Home > Mitel > Communications System > Mitel SMART L CALL CONTROLLER Hardware Installation Manual

Mitel SMART L CALL CONTROLLER Hardware Installation Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Mitel SMART L CALL CONTROLLER Hardware Installation Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 55 Mitel manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 458
    							SECTION MITL8850-048-l OO-NA 
    _I . .. 
    : 
    Note: 
    5) 
    6) 
    7) 
    8) 
    Note: abled), must enter the telephone number for callback by DTMF 
    dialing. Two conditions must be satisfied at this point. The first 
    is that the protected Modem must be capable of answering in 
    the answer mode for a programmable period of time that is 
    sufficient to allow the callback to occur. The second is that the 
    called back Modem must be capable of being forced into the 
    originate mode upon receipt of the callback. 
    A more efficient variation of the above description would be 
    that the protected Modem answer the incoming call in the 
    originate mode (waiting for answer tone) for a period of time 
    long enough to allow the callback to occur, as previously 
    mentioned. In this case, the callback could be automatically 
    answered by the Modem that is accessing the host system. 
    These events depend upon the sophistication of the Modems 
    and the ingenuity of the user. 
    After a programmable period of time, the SAC will drop the line. 
    The SAC will reseize the line if the password is valid, and will 
    dial back the caller using the number just accessed. 
    If the protected Modem is waiting for an originate tone (via 
    programming), the calling Modem may simply answer the call 
    automatically, thus establishing the connection. The SAC will 
    cut-through upon the completion of it’s call back and connect 
    the two Modems. 
    If the called Modem is waiting in the answer mode (most 
    common used mode), the caller must place his Modem into the 
    originate mode upon receipt of the callback. 
    Once connection is established, the SAC ‘goes to sleep’ and 
    appears as a direct through connection to the two Modems. 
    Call disconnection is accomplished as per normal operation, or 
    at a loss of carrier detect at either Modem. 
    In the 2- and 4-line models, the SAC is continually monitoring 
    the other unused lines while the above procedure is taking 
    place. 
    Cut Through Access 
    5.08 The following steps outline the operations of the Security Ac- 
    cess Controller that occur when using access via Cut Through 
    Access: 
    1) The caller dials the host system via the telephone line. 
    2) The protected Modem senses ringing and seizes the line. 
    3) With proper programming, the SAC splits the line while the 
    protected Modem is waiting for the line to settle (approximately 
    2 seconds). After line settling, the protected Modem places an 
    answer tone at its output. No Modem tones are supplied to the 
    caller. 
    4) The answering Modem must remain on the line while the caller, 
    Page 
    27  
    						
    							SECTION MITL8350-048-l OO-NA 
    after hearing the single progress tone (unless disabled) enters 
    his assigned password via DTMF dialing. 
    5) Upon verification of the password, the SAC will cut-through 
    (connect the caller to the protected Modem). The calling Mo- 
    dem will respond with an originate tone that establishes the 
    connection. Except for the slight pause required to enter the 
    caller’s password, this is a standard access and requires no 
    special considerations. The only constraint is that a valid pass- 
    word must be entered within a predetermined length of time. 
    Failure to enter the password within this time frame 
    (determined by the answering Modem and/or SAC constraints 
    programmed as desired) would result in the line being dropped 
    and the access failing. 
    6) Once the connection is established, the SAC device ‘goes to 
    sleep’ and appears as a direct connection between the two 
    Modems. Modem disconnection is established as per normal 
    routines or at a loss of carrier detect at either Modem. 
    Other Operational Procedures 
    5.08 Other operational procedures or applications depend on the 
    type of equipment being protected and the related operating 
    conditions. In all applications, the three basic modes of access in 
    descending order of security are: 
    0 Automatic Callback on Valid Password 
    0 
    Callback to User Entered Number on Valid Password 
    0 
    Connection upon Receipt of Valid Password. 
    Page 28  
    						
    							SECTION MITL8350-048-l OO-NA 
    6. INITIALIZATION 
    INTRODUCTION 
    6.01 
    Initialization is the procedure that readies the SMarT-1’” Secu- 
    rity Access Controller for initial programming. This procedure 
    has been detailed previously in Part 2 of this document. Since it is a 
    very important procedure, it will be listed again in this part in detail. 
    6.02 There are several reasons for accomplishing initialization of the 
    SAC. These are a) that the Controller has just been removed 
    from storage or has just been received, or b) the program access 
    codes have been deleted accidentally or the access codes have been 
    changed and forgotten, or c) the Controller has just been repaired, or 
    d) the Controller has been stored for a long period of time, or e) the 
    Controller has had a loss of data retention. 
    Note: If the reason for initialization is e) above, it is recommended 
    that the reason for loss of data retention be found and cor- 
    rected. 
    6.03 Once. initialized, the Controller should seldom require re- 
    initialization. After initialization, the Controller may be pro- 
    grammed by use of a suitable terminal. A default data base may be 
    loaded by issuing a command via this terminal. 
    6.04 Prior to injtialization, ensure that the Controller has been pow- 
    ered on for a sufficient period of time to allow the internal 
    NI-CAD battery to be charged. This period should be approximately 24 
    hours long. The battery protects the memory against loss of data 
    during power outages and will sustain the memory for several days, 
    once charged. 
    6.05 Initialization is accomplished by use of a suitable terminal con- 
    nected to the RS-232 Computer Port. A suitable terminal is 
    defined as one that meets the following criteria: 
    1) Capable of transmitting and receiving at 1200 Baud. 
    2) No parity 
    3) 8 bit characters with one stop bit 
    4) Bit 8 sense = SPACE’ 
    5) Full Duplex communications 
    6) Connection to the RS-232 Computer Port with a suitable cable 
    configured as “DCE” with the following pin connections: 
    a) Pins 1 and 7 = GROUND 
    b) Pin 2 = RxD (Signal in) 
    c) Pin 3 = TxD (Signal out) 
    d) Pins 4 and 5 = Tied together 
    e) Pins 6, 8, and 20 = Tied together. 
    Page 29  
    						
    							SECTION MITL8350-048-l OO-NA 
    Note: 
    The Security Access Controller does not respond to DTR, RTS, 
    etc.. 
    PROCEDURE 
    6.06 The steps below show the procedure to be followed to initialize 
    the Controller: 
    1) Power the SAC off. 
    2) Connect a suitable terminal to the RS-232 Computer Port. 
    3) Power the terminal on and set for the required parameters (if . . 
    required). 
    4) Power the SAC on. Once on, the Controller will monitor the 
    RS-232 Computer Port for a period of 7 seconds. 
    5) During this 7 second period, enter the characters ‘AA’ from the 
    terminal keyboard (in upper case only). Within another 7 second 
    period, the SAC should respond with: 
    REV xx-xx ENTERING PROG. MODE 
    where ‘xx-xx’ is the revision of the software resident in the 
    controller. Once this message has appeared, the SAC is in the 
    programming mode. 
    * 
    Note: The SAC should not be powered down while it is in the 
    programming mode as it will cause the unit to print checksum 
    errors on the next power up sequence. 
    6.07 If, after 7 seconds, the initialize command is not received, the 
    SAC will check its internal memory for the programmed Baud 
    rate (1200 Baud by default) and switch the RS-232 Computer Port to 
    that rate. 
    6.08 Initialization of the SAC will load a complete database for auto- 
    matic callback operation with the following communications 
    parameters: 
    1) 1200 Baud Rate 
    2) No Parity 
    3) 8 bit Characters with one Stop Bit 
    4) Bit 8 Sense = SPACE 
    5) Full Duplex Communications 
    6.09 Once initialized, programming may be immediately started via 
    the terminal. The user may elect to exit the programming mode 
    by entering ‘999’ on the terminal keyboard. If ‘999’ is entered, the SAC 
    will respond on the terminal display with: 
    QUITTING PROG. MODE.. 
    Page 
    30  
    						
    							SECTION MITL8350-048-IOO-NA 
    Note: 
    Pressing  on the keyboard will not allow programming if 
    the default Terminal Program Access Code () has been 
    changed. Refer to Part 7, Programming for more details. 
    6.10 If nothing is entered on the terminal keyboard for a period of 1 
    minute, the SAC will automatically print on the terminal display: 
    WARNING . . . 
    LOGOUT IN 60s. 
    and 1 minute later, the SAC will automatically exit the programming 
    mode. 
    Page 31  
    						
    							SECTION MITL8350-048-IOO-NA 
    --- THIS PAGE INTENTIONALLY LEFT BLANK --- 
    Page 32  
    						
    							SECTION MITL8350-048-IOO-NA 
    7. PROGRAMMING 
    INTRODUCTION 
    7.01 
    Prior to using the SMarT-I’” Security Access Controller, some 
    basic programming must be entered into the unit. This basic 
    programming provides the Controller with the date, time, passwords, 
    and other fundamental information that is pertinent to the operation of 
    the unit. The parameters to be programmed depend on the type of 
    operation that is expected of the Controller. 
    Note: Before programming the unit, ensure that it has been ini- 
    tialized and powered on long enough to charge the internal 
    battery. For more information on initializing, refer to Part 6, 
    page 29. 
    7.02 Initializing the SMarT-1’” Security Access Controller will pro- 
    vide the unit with part of the basic programming that is per- 
    tinent to the operation. This initialization procedure will cause the unit 
    to be programmed as listed 
    in Table 7-l below. The table also lists the 
    associated parameter label that applies to the default data. 
    Table 7-1, Initialization/Default Programming Parameters 
    DEFAULT DESCRIPTION- ASSOCIATED 
    PARAMETER 
    LABEL 
    INTERNAL 
    CLOCK = No time or date entered 
    PASSWORD DATA = No passwords present 
    ACCESS CONTROL SEQUENCE = Callbacks are dialed 
    to the DDD Net- 
    work 
    CALLBACK NUMBER DATA = No callback numbers present 
    TYPE OF CENTRAL OFFICE = Loop Start 
    DTMF Digit output 
    PRINTER BAUD RATE = 1200 Baud RS-232 Communications 
    Fixed: No 
    parity 
    8-bit words 
    Bit 8 Sense = SPACE 
    Full duplex 
    On line 980 
    821 thru 835 
    6r5 
    7nnn 
    xoot 
    xoot 
    006t 
    PRINT FORMAT = Call 
    Detail Record in SMART Format 
    AUTO ANSWER TIMER = Automatically answer incoming calls in 
    3 
    seconds 
    WAIT 
    FOR PASSWORD TIMER = Wait 8 seconds for password entry 
    (Continued) 
    009t 
    x27t 
    x28t 
    Page 
    33  
    						
    							SECTION MlTL8350-048-l OO-NA 
    Table 7-l (Cont’d), initialization/Default Programming Parameters 
    ASSOCIATED 
    DEFAULT DESCRIPTION 
    PARAMETER 
    LABEL 
    AUTO ANSWER LOCKOUT TIMER = 
    “Busy Out” line for 20 seconds on 
    invalid password 
    TONE OPTIONS = Single tone to request password “ON” 
    Double tone to request callback number “ON” 
    Triple tone to request caller hang up “ON” 
    DIALBACK TIMER = Wait for 5 seconds before initiating callback 
    MACHINE IDENTIFIER = “SAC” 
    TERMINAL PROGRAM SECURITY CODE = “” 
    NAME OF ROUTE = “DDD” 
    No 
    “Other Common Carrier” programming is in default. 
    x29t 
    x35t 
    x35t 
    x35t 
    x36t 
    602 
    604 
    6rO 
    Note: The letter ‘x’ or ‘r’ in the parameter label represents a single 
    user selectable character for entry to select a specific part of 
    the parameter. The letter ‘t’ represents a digit that selects a 
    specific operation of the parameter. 
    7.03 While the default parameters listed in the Table 7-l above is 
    not a complete listing of all of the parameters that are resident 
    in the Controller, they are the ones that are the most pertinent to unit 
    operation. The remaining parameters (not listed in the table) are set to 
    defaults that will work in nearly all applications. These other param- 
    eters are programmable for those times when “standard” conditions of 
    the telephone lines or dialing patterns are not present. 
    PROGRAMMING FOR CALLBACK OPERATION 
    7.04 Programming is accomplished from a terminal attached to the 
    RS-232 Computer Port of the Controller. Programming consists 
    of entering a parameter identifier consisting of three or more digits, 
    followed by a data string and an entry terminator (if required). For 
    example, if the unit were in the programming mode and it is desired to 
    program the time and date, the parameter ‘980’ would be entered. This 
    parameter would be followed by the month, day, hour, and minutes 
    entered as a digit string. The string would be composed of four, two 
    digit groups for the date and time. This string does not require a 
    terminator and the Controller would automatically accept and enter the 
    terminal data. 
    TERMINAL 
    > PARAMETER 
    D801 
    USER 
    DATA 
    1 TERMINATOR 
    [mmddhhmm] 
    (none) 
    Page 
    34  
    						
    							SECTION MITL8350-048-l OO-NA 
    NOTES ON DATA ENTRY 
    Whenever the Controller knows the length of a parameter 
    entry, the entry will automatically be accepted by the SAC 
    without the need of following the entry with a terminator. 
    For string type entries of unknown length (to the SAC), a 
    terminator of ‘BB’ or ‘FF’ must be entered to identify the end 
    of the entry. Technically, ‘BB’, ‘FF’, and ‘. .’ are all internally 
    interpreted as the same digit (see Table C-2, page C-5). The 
    last character of an ASCII string may not be ‘B’. However, a 
    single ‘B’ within a string is allowed. If the last character of 
    an ASCII string must be ‘B’, then it must be followed with a 
    nonprinting character such as a  (hexadecimal 20). 
    If necessary, the , , ,  and so on may 
    also be used within an ASCII string. 
    The greater than sign (>) on the terminal display indicates 
    that the SAC is ready to receive a parameter number fol- 
    lowed by data. This character is called the ‘prompt’ char- 
    acter. 
    If an error is made and noticed during data entry, simply 
    press the carriage return () key until the > prompt 
    returns to the screen. In this case, the input string will be 
    ignored. 
    NOTES ON ORDER OF PASSWORD PROGRAMMING 
    In general, passwords with automatic callback actions ei- 
    ther should be programmed into the unit first, or a specific 
    block of numbers with the last three digits being used to 
    address passwords should be set up. The same password 
    may not be used with different action digits. 
    7.05 Prior to accomplishing the programming for callback operation, 
    the following conditions are assumed to exist: 
    1) 
    2) 
    3) 
    4) 
    5) The terminal access code will still be ‘‘. 
    The Central Office is capable of DTMF dialing input. 
    The Central Office is a Loop Start type of office (the most 
    common in Modem applications). 
    1200 Baud communications will suffice. 
    The protected Modem remains ON 
    LINE for 45 seconds after 
    ringing detection. 
    6) Callback is to take place on the standard DDD Network. 
    Procedural Steps 
    7.06 
    To program the SMarT-1’” Security Access Controller for Call- 
    back Operation, accomplish the steps listed below: 
    Page 35  
    						
    							SECTION MITL8350-048-l OO-NA 
    Note: 
    1) 
    2) 
    3) 
    4) 
    4) 
    6) 
    7.07 
    User entered data will be enclosed in square brackets. For 
    more information on conventions used in this manual, refer to 
    Part 1, paragraph 1.12. 
    Ensure that the Controller has been powered up and initialized 
    in accordance with Part 6, paragraph 6.06. 
    Press carriage return () on the terminal keyboard to start 
    the programming session. The terminal display should respond 
    with: 
    REV xx-xx ENTERING PROG. MODE 
    > 
    Enter the time and date by pressing: 
    > 
    1980mmddhhmml 
    where 980 = the time/date parameter, mm = the two digit 
    month, dd = the two digit day, hh = the two digit hour, and mm 
    = the two digit minutes. Note that single digit entries for mm, 
    dd, hh, mm should be prefixed with a ‘0’ to make them double 
    digit entries. 
    Enter the machine identifier as ‘Tom’ by pressing: 
    > 
    1602546F6DBBl 
    where 602 = the machine identifier parameter, 54 = ASCII ‘T’, 6F 
    = ASCII ‘o’, 6D = ASCII ‘m’, and ‘BB’ = the data terminator. 
    Enter the password, callback code, and the time-of-day access 
    code by pressing: 
    > L825123452OBBl 
    where 825 = the parameter for a five digit password, 12345 = 
    the actual password, 2 = the action digit to be performed (in 
    this case, go to speed call callback location), 0 = the time- 
    of-day code (all day, 24 hour access), and BB = the data termi- 
    nator. 
    Enter the callback number for the above password by pressing: 
    > 
    L734583931212BBI 
    where 7 = the register prefix, 345 = the ‘bin’ number of the 
    callback number and is equal to the last three digits of the 
    password, 8 = the network override and indicates to use the 
    search tables, 393 1212 
    = the callback number, and BB = the 
    data terminator. 
    The last entry above is the end of this example of program- 
    ming. The user should now proceed with the example listed to 
    show how to check the entered data as given below: 
    ENTER SAC RESPONSE DESCRIPTION 
    c9021   > Data confirmation mode entered. 
    [6021 546F6D ASCII for ‘Tom’. 
    Page 36  
    						
    All Mitel manuals Comments (0)

    Related Manuals for Mitel SMART L CALL CONTROLLER Hardware Installation Manual