Home > Mitel > Communications System > Mitel SMART L CALL CONTROLLER Hardware Installation Manual

Mitel SMART L CALL CONTROLLER Hardware Installation Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Mitel SMART L CALL CONTROLLER Hardware Installation Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 55 Mitel manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 458
    							SECTION MITL8350-048-l OO-Nk 
    / COMPUTER 
    PORT (RS-232) 
    [Dl 
    Figure 4-3, Controller I/O Connections 
    SMART-l 
    CONTROLLER 
    POWER 
    SUPPLY 
    RJ2lX 
    CA3lA 
    Figure 4-4, Typical Controller Installation Configuration 
    Page 17  
    						
    							SECTION WTL8350-048-100-NA 
    CENTRAL 
    OFFICE 
    LINES MDF DF 
    CENTRAL OFFICE “SPLIT” TYPE 
    DEMARC. STATION BLOCK MODEM OR 
    OTHER PROTECTED 
    EQUIPMENT 
    - -- _ 
    - -- - 
    - -- _ 
    “66 BLOCK” 
    OR RJZlX 
    MDF OR CA21A 
    (T) TIP 
    (R) RING - -- _ 
    RJ3lX 
    CA318 
    Figure 4-5, Typical Connection Configuration 
    Figure 4-6, W-232 Interface Connector (Viewed from outside Dialer) 
    pllJl SIGNAL 
    1 FRAME GND 
    2 
    RxD (Signal in) 
    3 
    TxD (Signal Out) 
    4,5 TIED TOGETHER 
    6,8,20 TIED TOGETHER 
    7 GND 
    Page 18  
    						
    							SECTION MITL8350-048-100-NA 
    Figure 4-7, USOC RJ31WCA31A Jack and Cable Assy. 
    Page 19  
    						
    							SECTION MITL8350-048-l OO-NA 
    procedure: 
    1) 
    2) 
    3) 
    4) 
    5) 
    6) 
    7) 
    4.12 This completes the mechanical installation of the SMarT-1’” 
    Security Access Controller. Continue by programming the unit 
    from the terminal.  Refer to Figure 4-3. Connect a suitable Earth Ground to the 
    screw mount 
    [Al provided on the connector panel. This connec- 
    tion MUST be made for the unit to function properly. 
    Plug the Power Pack jack into the Controller power connection 
    [Bl. 
    Plug the Power Pack AC line cord into a suitable (1 IOV-60Hz) 
    AC receptacle. 
    Using the supplied RJ31XKA31A cables, insert one end of a 
    cable in a jack on the Controller [Cl. 
    Connect the other end of the cable used in step 4 to the 
    Telco-supplied jack. 
    Repeat steps 4 and 5 above for the appropriate number of 
    times depending upon the model of Controller being installed 
    (4-, 2-, or l-line units). 
    Connect a suitable terminal to the RS-232 Computer Port [Dl 
    via a suitable cable. Configuration of this cable is described in 
    paragraph 4.13 below. 
    RS-232 Port Configuration 
    4.13 The RS-232 Computer Port connector (refer to Figure 4-6) is a 
    female connector configured as “DCE”. Only the TxD (pin 3), the 
    RxD (pin 2), and the GND (pin 1) lines are used by the Controller. Pins 4 
    through 6, 8, and 20 are shorted internally for the convenience of the 
    user. This port is used for programming and call recording output. 
    4.14 During programming, a suitable terminal must be connected to 
    this port. For call recording output, a suitable printer is con- 
    nected in place of the terminal. Refer to Part 6 paragraph 6.05 for the 
    configuration of the terminal or the printer. 
    RJBlWCA31A USOC Jack and Cable 
    4.15 Figure 4-7 illustrates the USOC RJ31XKA31A Connector and ,, 
    cable assembly 
    as used by the SAC. Figure 4-5 illustrates the 
    installation wiring of the Telco-supplied RJ31XKABlA USOC jack and 
    other connections from the Central Office through to the Modem or 
    i 
    other protected equipment. For the unit to operate properly, the bridge 
    clips at the “split” type station block must be removed. 
    Page 20  
    						
    							SECTION MITL8350-048-100-N/I 
    ORDERING INFORMATION 
    4.15 Table 4-l on the following page lists the part numbers and 
    descriptions of items that can be ordered from MITEL DATA- 
    COM INC. 
    Table 4-1, SMarT-1 tm Ordering Information 4-1, SMarT-1 Ordering Information 
    PART NO. 
    8350-007 SMarT-1’“: DESCRIPTION 
    4 Line Security Access Controller. Includes Power Pack, 
    RJ31 Cables, and Mounting Hardware. 
    8350-008 SMarT-1 tm: 2 Line Security Access Controller. Includes Power Pack, 
    RJ31 Cables, and Mounting Hardware. 
    8350-009 SMarT-1’“: 1 Line Security Access Controller. Includes Power Pack, 
    RJ31 Cables, and Mounting Hardware. 
    SPARES 
    8350-010 Wall Mount Bracket for SMarT-1’” Security Access Controllers. 
    8350-012 Power Pack for SMarT-1’” Security Access Controllers. 
    8350-013 RJ31XKA31A Cable for SMarT-1’” Security Access Controllers. 
    8350-048- 100-NA General Information Manual. 
    8350-953-003-NA SAC Maintenance Programming Guide. 
    Page 21  
    						
    							SECTION MITL8350-048-l OO-NA 
    --- THIS PAGE INTENTIONALLY LEFT BLANK --- 
    Page 22  
    						
    							SECTION MITL8350-048-IOO-NA 
    5. OPERATING DESCRIPTION 
    SECURITY 
    5.01 
    The primary function of the SMarT-1’” Security Access Control- 
    ler (SAC) is to provide security to connected systems such as 
    Modems and to protect these systems from unauthorized telephone 
    access. The security provided by the SAC lies in three distinct areas. 
    These areas are: 
    l The use of optional progress tones, or lack thereof, to make it 
    difficult for an unauthorized caller to recognize that there is 
    protected equipment connected to the telephone line. 
    0 
    The inclusion of the callback feature to assure that only those 
    individuals with valid passwords are called back at an assigned 
    number associated with that particular password. 
    0 
    Finally, the provision of a call detail record that is available at 
    the RS-232 Computer Port to record the time and duration of 
    the call, along with the number that was called back. 
    5.02 While it is not recommended, the SAC may also be pro- 
    grammed to allow instant access (circumvention of the call 
    back feature) upon the- receipt of a particular password. 
    5.03 Passwords must be Dual-Tone Multifrequency (DTMF) digit 
    strings that range from 1 to 15 digits in length. Only a DTMF 
    type of telephone can be used to access the SAC. Rotary dial tele- 
    phones cannot be used since rotary digits can only be received by, but 
    not transmitted through, a Central Office. 
    OPERATIONAL SEQUENCES 
    5.04 The steps listed below show the operational sequences of the 
    Controller: 
    Note: A single progress tone as used in the steps below indicates 
    that the user will hear a single ‘beep’ in the receiver earpiece 
    of the telephone. In a like manner, a double progress tone 
    means two ‘beeps’ and a triple progress tone means three 
    ‘beeps’. 
    1) The user dials the directory telephone number of the protected 
    device with a DTMF type telephone. 
    2) The SAC detects the incoming call, disconnects the protected 
    equipment from the line, and answers the call. The SAC may 
    then optionally provide the user with a single progress tone. 
    3) The user enters his/her password by keying the correct digits 
    on the telephone. This password may be from 1 to 15 digits in 
    length and consists of any of the 12 standard DTMF digits. 
    4) If an exact match for the password cannot be found in the SAC 
    Page 23  
    						
    							SECTION MITL8350-048-IOO-NA 
    5) 
    6) 
    internal memory, the Controller drops the line (hangs up) and 
    may optionally “busy out” that particular line for a program- 
    mable length of time. The unsuccessful password will be print- 
    ed in the Call Detail Record. 
    If an exact match for the password is found in the SAC internal 
    memory, the Controller will check for the type of access that 
    the password permits, including the time-of-day period as- 
    signed for that particular access. 
    Upon verification of a valid password during the particular 
    time-of-day period, the SAC will then execute its programmed 
    action for that particular password. One of three series of 
    events will occur: 
    ? 
    Automatic Callback Access: 
    a) The password action is deemed to be an automatic call- 
    back. For this instance, the SAC will hang up the tele- 
    phone line, reseize the line and dial back to the user by 
    using a preprogrammed call back number associated 
    with this particular password. The user must know that 
    he has to hang up, or may optionally be requested to 
    hang up by receipt of a triple progress tone ,from the 
    Controller. This method of access is considered to be 
    the most secure making it nearly impossible for some- 
    one to gain unauthorized access to the protected equip- 
    ment. 
    User Entered Callback Access: 
    b) The password action is deemed to be a user controlled 
    callback type. This means that the user must manually 
    tell the controller the telephone number to be used for 
    the callback. The user either must know when to enter 
    his telephone number and hang up, or may optionally be 
    requested to input his telephone number by receipt of a 
    double progress tone, and to hang up on receipt of a 
    triple progress tone. As before, the SAC will then hang 
    up and reseize the line. It will dial out using the user 
    entered telephone number. This action is less secure 
    that the previous action since the user provides the 
    telephone number. However, the call detail record will 
    contain the telephone number that the user has entered 
    and was called back at. 
    Cut-Through Access: 
    c) The password action is deemed to be a ‘cut-through’ 
    type of access. In this case, there will be no progress 
    tones received or any other SAC activity. At the expira- 
    tion of the ‘wait for password’ time period, the SAC will 
    connect the caller to the protected device. This action is 
    the least secure of the three actions. While the password 
    must be entered exactly and the access attempt made 
    Page 24  
    						
    							SECTION MlTL8350-048-l OO-NA 
    during the allowed time-of-day, there will be no record 
    of the call with the exception of the time and duration of 
    the access and the optional printing of the successful 
    password. 
    DETAILED OPERATING DESCRIPTION 
    With Modems 
    5.05 
    The following assumptions are taken into consideration when 
    describing the detailed operating procedures that will follow in 
    paragraph 5.06: 
    1) 
    2) 
    3) There are correctly installed and known functional Modem con- 
    nections for the Central Processing Unit (CPU) and the remote 
    access. Any installation should first be capable of functioning 
    without the SAC device present to cut down on non-SAC re- 
    lated operational questions. 
    If installation problems are encountered at any time, the SAC 
    device should be removed to prove that connections are possi- 
    ble without the device. Otherwise, considerable effort could be 
    expended when the problem is in other areas of the system. 
    Persons accessing the system (users) have been previously 
    advised of any necessary sequence of events required in order 
    to establish a valid Modem connection. In some instances, spe- 
    cialized sequences will be required. 
    Automatic Callback Access 
    5.06 
    cess: 
    1) 
    2) 
    3) 
    Note: 
    The following steps outline the operations of the Security Ac- 
    cess Controller that occur when using automatic callback ac- 
    The caller dials the host system over the telephone lines. 
    The protected Modem senses ringing and seizes the line. With 
    proper programming, the SAC then splits the line while the 
    protected Modem is waiting for the line to settle (about 2 
    seconds). The Modem (at the end of the line settling period) 
    places an answer tone on its output to the SAC. The SAC emits 
    a single progress tone to the caller. No Modem tones are 
    supplied to the caller. 
    The caller, after hearing the progress tone (unless disabled), 
    must enter the assigned password via DTMF dialing. Two con- 
    ditions must be satisfied at this point. The first is that the 
    protected Modem must be capable of answering in the answer 
    mode for a programmable period of time that is sufficient to 
    allow the callback to occur. The second is that the called back 
    Modem must be capable of being forced into the originate 
    mode upon receipt of the callback. 
    A more efficient variation of the above description would be 
    that the protected Modem answer the incoming call in the 
    Page 25  
    						
    							SECTION MITL8350-048-IOO-NA 
    4) 
    5) 
    6) 
    7) 
    Note: 
    originate mode (waiting for answer tone) for a period of time 
    long enough to allow the callback to occur, as previously 
    mentioned. In this case, the callback could be automatically 
    answered by the Modem that is accessing the host system. 
    These events depend upon the sophistication of the Modems 
    and the ingenuity of the user. 
    After a programmable period of time, the SAC will drop the line. 
    The SAC will reseize the line if the password is valid, and will 
    dial back the caller via the use of speed dialing. 
    If the protected Modem is waiting for an originate tone (via 
    programming), the calling Modem may simply answer the call 
    automatically, thus establishing the connection. The SAC will 
    cut-through upon the completion of it’s call back and connect 
    the two Modems. 
    If the called Modem is waiting in the answer mode (most 
    common used mode), the caller must place his Modem into the 
    originate mode upon receipt of the callback. 
    Once connection is established, the SAC ‘goes to sleep’ and 
    appears as a direct through connection to the two Modems. 
    Call disconnection is accomplished as per normal operation, or 
    at a loss of carrier detect at either Modem. 
    In the 2- and 4-line models, the SAC is continually monitoring 
    the other unused lines while the above procedure is taking 
    place. 
    User-Entered Callback Access 
    5.07 The following steps outline the operations of the Security Ac- 
    cess Controller that occur when using user entered callback 
    access: 
    1) The caller dials the host system over the telephone lines. 
    2) The protected Modem senses ringing and seizes the line. With 
    proper programming, the SAC then splits the line while the 
    protected Modem is waiting for the line to settle (about 2 
    seconds). The Modem (at the end of the line settling period) 
    places an answer tone on its output to the SAC. The SAC emits 
    a single progress tone to the caller. No Modem tones are 
    supplied to the caller. Two conditions must be satisfied at this 
    point. The first’ is that the protected Modem must be capable of 
    answering in the answer mode for a programmable period of 
    time that is sufficient to allow the callback to occur. The second 
    is that the called back Modem must be capable of being forced 
    into the originate mode upon receipt of the callback. 
    3) The caller, after hearing the progress tone (unless disabled), 
    must enter the assigned password via DTMF dialing. Upon vali- 
    dation of the password, the SAC will emit a double progress 
    tone to the caller. 
    4) The caller, after hearing the double progress tone (unless dis- 
    Page 26  
    						
    All Mitel manuals Comments (0)

    Related Manuals for Mitel SMART L CALL CONTROLLER Hardware Installation Manual