Mitel SMART L CALL CONTROLLER Hardware Installation Manual
Have a look at the manual Mitel SMART L CALL CONTROLLER Hardware Installation Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 55 Mitel manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
SECTION MITL8850-048-l OO-NA _I . .. : Note: 5) 6) 7) 8) Note: abled), must enter the telephone number for callback by DTMF dialing. Two conditions must be satisfied at this point. The first is that the protected Modem must be capable of answering in the answer mode for a programmable period of time that is sufficient to allow the callback to occur. The second is that the called back Modem must be capable of being forced into the originate mode upon receipt of the callback. A more efficient variation of the above description would be that the protected Modem answer the incoming call in the originate mode (waiting for answer tone) for a period of time long enough to allow the callback to occur, as previously mentioned. In this case, the callback could be automatically answered by the Modem that is accessing the host system. These events depend upon the sophistication of the Modems and the ingenuity of the user. After a programmable period of time, the SAC will drop the line. The SAC will reseize the line if the password is valid, and will dial back the caller using the number just accessed. If the protected Modem is waiting for an originate tone (via programming), the calling Modem may simply answer the call automatically, thus establishing the connection. The SAC will cut-through upon the completion of it’s call back and connect the two Modems. If the called Modem is waiting in the answer mode (most common used mode), the caller must place his Modem into the originate mode upon receipt of the callback. Once connection is established, the SAC ‘goes to sleep’ and appears as a direct through connection to the two Modems. Call disconnection is accomplished as per normal operation, or at a loss of carrier detect at either Modem. In the 2- and 4-line models, the SAC is continually monitoring the other unused lines while the above procedure is taking place. Cut Through Access 5.08 The following steps outline the operations of the Security Ac- cess Controller that occur when using access via Cut Through Access: 1) The caller dials the host system via the telephone line. 2) The protected Modem senses ringing and seizes the line. 3) With proper programming, the SAC splits the line while the protected Modem is waiting for the line to settle (approximately 2 seconds). After line settling, the protected Modem places an answer tone at its output. No Modem tones are supplied to the caller. 4) The answering Modem must remain on the line while the caller, Page 27
SECTION MITL8350-048-l OO-NA after hearing the single progress tone (unless disabled) enters his assigned password via DTMF dialing. 5) Upon verification of the password, the SAC will cut-through (connect the caller to the protected Modem). The calling Mo- dem will respond with an originate tone that establishes the connection. Except for the slight pause required to enter the caller’s password, this is a standard access and requires no special considerations. The only constraint is that a valid pass- word must be entered within a predetermined length of time. Failure to enter the password within this time frame (determined by the answering Modem and/or SAC constraints programmed as desired) would result in the line being dropped and the access failing. 6) Once the connection is established, the SAC device ‘goes to sleep’ and appears as a direct connection between the two Modems. Modem disconnection is established as per normal routines or at a loss of carrier detect at either Modem. Other Operational Procedures 5.08 Other operational procedures or applications depend on the type of equipment being protected and the related operating conditions. In all applications, the three basic modes of access in descending order of security are: 0 Automatic Callback on Valid Password 0 Callback to User Entered Number on Valid Password 0 Connection upon Receipt of Valid Password. Page 28
SECTION MITL8350-048-l OO-NA 6. INITIALIZATION INTRODUCTION 6.01 Initialization is the procedure that readies the SMarT-1’” Secu- rity Access Controller for initial programming. This procedure has been detailed previously in Part 2 of this document. Since it is a very important procedure, it will be listed again in this part in detail. 6.02 There are several reasons for accomplishing initialization of the SAC. These are a) that the Controller has just been removed from storage or has just been received, or b) the program access codes have been deleted accidentally or the access codes have been changed and forgotten, or c) the Controller has just been repaired, or d) the Controller has been stored for a long period of time, or e) the Controller has had a loss of data retention. Note: If the reason for initialization is e) above, it is recommended that the reason for loss of data retention be found and cor- rected. 6.03 Once. initialized, the Controller should seldom require re- initialization. After initialization, the Controller may be pro- grammed by use of a suitable terminal. A default data base may be loaded by issuing a command via this terminal. 6.04 Prior to injtialization, ensure that the Controller has been pow- ered on for a sufficient period of time to allow the internal NI-CAD battery to be charged. This period should be approximately 24 hours long. The battery protects the memory against loss of data during power outages and will sustain the memory for several days, once charged. 6.05 Initialization is accomplished by use of a suitable terminal con- nected to the RS-232 Computer Port. A suitable terminal is defined as one that meets the following criteria: 1) Capable of transmitting and receiving at 1200 Baud. 2) No parity 3) 8 bit characters with one stop bit 4) Bit 8 sense = SPACE’ 5) Full Duplex communications 6) Connection to the RS-232 Computer Port with a suitable cable configured as “DCE” with the following pin connections: a) Pins 1 and 7 = GROUND b) Pin 2 = RxD (Signal in) c) Pin 3 = TxD (Signal out) d) Pins 4 and 5 = Tied together e) Pins 6, 8, and 20 = Tied together. Page 29
SECTION MITL8350-048-l OO-NA Note: The Security Access Controller does not respond to DTR, RTS, etc.. PROCEDURE 6.06 The steps below show the procedure to be followed to initialize the Controller: 1) Power the SAC off. 2) Connect a suitable terminal to the RS-232 Computer Port. 3) Power the terminal on and set for the required parameters (if . . required). 4) Power the SAC on. Once on, the Controller will monitor the RS-232 Computer Port for a period of 7 seconds. 5) During this 7 second period, enter the characters ‘AA’ from the terminal keyboard (in upper case only). Within another 7 second period, the SAC should respond with: REV xx-xx ENTERING PROG. MODE where ‘xx-xx’ is the revision of the software resident in the controller. Once this message has appeared, the SAC is in the programming mode. * Note: The SAC should not be powered down while it is in the programming mode as it will cause the unit to print checksum errors on the next power up sequence. 6.07 If, after 7 seconds, the initialize command is not received, the SAC will check its internal memory for the programmed Baud rate (1200 Baud by default) and switch the RS-232 Computer Port to that rate. 6.08 Initialization of the SAC will load a complete database for auto- matic callback operation with the following communications parameters: 1) 1200 Baud Rate 2) No Parity 3) 8 bit Characters with one Stop Bit 4) Bit 8 Sense = SPACE 5) Full Duplex Communications 6.09 Once initialized, programming may be immediately started via the terminal. The user may elect to exit the programming mode by entering ‘999’ on the terminal keyboard. If ‘999’ is entered, the SAC will respond on the terminal display with: QUITTING PROG. MODE.. Page 30
SECTION MITL8350-048-IOO-NA Note: Pressing on the keyboard will not allow programming if the default Terminal Program Access Code () has been changed. Refer to Part 7, Programming for more details. 6.10 If nothing is entered on the terminal keyboard for a period of 1 minute, the SAC will automatically print on the terminal display: WARNING . . . LOGOUT IN 60s. and 1 minute later, the SAC will automatically exit the programming mode. Page 31
SECTION MITL8350-048-IOO-NA --- THIS PAGE INTENTIONALLY LEFT BLANK --- Page 32
SECTION MITL8350-048-IOO-NA 7. PROGRAMMING INTRODUCTION 7.01 Prior to using the SMarT-I’” Security Access Controller, some basic programming must be entered into the unit. This basic programming provides the Controller with the date, time, passwords, and other fundamental information that is pertinent to the operation of the unit. The parameters to be programmed depend on the type of operation that is expected of the Controller. Note: Before programming the unit, ensure that it has been ini- tialized and powered on long enough to charge the internal battery. For more information on initializing, refer to Part 6, page 29. 7.02 Initializing the SMarT-1’” Security Access Controller will pro- vide the unit with part of the basic programming that is per- tinent to the operation. This initialization procedure will cause the unit to be programmed as listed in Table 7-l below. The table also lists the associated parameter label that applies to the default data. Table 7-1, Initialization/Default Programming Parameters DEFAULT DESCRIPTION- ASSOCIATED PARAMETER LABEL INTERNAL CLOCK = No time or date entered PASSWORD DATA = No passwords present ACCESS CONTROL SEQUENCE = Callbacks are dialed to the DDD Net- work CALLBACK NUMBER DATA = No callback numbers present TYPE OF CENTRAL OFFICE = Loop Start DTMF Digit output PRINTER BAUD RATE = 1200 Baud RS-232 Communications Fixed: No parity 8-bit words Bit 8 Sense = SPACE Full duplex On line 980 821 thru 835 6r5 7nnn xoot xoot 006t PRINT FORMAT = Call Detail Record in SMART Format AUTO ANSWER TIMER = Automatically answer incoming calls in 3 seconds WAIT FOR PASSWORD TIMER = Wait 8 seconds for password entry (Continued) 009t x27t x28t Page 33
SECTION MlTL8350-048-l OO-NA Table 7-l (Cont’d), initialization/Default Programming Parameters ASSOCIATED DEFAULT DESCRIPTION PARAMETER LABEL AUTO ANSWER LOCKOUT TIMER = “Busy Out” line for 20 seconds on invalid password TONE OPTIONS = Single tone to request password “ON” Double tone to request callback number “ON” Triple tone to request caller hang up “ON” DIALBACK TIMER = Wait for 5 seconds before initiating callback MACHINE IDENTIFIER = “SAC” TERMINAL PROGRAM SECURITY CODE = “” NAME OF ROUTE = “DDD” No “Other Common Carrier” programming is in default. x29t x35t x35t x35t x36t 602 604 6rO Note: The letter ‘x’ or ‘r’ in the parameter label represents a single user selectable character for entry to select a specific part of the parameter. The letter ‘t’ represents a digit that selects a specific operation of the parameter. 7.03 While the default parameters listed in the Table 7-l above is not a complete listing of all of the parameters that are resident in the Controller, they are the ones that are the most pertinent to unit operation. The remaining parameters (not listed in the table) are set to defaults that will work in nearly all applications. These other param- eters are programmable for those times when “standard” conditions of the telephone lines or dialing patterns are not present. PROGRAMMING FOR CALLBACK OPERATION 7.04 Programming is accomplished from a terminal attached to the RS-232 Computer Port of the Controller. Programming consists of entering a parameter identifier consisting of three or more digits, followed by a data string and an entry terminator (if required). For example, if the unit were in the programming mode and it is desired to program the time and date, the parameter ‘980’ would be entered. This parameter would be followed by the month, day, hour, and minutes entered as a digit string. The string would be composed of four, two digit groups for the date and time. This string does not require a terminator and the Controller would automatically accept and enter the terminal data. TERMINAL > PARAMETER D801 USER DATA 1 TERMINATOR [mmddhhmm] (none) Page 34
SECTION MITL8350-048-l OO-NA NOTES ON DATA ENTRY Whenever the Controller knows the length of a parameter entry, the entry will automatically be accepted by the SAC without the need of following the entry with a terminator. For string type entries of unknown length (to the SAC), a terminator of ‘BB’ or ‘FF’ must be entered to identify the end of the entry. Technically, ‘BB’, ‘FF’, and ‘. .’ are all internally interpreted as the same digit (see Table C-2, page C-5). The last character of an ASCII string may not be ‘B’. However, a single ‘B’ within a string is allowed. If the last character of an ASCII string must be ‘B’, then it must be followed with a nonprinting character such as a (hexadecimal 20). If necessary, the , , , and so on may also be used within an ASCII string. The greater than sign (>) on the terminal display indicates that the SAC is ready to receive a parameter number fol- lowed by data. This character is called the ‘prompt’ char- acter. If an error is made and noticed during data entry, simply press the carriage return () key until the > prompt returns to the screen. In this case, the input string will be ignored. NOTES ON ORDER OF PASSWORD PROGRAMMING In general, passwords with automatic callback actions ei- ther should be programmed into the unit first, or a specific block of numbers with the last three digits being used to address passwords should be set up. The same password may not be used with different action digits. 7.05 Prior to accomplishing the programming for callback operation, the following conditions are assumed to exist: 1) 2) 3) 4) 5) The terminal access code will still be ‘‘. The Central Office is capable of DTMF dialing input. The Central Office is a Loop Start type of office (the most common in Modem applications). 1200 Baud communications will suffice. The protected Modem remains ON LINE for 45 seconds after ringing detection. 6) Callback is to take place on the standard DDD Network. Procedural Steps 7.06 To program the SMarT-1’” Security Access Controller for Call- back Operation, accomplish the steps listed below: Page 35
SECTION MITL8350-048-l OO-NA Note: 1) 2) 3) 4) 4) 6) 7.07 User entered data will be enclosed in square brackets. For more information on conventions used in this manual, refer to Part 1, paragraph 1.12. Ensure that the Controller has been powered up and initialized in accordance with Part 6, paragraph 6.06. Press carriage return () on the terminal keyboard to start the programming session. The terminal display should respond with: REV xx-xx ENTERING PROG. MODE > Enter the time and date by pressing: > 1980mmddhhmml where 980 = the time/date parameter, mm = the two digit month, dd = the two digit day, hh = the two digit hour, and mm = the two digit minutes. Note that single digit entries for mm, dd, hh, mm should be prefixed with a ‘0’ to make them double digit entries. Enter the machine identifier as ‘Tom’ by pressing: > 1602546F6DBBl where 602 = the machine identifier parameter, 54 = ASCII ‘T’, 6F = ASCII ‘o’, 6D = ASCII ‘m’, and ‘BB’ = the data terminator. Enter the password, callback code, and the time-of-day access code by pressing: > L825123452OBBl where 825 = the parameter for a five digit password, 12345 = the actual password, 2 = the action digit to be performed (in this case, go to speed call callback location), 0 = the time- of-day code (all day, 24 hour access), and BB = the data termi- nator. Enter the callback number for the above password by pressing: > L734583931212BBI where 7 = the register prefix, 345 = the ‘bin’ number of the callback number and is equal to the last three digits of the password, 8 = the network override and indicates to use the search tables, 393 1212 = the callback number, and BB = the data terminator. The last entry above is the end of this example of program- ming. The user should now proceed with the example listed to show how to check the entered data as given below: ENTER SAC RESPONSE DESCRIPTION c9021 > Data confirmation mode entered. [6021 546F6D ASCII for ‘Tom’. Page 36