate properly, the bridge clips at the “split” type station block must be removed. Page 20
SECTION MITL8350-048-100-N/I ORDERING INFORMATION 4.15 Table 4-l on the following page lists the part numbers and descriptions of items that can be ordered from MITEL DATA- COM INC. Table 4-1, SMarT-1 tm Ordering Information 4-1, SMarT-1 Ordering Information PART NO. 8350-007 SMarT-1’“: DESCRIPTION 4 Line Security Access Controller. Includes Power Pack, RJ31 Cables, and Mounting Hardware. 8350-008 SMarT-1 tm: 2 Line Security Access Controller. Includes Power Pack, RJ31 Cables, and Mounting Hardware. 8350-009 SMarT-1’“: 1 Line Security Access Controller. Includes Power Pack, RJ31 Cables, and Mounting Hardware. SPARES 8350-010 Wall Mount Bracket for SMarT-1’” Security Access Controllers. 8350-012 Power Pack for SMarT-1’” Security Access Controllers. 8350-013 RJ31XKA31A Cable for SMarT-1’” Security Access Controllers. 8350-048- 100-NA General Information Manual. 8350-953-003-NA SAC Maintenance Programming Guide. Page 21
SECTION MITL8350-048-l OO-NA --- THIS PAGE INTENTIONALLY LEFT BLANK --- Page 22
SECTION MITL8350-048-IOO-NA 5. OPERATING DESCRIPTION SECURITY 5.01 The primary function of the SMarT-1’” Security Access Control- ler (SAC) is to provide security to connected systems such as Modems and to protect these systems from unauthorized telephone access. The security provided by the SAC lies in three distinct areas. These areas are: l The use of optional progress tones, or lack thereof, to make it difficult for an unauthorized caller to recognize that there is protected equipment connected to the telephone line. 0 The inclusion of the callback feature to assure that only those individuals with valid passwords are called back at an assigned number associated with that particular password. 0 Finally, the provision of a call detail record that is available at the RS-232 Computer Port to record the time and duration of the call, along with the number that was called back. 5.02 While it is not recommended, the SAC may also be pro- grammed to allow instant access (circumvention of the call back feature) upon the- receipt of a particular password. 5.03 Passwords must be Dual-Tone Multifrequency (DTMF) digit strings that range from 1 to 15 digits in length. Only a DTMF type of telephone can be used to access the SAC. Rotary dial tele- phones cannot be used since rotary digits can only be received by, but not transmitted through, a Central Office. OPERATIONAL SEQUENCES 5.04 The steps listed below show the operational sequences of the Controller: Note: A single progress tone as used in the steps below indicates that the user will hear a single ‘beep’ in the receiver earpiece of the telephone. In a like manner, a double progress tone means two ‘beeps’ and a triple progress tone means three ‘beeps’. 1) The user dials the directory telephone number of the protected device with a DTMF type telephone. 2) The SAC detects the incoming call, disconnects the protected equipment from the line, and answers the call. The SAC may then optionally provide the user with a single progress tone. 3) The user enters his/her password by keying the correct digits on the telephone. This password may be from 1 to 15 digits in length and consists of any of the 12 standard DTMF digits. 4) If an exact match for the password cannot be found in the SAC Page 23
SECTION MITL8350-048-IOO-NA 5) 6) internal memory, the Controller drops the line (hangs up) and may optionally “busy out” that particular line for a program- mable length of time. The unsuccessful password will be print- ed in the Call Detail Record. If an exact match for the password is found in the SAC internal memory, the Controller will check for the type of access that the password permits, including the time-of-day period as- signed for that particular access. Upon verification of a valid password during the particular time-of-day period, the SAC will then execute its programmed action for that particular password. One of three series of events will occur: ? Automatic Callback Access: a) The password action is deemed to be an automatic call- back. For this instance, the SAC will hang up the tele- phone line, reseize the line and dial back to the user by using a preprogrammed call back number associated with this particular password. The user must know that he has to hang up, or may optionally be requested to hang up by receipt of a triple progress tone ,from the Controller. This method of access is considered to be the most secure making it nearly impossible for some- one to gain unauthorized access to the protected equip- ment. User Entered Callback Access: b) The password action is deemed to be a user controlled callback type. This means that the user must manually tell the controller the telephone number to be used for the callback. The user either must know when to enter his telephone number and hang up, or may optionally be requested to input his telephone number by receipt of a double progress tone, and to hang up on receipt of a triple progress tone. As before, the SAC will then hang up and reseize the line. It will dial out using the user entered telephone number. This action is less secure that the previous action since the user provides the telephone number. However, the call detail record will contain the telephone number that the user has entered and was called back at. Cut-Through Access: c) The password action is deemed to be a ‘cut-through’ type of access. In this case, there will be no progress tones received or any other SAC activity. At the expira- tion of the ‘wait for password’ time period, the SAC will connect the caller to the protected device. This action is the least secure of the three actions. While the password must be entered exactly and the access attempt made Page 24
SECTION MlTL8350-048-l OO-NA during the allowed time-of-day, there will be no record of the call with the exception of the time and duration of the access and the optional printing of the successful password. DETAILED OPERATING DESCRIPTION With Modems 5.05 The following assumptions are taken into consideration when describing the detailed operating procedures that will follow in paragraph 5.06: 1) 2) 3) There are correctly installed and known functional Modem con- nections for the Central Processing Unit (CPU) and the remote access. Any installation should first be capable of functioning without the SAC device present to cut down on non-SAC re- lated operational questions. If installation problems are encountered at any time, the SAC device should be removed to prove that connections are possi- ble without the device. Otherwise, considerable effort could be expended when the problem is in other areas of the system. Persons accessing the system (users) have been previously advised of any necessary sequence of events required in order to establish a valid Modem connection. In some instances, spe- cialized sequences will be required. Automatic Callback Access 5.06 cess: 1) 2) 3) Note: The following steps outline the operations of the Security Ac- cess Controller that occur when using automatic callback ac- The caller dials the host system over the telephone lines. The protected Modem senses ringing and seizes the line. With proper programming, the SAC then splits the line while the protected Modem is waiting for the line to settle (about 2 seconds). The Modem (at the end of the line settling period) places an answer tone on its output to the SAC. The SAC emits a single progress tone to the caller. No Modem tones are supplied to the caller. The caller, after hearing the progress tone (unless disabled), must enter the assigned password via DTMF dialing. Two con- ditions must be satisfied at this point. The first is that the protected Modem must be capable of answering in the answer mode for a programmable period of time that is sufficient to allow the callback to occur. The second is that the called back Modem must be capable of being forced into the originate mode upon receipt of the callback. A more efficient variation of the above description would be that the protected Modem answer the incoming call in the Page 25
SECTION MITL8350-048-IOO-NA 4) 5) 6) 7) Note: originate mode (waiting for answer tone) for a period of time long enough to allow the callback to occur, as previously mentioned. In this case, the callback could be automatically answered by the Modem that is accessing the host system. These events depend upon the sophistication of the Modems and the ingenuity of the user. After a programmable period of time, the SAC will drop the line. The SAC will reseize the line if the password is valid, and will dial back the caller via the use of speed dialing. If the protected Modem is waiting for an originate tone (via programming), the calling Modem may simply answer the call automatically, thus establishing the connection. The SAC will cut-through upon the completion of it’s call back and connect the two Modems. If the called Modem is waiting in the answer mode (most common used mode), the caller must place his Modem into the originate mode upon receipt of the callback. Once connection is established, the SAC ‘goes to sleep’ and appears as a direct through connection to the two Modems. Call disconnection is accomplished as per normal operation, or at a loss of carrier detect at either Modem. In the 2- and 4-line models, the SAC is continually monitoring the other unused lines while the above procedure is taking place. User-Entered Callback Access 5.07 The following steps outline the operations of the Security Ac- cess Controller that occur when using user entered callback access: 1) The caller dials the host system over the telephone lines. 2) The protected Modem senses ringing and seizes the line. With proper programming, the SAC then splits the line while the protected Modem is waiting for the line to settle (about 2 seconds). The Modem (at the end of the line settling period) places an answer tone on its output to the SAC. The SAC emits a single progress tone to the caller. No Modem tones are supplied to the caller. Two conditions must be satisfied at this point. The first’ is that the protected Modem must be capable of answering in the answer mode for a programmable period of time that is sufficient to allow the callback to occur. The second is that the called back Modem must be capable of being forced into the originate mode upon receipt of the callback. 3) The caller, after hearing the progress tone (unless disabled), must enter the assigned password via DTMF dialing. Upon vali- dation of the password, the SAC will emit a double progress tone to the caller. 4) The caller, after hearing the double progress tone (unless dis- Page 26