Lucent Technologies RPSD, 555-024-402 User Manual

Remote Port Security Device
User’s Guide
555-024-402 Comcode 107748717 Issue 1 October 1996
Copyright 1996, L ucent Technologies Lucent Technol ogies 555-024-402
All Rights Reserved Issue 1
Every effort was made to ensure that the information in this book was complete and accurate at the time of printing. However, information is subject to change.
Your Responsibility for Your System’s Sec u rity
Toll fraud is the unauthor ized use of your telec ommunications system by an unauthor ized party, for example, persons other than your company’s employees , agents, subcontract ors, or persons worki ng on your company’s beh alf. Note that there may be a risk of toll fr aud associated with your telecommunications system, and if toll fraud occur s, it can result in subst antial additional charges for your telecommunications services.
You and your sys tem ma nager ar e respo nsi ble f or th e se curit y of y our sy ste m, s uch as pr ogram ming and conf iguri ng your equipment to prevent unauthorized use. The system manager is also responsible for reading all installation, in­struction, and system administration documents provided with this product in order to fully understand the features that can introduc e risk of toll frau d and the steps t hat can be take n to reduce th at ris k. Lucent Technologi es does not warrant that this product is immune from or will prevent unauthorized use of common-carrier telecommuni cation ser­vices or facilities accessed through or connected to it. Lucent Technologies will not be responsible for any charges that result from such unauthorized use.
Federal Communication Commission (FCC) Statement
This equipment has been tested and found to comply wit h the limits for a Class A digital device, pursuant to Par t 15 of the FCC Rules. These limits are designed to provide reasonabl e protection against harmful interf erence when the equipment is opera ted in a commer cial environ ment. This equ ipment gene rates, uses , and can radiate r adio freque n­cy energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation.
For further FCC informat ion, see “Customer Support Information” below.
Trademarks
DEFINITY, UNIX, AUDIX, DIMENSION, M ERLIN, and PA RTNER are register ed trademarks of Lucent Technologies in the US and other countries.
Ord e ri n g In form at io n
Call:Lucent Technologies Fulfillment Center Voice 1 800 457-1235International Voice 317 361-5353 Fax 1 800 457-1764International Fax 317 361-5355
Write:Lucent Technologies Fulfillment Center P.O. Box 4100 Crawfordsvil le, IN 47933
Order:Document No. Lucent Technologies 555-024-402 Comcode 10774877 Issue 2, July 1996
For more information about Lucent Technologies documents, refer to the section entitled “Related Documents” in “About This Book.”
Support Telephon e Number
In the continental US, Lucent Technologies provides a toll-free customer helpline 24 hours a day. Call the Lucent Technologie s Helpline at 1 800 242-2121 or your Lu cent Technolo gies author ized dealer i f you need ass istance when installing, programming, or using your system. Outside the continental US, contact your local Lucent Technologies representative.
Lucent Technologies Fraud Interventi o n
If you
suspect you ar e being victimi zed
nical Service Cent er at 1 800 643-2353 or 1 800 242-2121.
Warranty
Lucent Technologies provides a limited warranty on this product. Refer to “Limited Warranty” in “Customer Support Information.”
by toll fr aud and you need techn ical support or assist ance, call the BCS Tec h-
Remote Port Security Device
User’s Guide
555-024-402
Contents
Contents
Contents iii Customer Support Information xi
Support Telephone Number xi
Security of Your System: Preventing Toll Fraud xii
Lucent Technologies Fraud Intervention xiii
Guarantee xiii
RPSD Lock with no Keys xiii RPSD Lock with Keys xiv
Limited Warranty xv
FCC Notification and Repair Information xvi
Issue 1
October 1996
Page iii
Installation and Operational Procedures xvii
Federal Communication Commission
(FCC) Electromagnetic Interference Information xviii
About This Book xix
Intended Audiences xix
Responsibilities xix
Terms and Conventions xx
Typographical Conventions xxi
How to Use This Book xxi
Product Safety Labels xxii
Related Documents xxii
How to Comment on This Document xxii
1 Introduction 1-1
RPSD System 1-2
Hardware Components 1-5
RPSD Lock 1-5 RPSD Key 1-7 Modems 1-8 RPSD Lock or Key Administration Terminal 1-9 RPSD Lock Administration Pr inter 1-9
Software Components 1-10
System Administration 1-11
Time of Day Access 1-11
Remote Port Security Device
User’s Guide
Contents
555-024-402
System Activity Log 1-12 Single Point Administration 1-14 Block Lucent Technologies and Other Key Users 1-15 Force Connect/Disconnect 1-15 Authorized Keys 1-16
2 Installation 2-1
Room Layout/Environment 2-2
Power Supply 2-2 Location of Administration Terminal or Printer 2-3
Installation 2-4
Cables, Connectors, and Ports 2-5
Issue 1
October 1996
Page iv
Insta lling the RPSD L oc k 2-5 Insta lling the RPSD K e y 2-16 Testing an Uninitialized Key 2-18 Initializing the RPSD Lock 2-18 Initializing the RPSD Key 2-19
Testing the RPSD Lock Installation 2-20
3 RPSD System Admini s t rat ion 3-1
Menu of Commands 3-2
Command Functions 3-5
A—Add User 3-6 AH—Access History 3-11 AA—Administra ti ve Acce ss His to ry 3-14 AF—A dministra ti ve Fa ilur e H is t o ry 3-17 AS—AUX Security 3-19 B—Block User 3-21 CR—Change Restriction 3-22 C—Clock Set 3-24 D—Date Set 3-25 FH—Failure History 3-26 FC—Force Connect 3-29 FD—Force Disconnect 3-30 I—ID Set 3-31 LR—List Restrictions 3-32 LS—List Statistics 3-34
Remote Port Security Device
User’s Guide
Contents
555-024-402
L—List User Table 3-36 LH—Log History 3-40 Q—Quit 3-44 R—Remove User 3-45 RS—Reset Statistics 3-46 SC—Set Communicat ions Parameters 3-47 ST— Statu s Displa y 3-48 T—Test User 3-50 U—Unblock User 3-51 UR—User Restrictions 3-52 Help Screens 3-54
Issue 1
October 1996
Page v
4 Key Administration and Use 4-1
RPSD Key User Command Set 4-2
Initialization Functions 4-3
U—Set User ID 4-3 K—Set Secret Key 4-4 N—Set Device Number 4-5
Command Functions 4-6
A—Add Administrative User 4-7 AS—AUX Security 4-9 C—Clock Set 4-10 D—Date Set 4-11 H—History Display 4-12 I—Set Log ID 4-14 L—List User Information 4-15 LA—List Administrative Users 4-16 Q—Quit 4-17 R—Remove Administrative User 4-18 S—Status Display 4-19 SC—Set Communicat ions Parameters 4-20 W—Wipe Out 4-21 ?—Help 4-22
Authentication 4-23
Password Authentication 4-23 PassKey Authentication 4-24
Remote Port Security Device
User’s Guide
555-024-402
Contents
5 Troubleshooting 5-1
Access Failure Messages. 5-2
Testing the RPSD Lock 5-6
Built-in Diagnostics 5-6 Hardware Replacement 5-9
Replacing the RPSD Lock or Key 5-10
Saving the Key Seed Value 5-11
A Cabl es, Conn ector s , and Ports A-1 B Front Pa nel LEDs B-1
RPSD Lock B-2
RPSD Key B-3
Issue 1
October 1996
Page vi
Remote Port Security Device
User’s Guide
555-024-402
October 1996
The exclamation point in an equilateral triangle is intended to alert the user to the presence of important operating and maintenance (servicing) instructions in the literature accompanying the product.
When installing telephone equipment, always follow basic safety precautions to reduce the risk of fire, electrical shock, and injury to persons, including:
Read and understand all instructions.
Follow all warnings and instructions marked on or packed with the
product.
Never install this unit or telephone wiring for it during a lightning storm.
Issue 1
Page ix
Never install a telephone jack in a wet location unless the jack is
specifically designed for wet locations.
Never touch uninsulated telephone wires or terminals unless the
telephone wiring has been disconnected at the network interface.
Use caution when installing or modifying telephone lines.
Use only Lucent Technologies-manufactured circuit packs, carrier
assemblies, and power units in the control unit.
Use only Lucent Technologies-recommended/approved accesso ries.
Do not install this product near water, for example, in a wet basement
location.
Do not overload wall outlets, as this can result in the risk of fire or
electrical shock.
Do not attach the power supply cord to building surfaces. Do not allow
anything to rest on the power cord. Do not locate this product where the cord will be abused by per s on s wa lk ing on it.
Unplug the product from the wall outlet b efore cleaning. Use a damp cloth
for cleaning. Do not use cleaners or aerosol cleaners.
Do not operate the system if chemical gas leakage is suspected in the
area. Use telephones located in some other safe area to rep ort the trouble.
!
WARNING:
DO NOT open the RPSD Lock or Key devices. There are no user serviceable parts inside the units. Only an authorized technician should open a unit for required maintenance or upgrading purpo ses.
SAVE THESE INSTRUCTIONS
Remote Port Security Device
User’s Guide
555-024-402
Issue 1
October 1996
Page x
Remote Port Security Device
User’s Guide
Customer Suppor t Information
555-024-402
Customer Support Information
Support Telephone Number
In the USA only, Lucent Technologies provides a toll-tree customer Helpline, 1 800 242-2121, 24 hours a day. If you need assistance when ins t allin g,
programming, or using your system, call the Helpline, or your Lucent Technologies authorized representative.
Issue 1
October 1996
Page xiSupport Telephone Number
Outside the USA, if you need assistance when installing, programming, or using your system, contact your Lucent Technologies authorized representative.
Remote Port Security Device
User’s Guide
Customer Suppor t Information
555-024-402
Security of Your System: Preventing Toll Fraud
As a customer of a new communications device, you should be aware that there is an increasing problem of telephone toll fraud. Telephone toll fraud can occur in many forms, despite the numerous efforts of telephone companies and telephone equipment manufacturers to control it. Some individuals use electronic devices to prevent or falsify records of these calls. Others charge calls to
someone else’s number by illegall y usin g los t or stolen calling cards, billing innocent parties, clipping on to some one else’s line, or breaking into someone else’s telephone equipment phys ically or electronically. In certain instances, unauthorized individuals make connections to the telephone network through the use of remote access features.
Common carriers are required by law to collect their tariffed charges. While these charges are fraudulent charges made by persons with criminal intent, applicable tariffs state that the customer of record is responsible for payment of all long­distance or other network charges. Lucent Technologies cannot be responsible for such charges and will not make any allowance or give any credit for charges that result from unauthorized access.
Issue 1
October 1996
Page xiiSecurit y of Your System: Preventi ng Toll Fraud
To minimize the risk of unauthorized access to your communications system or device:
When possible, restrict the off-network capability of off- premises callers,
using calling restrictions, Facility Restriction Levels, and Disallowed List capabilities.
When possible, block out-of-hours calling.
Frequently monitor system call detail reports for quicker detection of any
unauthorized or abnorma l calling patterns .
Limit outcallin g to pe rson s on a need-to- have bas i s.
The communications system, through proper administration, can help you reduce the risk of unauthorized persons gaining access to the network. However , phone numbers and authorization codes can be compromised when overheard in a public location, lost through theft of a wallet or purse containing acc ess information, or when treated carelessly (writing codes on a piece of paper and improper ly discarding them).
Additionally, hackers may use a computer to dial an access code and then publish the information to other hackers. Substanti al charges can accu mulate quickly. It is your responsibility to take appropriate ste ps to im plement th e features properly, to evaluate and administer the various restriction levels, and to protect and carefully distribute access codes.
Under applicable tariffs, you will be responsible for payment of toll charges. Lucent Technologies cannot be responsible for such charges and will not make any allowance or give any credit resulting from unauthorized access.
Remote Port Security Device
User’s Guide
Customer Suppor t Information
555-024-402
Lucent Technologies Fraud Intervention
If you suspect you are being victimized by toll fraud and you need technical support or assistance, call the following:
For DEFINITY and Voice Mail products, call the Technical Service Center
(TSC) at 1 800 242-2121.
For system 25, MERLIN, and PARTNER products, call t he National S ervice
Assistance Center (NSAC) at 1 800 628-2888.
Guarantee
Lucent Technologies sells the Remote Port Security Device (RPSD) to provide an additional layer of security for the remote administration port on Lucent Technologies communications systems and other Lucent Technologies BCS products. Lucent Technologies offers the following guarantee for the RPSD on Lucent Technologies communications systems located within the United States.
Issue 1
October 1996
Page xiiiLucent Technologies Fraud Int ervention
RPSD Lock with no Keys
If the customer purchases an RPSD Lock with no Keys, Lucent Technologies will pay for unauthorized calls that occur as a result of access to the system via the remote administration port through the RPSD, provided the following conditions are met:
The RPSD was installed correctly on the remote administration port on the
Lucent Technologies communications system and conf igured at the time of the fraud incident to accept only Lucent Technologies Keys.
NOTE:
In this context, correct installation means that the RPSD Lock is installed consistent with installation instructions and in such a way as to deny access in case of power failure.
The customer provides RPSD documentat ion to Lucent Technologies
showing the time of access.
The customer pr ovi des th e communi cations system h istory l og informati on
to Lucent Technologies showing the changes made to the system to allow toll fraud at the time shown by the RPSD log.
The customer provides telephone records to Lucent Tech nolog ies that
indicate the fraud was accomplished via the change s made at that time.
The customer provides Lucent Technologies with access to all additional
information requested by Lucent Technologies regarding the fraud incident.
Remote Port Security Device
User’s Guide
Customer Suppor t Information
555-024-402
RPSD Lock with Keys
If the customer purchases RPSD Keys to access the systems protected by RPSD Locks, Lucent Technologies does not assume responsibility for the use of customer-purchased Keys. Accordingly, Lucent Technologies will pay for the unauthorized calls that occur as a result of access to such systems via the remote administration port through the RPSD provided the following conditions are met:
The RPSD Lock was installed correctly on the remote administration port
on the DEFINITY system at the time of the fraud incident.
NOTE:
In this context, correct installation means that the RPSD Lock is installed consistent with installation instructions and in such a way as to deny access in case of power failure.
Issue 1
October 1996
Page xivGuarantee
The customer provides RPSD documentat ion to Lucent Technologies
showing the time of access and
Lucent Technologies ID
The customer pr ovi des th e communi cations system h istory l og informati on
.
that the access was accomplished via a
to Lucent Technologies showing the changes made to the system to allow toll fraud at the time shown by the RPSD log.
The customer provides telephone records to Lucent Tech nolog ies that
indicate the fraud was accomplished via the change s made at that time.
The customer provides Lucent Technologies with access to all additional
information requested by Lucent Technologies regarding the fraud incident.
Remote Port Security Device
User’s Guide
Customer Suppor t Information
555-024-402
Whether or not the customer uses Keys, the customer agrees to promptly take all necessary steps to stop the toll fraud after becoming aware of it. Lucent
Technologies’ liability under this RPSD guarantee ceases two hours after the customer becomes aware of the toll fraud incident. In no event shall Lucent Technologies’ responsibility exceed the amount of the customer’s payment to the network provider for the unauthorized calls. Lucent T echnologies’ liability is limited to the unauthorized calls and does not include consequential d ama ges such as lost profits due to phone lines being unavailable.
Limited Warranty
Lucent Technologies, Inc. warrants this equipment to be free of defects in materials and workmanship for a period of one year from date of shipment. All defects within this time will be repaired without charge upon return of the unit to the factory.
Issue 1
October 1996
Page xvLimited Warranty
This warranty is null and void if the manufacturer determines that any modifications have been made to the unit or the unit has been subjected to physical or electrical stress.
This warranty covers parts and labor only and does not include shipping costs, travel expenses, or travel time.
Installation of the equipm ent is the sole responsib ilit y of the purchaser. The manufacturer, its agents, or its distributors accept no responsibility for malfunction or damage caused by improper treatment or connection of the unit.
The manufacturer, its agents, or its distributors are not liable for any losses incurred through use or malfunction of the equipment or any losses or damages incurred by the use of the equipment in any means whatsoever.
This warranty is limited to the repair of the equipment to its normal functioning capability .
This warranty is complete as stated and all other warranties, expressed or implied, are invalid. The Remote Port Security Device should be installed only by qualified personnel. No user-serviceable parts are contained within the units. Installation or programming should not begin prior to review of all sections of this manual.
Remote Port Security Device
User’s Guide
Customer Suppor t Information
555-024-402
FCC Notification and Repair Information
This equipment is registered with the FCC in accordance with Part 68 of its rules. In compliance with those rules, you are advised of the following:
Means of Connection. Connection of this equipment to the telephone
network shall be through a standard network interface jack, USOC RJ11C. These USOCs must be ordered from your telephone company.
Party Lines and Coin Telephones. This equipment can not be used with
party lines or coin telephone lines.
Notification to the Tel epho ne Comp anie s. Before connecting this
equipment, you or your equipment supplier must notify your local
telephone company’s business office of the following:
Issue 1
October 1996
Page xviFCC Notification and Repair Inform ati on
— The telephone number(s) you will be using with this equipment. — The appropriate registration number and ringer equivalence
number (REN), which can be found on the back or bottom of the control unit.
— For each jack, the sequence in which lines are to be connected, the
line types, the Facility Interface Code (FIC), and the Ringer Equivalence Number (REN) by position when applicable.
Ringer Equivalence Number (REN). The REN is used to determine the
number of devices that can be connected to the telephone line. Excessive RENs on the line can result in the devices not ringing in response to an incoming call. In most, but not all, areas the sum of the RENs should not exceed five (5.0). To be cert ain of the number of devices that can be connected to the line, as determined by the total RENs, contact the local telephone company to determine the maximum REN for the calling area.
Disconnection. You must also notify your local telephone company if and
when this equipment is permanent ly discon nect ed from the line(s).
Remote Port Security Device
User’s Guide
Customer Suppor t Information
555-024-402
Installatio n a nd Operational Procedures
This manual contains information ab out installation and opera tional procedures.
Repair Instructions. If you experience trouble because your equipment is
malfunctioning, the FCC requires that the equipment not be used and that it be disconnected from the network until the problem has been corrected. Repairs to this equipment can be made only by the manufacturers, their authorized agents, or others who may be authorized by the FCC. In the event repairs are needed on this equipment, contact your authorized Lucent Technologies dealer or, in the USA only, contact the National Service Assistance Center (NSAC) at 1 800 242-2121.
Rights of the Local Telephone Company. If this equipment causes harm to
the telephone network, the local telephone company may discontinue your service temporarily . If possible, they will notify you in advance. But if advance notice is not practical, you will be notified as soon as poss ibl e. You will also be in f ormed of y our ri ght to fi le a co mplaint wit h the FC C .
Issue 1
October 1996
Page xviiInstallation and Operational Procedures
Changes at Local Telephone Company. Your local telephone company
may make changes in its facilities, equipment, operations, or procedures that affect the proper functioning of this equipment. If they do, you will be notified in advance to give you an opportunity to maintain uninterrupted telephone service.
New Network Area and Exchange Codes. The communications system
software does not restrict access to any new area codes or exchange codes established by a local telephone comp any. If the user has established toll restrictions on the system that could restrict access, then the user should check the lists of allowed and disallowed dial codes and modify them as needed.
Equal Access Codes. This equipment is capable of providing users
access to interstate providers of operator services through the use of access codes. Modifications of this equipment by call aggregators to block access dialing codes is a violation of the Telephone Operator Consumers Act of 1990.
Remote Port Security Device
User’s Guide
Customer Suppor t Information
555-024-402
Federal Communication Commission (FCC) Electromagn eti c Inter feren ce Information
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipmen t is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications .
Issue 1
October 1996
Page xviiiFederal Communication Co mmission (FCC) Electromagnetic Interference Information
Remote Port Security Device
User’s Guide
About This Book
555-024-402
About This Book
Intended Audiences
This document is intended for the following audience:
Issue 1
October 1996
Page xixIntended Audiences
Lucent Technologies technicians
RPSD system administrato rs
RPSD Key users
Lucent Technologies technicians are the personnel from Lucent Tec hnolog ies who install the Remote Port Security Device (RPSD) Lock at the customer premises. It is assumed that Lucent Te chnolo gies te chnicians are familiar with the technical language used to describe the hardware components, cables, connectors, and ports involved in the installation of the RPSD Lock. It is further assumed that they will have the tools and equipment necessary for installation.
RPSD system administrators are the customer personnel who administer and maintain the RPSD Lock. It is assumed that RPSD system adm inistrators are familiar with menu-driven telecommunications hardware components. It is also assumed that they understand the need for maintaining security in administering the communications system.
RPSD Key users are those who dial in to a channel locked with a Lock by using a Key. It is assumed that Key users are familiar with placing calls via a modem, either from a telephone, terminal, or PC.
Responsibilities
Lucent Technologies technicians are responsible for installing the RPSD Lock, testing it upon installation, and making certain that a working product has been installed. Lucent Technologies technicians also perform any replacement of the Lock should it become necessary. Lucent T echnologies technicians are not responsible for the initialization of the Lock. The Lock is initialized prior to delivery, and the Key devices that are used by Lucent Technologies are already installed and initia liz e d.
Remote Port Security Device
User’s Guide
About This Book
555-024-402
RPSD Keys purchased by the customer can be installed by Lucent Technologies
technicians at the customer’s request or installed by the customers. The troubleshooting material in this document may be used by the technician at
the time of installation, but it is written primarily for the customer. Failure of any Lock or Key is always resolved by replacement of the failed device.
The Lock commands and administration material is written for RPSD system administrators. The material on Key commands and use is written for Key users.
Supplying equipment peripheral to the Lock, such as term inals, mod em s, printers , etc., is the cust omer’s respons ibility. If any mat e ria l is req uired in addition t o the m a terial shipp ed in the RPSD pack age, it is billab le to the customer.
Issue 1
October 1996
Page xxTerms and Conventions
Terms and Conven ti ons
The Remote Port Security Device (RPSD) Lock is often referred to as the Lock. Similarly the RPSD Key is often referred to as the Key.
Throughout this document, toll fraud security hazards are indicated by an exclamation point inside a triangle and the words Security Alert.
!
Security Alert:
Security Alert indicates the presence of a toll fraud security hazard. Toll fraud is the unauthorized use of your telecommunications system by an
unauthorized party (for example, persons other than your company’s employees, agents, subcontractors, or persons working on your company’s behalf). Be sure to read “Your Responsibility for Your System’s Security” on the inside front cover of this book and “Security of Your System: Preventing Toll Fraud” in “About This Book.”
Remote Port Security Device
User’s Guide
About This Book
555-024-402
Typogra phi c al Conventions
Throughout this manual RPSD system responses are shown in italic, sans serif type. For example:
Call authentication completed
Data that you enter is shown in bold sans serif type. For example:
Issue 1
October 1996
Page xxiTypographi cal Conventions
Block user
ENTER
The button at the end of the line tells you to press the Enter or Return key
ENTER
to complete the command.
NOTE:
In this document, a remote caller’ s computer terminal or personal computer is referred to as the user’s terminal. The local terminal conn ected to the RPSD Lock is referred to as the system administrator’s terminal or administration terminal.
How to Use This Book
This is organized into chapters that give information on procedures necessary for the proper installation and administration of your Remote Port Security Device.
“Related Documents,” later in this section, provides a complete list of system documentation, together with ordering information.
If you have problems with your RPSD system, contact your system administrator. If the problem cannot be solved by the system administrator, in the continental U.S. your system wi ll c a ll o u r to l l-free Helpline , ava i lab le 2 4 h ours a day, at 1 800 242-2121. Outside of the continental U.S., contact your Lucent Technologies representative or local authorized dealer .
Remote Port Security Device
User’s Guide
About This Book
555-024-402
Product Safety Labels
Throughout these documents, hazardous situations are indicated by an exclamation point inside a triangle and the word
!
WARNING:
Warning indicates the presence of a hazard that could cause death or severe personal injury if the hazard is not avoided.
!
CAUTION:
Caution indicates the presence of a hazard that could cause minor personal injury or property damage if the hazard is not avoided.
caution
or
warning
Issue 1
October 1996
Page xxiiProdu ct Saf ety Labels
.
Related Documents
In addition to this book, the document listed below is part of the documentation set. Within the continental United States, order this document from the BCS Publications Fulf illm ent Cente r by call ing 1 800 457-1235.
Document No. Title
555-025-6000
GBCS Products Security Handbook
How to Comment on This Document
We welcome your comments, both positive and negative. Please use the feedback form on the next page to let us know how we can continue to serve you. If the feedback form is missing, write directly to:
Documentation Manag er Lucent Technologies, Inc. 211 Mount Airy Road Room 2W-226 Basking Ridge, NJ 07920-2332
Remote Port Security Device
User’s Guide
555-024-402
About This Book
FEEDBACK FORM
Remote Port Security Device
Title: Remote Port Security Device User’s Guide Order No.: 555-024-402 Date: October 1996
1. Please rate the effe ctiveness of this book in the following areas:
Excellent Good Fair Poor Not
Ease of Use Clarity Completeness Accuracy Organization Appearance Examples Illustrations Overall Satisfaction
Issue 1
October 1996
Page xxiiiHow to Comment on This Document
Applicable
2. Please check ways you feel we could improve this book:
o
Impro v e the overview
o
Improve the table of contents
o
Improve the organization
o
Include more illustrations
o
Other_______________ ___________________________ __________________________________ _________ _________________________ __________________________________________________________________ _________________________ __________________________________________________________________
3. What di d you like most about this book? _________________________ _________________________________ _________________________________
_________________________ _________________________________ _________________________________
4. Feel f ree to write any comments below or on an attached sheet. _________________________ _________________________________ _________________________________
_________________________ _________________________________ _________________________________ _________________________ _________________________________ _________________________________ _________________________ _________________________________ _________________________________
If we may contact you about yo ur comments, please complete the following: Name: _________________________ _________________ ________Telephone Number: ___________ _______ Company/Organization: ____________ ___ _____________ ________Date: ________________ ______________ Address: ____________________________________________________________________________________
o
Add more examples
o
Add more detail
o
Make it more concise
o
Add more step-by-
step procedures
o
Add troubleshooting information
o
Make it less technical
o
Add more/better quick reference
aids
o
Impro v e the index/glos sary
Send completed forms to: Documentation Manager, Lucent Technologies, 211 Mount Airy Road, Room 2W226, Basking Ridge, NJ 07920. Fax: ( 908) 953-6912.
THIS FORM MAY BE PHOTOCOPIED
Remote Port Security Device
User’s Guide
555-024-402
About This Book
Issue 1
October 1996
Page xxivHow to Comment on This Document
Remote Port Security Device
User’s Guide
Introduction
1
1
Introduction
555-024-402
Issue 1
October 1996
Page 1-1
1
The Remote Port Security Device (RPSD) is a single-line dial-up port protection system that prevents unauthorized access to a host resource. Host resource dial-up ports are protected by installing the RPSD Lock on the analog telephone line leading to the port. Access is provided only when the calling party uses the RPSD Key, a unit installed on the analog telephone line at the calling party end.
Remote Port Security Device
User’s Guide
Introduction
1
555-024-402
RPSD Syst e m
The RPSD system provides security and control for virtually any type of dial-up port on any host resource, regardless of the type of modem associated with the
host’ s dial-up ports. This document specifically targets Lucent T echnologies Business Communications Systems customers and users of the communications systems listed belo w and supporting periph er al pr o ducts; therefore, most references in this document are specific to Business Communications Systems. However, other applications of the RPSD system are possible.
Lucent Technologies supports RPSD use on the following types of communications syst e ms:
System 75 (R1V2, R1V3)
System 85 (R1V1, R1V2, R2V1, R2V2, R2V3, R2V4)
Issue 1
October 1996
Page 1-2RPSD System
DEFINITY® Enterprise Communications Server (ECS) (all models)
DIMENSION
Other communications systems with dial-up ports
All voice-mail systems
Any product that supports analog tip-and-ring capability.
With the RPSD Lock and Key system you can set the time of day that access to a port is permitted, or you can block any or all access to the line by users of RPSD Keys. In addition, a system activity log provides a real-time record of access attempts and their outcomes. Session sum maries track statistics on all successful and failed attempts, providing convenient MIS data resources.
As shown in Fi gure 1-1
, the RPSD Lock is approximately the size of a modem and is connected between the communi cations syst em modem and the cent ral office line. The RPSD Key is of similar size and is connected between the caller’s modem and central office line.
NOTE:
In Figure 1-1, the term “Lucent Technologies Remote Operations” refers to Technical Services Center remote administration and maintenance operations, Bell Labs Field Support, and other entities.
Remote Port Security Device
User’s Guide
Introduction
1
Communications
System
Customer Remote
Administration
Terminals, Lucent
Technologies
Remote Operations,
System Management
Applications, etc.
555-024-402
Modem
Modem
POWER RINGINRING
POWER RING
OUT
IN
Administration
Terminal or
Printer
DEFINITY RPSD
CALL
LOCKED VERIFY CONNECTED
OUT
Administration
Terminal
DEFINITY RPSD
CALL
IDLE VERIFY CONNECTED
OUT
Issue 1
October 1996
Page 1-3RPSD System
LOCK
Public
Telephone
Network
KEY
Figure 1-1 . RPSD Loc k a nd Key Confi gu r at ion
The system administrator administers the RPSD Lock via a direct connection from an administration terminal to the Lock. The administration interface is menu driven.
The RPSD system protects a por t in the following manner: a call into the channel to the protected host activates the RPSD Lock. Without involving the protected
host resource or its associated modem, the RPSD Lock verifies the caller’s identity by using dual-tone, multifrequency (DTMF) signaling with the RPSD Key . This process is as follows (see Figure 1-1
1. The Lock, installed on tip and ring on the network side of any modem or protected host resource, answers the incoming call.
2. The Lock sends the caller a poll ing t one. If the callin g party has an RPSD Key, the Ke y responds wit h its U ser ID. If there is no K ey on th e c alling end, the Lock terminates the call.
3. The Lock must recognize the Key’s User ID (the Lock must be previously initialized with all valid Keys); if not, the Lock terminates the call.
4. Using an algorithm governed by ANSI/DES standards, the Lock generates a random 10-digit value (known as the “dynamic challenge,” for which there are 10 billion possible values). Using a secret encryption key unique to the calling RPSD Key’s User ID, the Lock encrypts the value.
).
Remote Port Security Device
User’s Guide
Introduction
1
555-024-402
5. The Lock stores this encrypted “expected value” and sends the dynamic challenge to the Key.
6. When the Key receives the challenge from the Lock, it uses the secret encryption key unqiue to the user ID assigned to the Key and encrypts the value the Lock sent. Following this, the Key calculates the necessary response. The Key transmits this “expected value” to the Lock.
7. The Lock compares the Key’s response to the expected value it calculated and stored. If the Lock receives the precise value it expects, it generates ringing and sends the call on to the protected resource.
The entire sequence occurs in fewer than 20 seconds.
Issue 1
October 1996
Page 1-4RPSD System
Remote Port Security Device
User’s Guide
Introduction
1
555-024-402
Hardwa re Compon e nts
To install a complete RPSD system, you need a Lock and a Key. A communications system and modem are assumed to be at the customer site already.
NOTE:
Although a printer is not essential to system operation, you should consider dedicating a serial printer to the RPSD Lock. (The printer should be set to 9600 kbps, N, 8, 1.) The System Activity Log can store up to 1400 messages, but the only means of retaining a more permanent record of system activi ty is eit her to i nstal l a dedic ated printer for the RPS D Lock or to save all messages from the Lock to disk.
The Lucent Technologies personnel who require access to the communications system already have the Keys they need. Any additional RPSD Keys f or customer use mu st be orde red s eparately.
Issue 1
October 1996
Page 1-5Hardware Componen ts
The hardware components (both supplied and otherwise) and their requirements are described in the following sections.
RPSD Lock
When you order the RPSD Lock, you receive:
If any other cables or connectors are required, they must be ordered separately. In addition, any peripheral devices, such as the administration terminal or printer, are customer supplied. Install the RPSD Lock between the maintenance and administration channel and the commu nications s ystem modem.
The Lock
Power s upply
7-foot line cord with RJ11 modular connectors on each end
14-foot line cord with RJ11 modular connectors on each end
DB9 (male) to DB25 (female) cable
Remote Port Security Device
User’s Guide
Introduction
1
555-024-402
The RPSD Lock is 5.75 inches wide by 9.5 inches long by 1.75 inches high. It has seven LEDs on the front panel and four ports on the back panel (see Figure 1-2).
For a detailed description of the front panel LEDs, see Appendix B, “Front Panel LEDs.” The back panel ports are:
RJ11 port for the modem connection, labeled SUBSCRIBER
RJ11 port for the central office line, labeled TELCO
Female DB9 port for the terminal or printer (or a modem), labeled AUX.
PORT
Alarm leads to connect an external alarm
Port for the power supply (supplied with the RPSD Lock)
Issue 1
October 1996
Page 1-6Hardware Componen ts
POWER RINGINRING
SUBSCRIBER
(MODEM) TELCO
Figure 1-2. RPSD Lock
DEFINITY RPSD
CALL
OUT
LOCKED VERIFY CONNECTED
OUT
Front
RED
GREEN BYPASS
POWER MONITOR
SECURE
Back
AUX. PORT
LOCK
ALARM LEADS
!
+
12VDC
1A
Power M on ito r Fu nctio n
The Power Monitor function allows you to control the behavior of the RPSD during power failure conditions. The POWER MONITOR button on the back of the Lock enables or disables this function.
Remote Port Security Device
User’s Guide
Introduction
1
555-024-402
In the event of a unit failure or a power failure, the RPSD blocks incoming and outgoing calls to the port, protecting the port against unauthorized access. This call blocking also prevents the communications system or other protected resources from originating an alarm and blocks dial-up access to the port.
However , you can push in the POWER MONITOR button on the back of the Lock to enable the Power Monitor function. The green LED lights to indicate that the Power Monitor function is enabled. When this function is enabled, the TELCO and SUBSCRIBER ports are connected during a power failure, thereby bypassing the Lock security. This bypassing permits incoming call s to the communication s system or other host resource.
!
Security Alert:
When the POWER MONITOR button is IN during a unit or power failure, the security of the RPSD Lock is bypassed. Leave the button in the OUT position for security reasons.
Issue 1
October 1996
Page 1-7Hardware Componen ts
External Alarm
You can connect alarm leads to the screw terminals on the back of the Lock. When a Lock failure occurs, contacts inside the Lock close and send a signal out the alarm terminals to the communications system or other external alarm.
You can also use the Power Monitor function to generate a signal failure through the alarm leads without bypassing the RPSD and compromising security. This is called an
RPSD Key
The RPSD Key is similar to the RPSD Lock in size and appearance. When you order the RPSD Key, you receive:
The Key
Power s upply
7-foot line cord with RJ11 modular connectors on each end
14-foot line cord with RJ11 modular connectors on each end
Alarm Only
installation.
DB9 (male) to DB25 (female) cable
Like the RPSD Lock, the RPSD Key has LEDs on the front panel and ports on the back panel. For a detailed description of the front panel LEDs, see Appendix B,
“Front Panel LEDs.” The back panel ports are (see Figure 1-4):
RJ11 port for the central office line, labeled TELCO
RJ11 port for the modem connection, labeled SUBSCRIBER
Female DB9 port for the terminal or printer , labeled AUX. PORT
Port fo r the powe r supply (supplied with the RPSD Key) .
Remote Port Security Device
User’s Guide
Introduction
1
555-024-402
Install the RPSD Key between the Key user’s central office line and modem.
Issue 1
October 1996
Page 1-8Hardware Componen ts
KEY
DEFINITY RPSD
Modems
POWER RING
IN
CALL
IDLE VERIFY CONNECTED
OUT
Front
SUBSCRIBER
(MODEM) TELCO
AUX. PORT
!
+
12VDC
1A
Back
Figure 1-3. RPSD Key
The RPSD Lock works with any modem that can be used with the communications system. Similarly, the RPSD Key works with any modem that can be used with a terminal.
NOTE:
Version 3 of the RPSD Lock and Key works with low- and high-speed modems up to 28.8 kbps. Versions 1 and 2 work only with low-speed modems up to 9.6 kbps.
Loading...
+ 126 hidden pages