555-024-402
Comcode 107748717
Issue 1
October 1996
Copyright 1996, L ucent TechnologiesLucent Technol ogies 555-024-402
All Rights ReservedIssue 1
Printed in U.S.A.October 1996
Notice
Every effort was made to ensure that the information in this book was complete and accurate at the time of printing.
However, information is subject to change.
Your Responsibility for Your System’s Sec u rity
Toll fraud is the unauthor ized use of your telec ommunications system by an unauthor ized party, for example, persons
other than your company’s employees , agents, subcontract ors, or persons worki ng on your company’s beh alf. Note
that there may be a risk of toll fr aud associated with your telecommunications system, and if toll fraud occur s, it can
result in subst antial additional charges for your telecommunications services.
You and your sys tem ma nager ar e respo nsi ble f or th e se curit y of y our sy ste m, s uch as pr ogram ming and conf iguri ng
your equipment to prevent unauthorized use. The system manager is also responsible for reading all installation, instruction, and system administration documents provided with this product in order to fully understand the features
that can introduc e risk of toll frau d and the steps t hat can be take n to reduce th at ris k. Lucent Technologi es does not
warrant that this product is immune from or will prevent unauthorized use of common-carrier telecommuni cation services or facilities accessed through or connected to it. Lucent Technologies will not be responsible for any charges
that result from such unauthorized use.
Federal Communication Commission (FCC) Statement
This equipment has been tested and found to comply wit h the limits for a Class A digital device, pursuant to Par t 15
of the FCC Rules. These limits are designed to provide reasonabl e protection against harmful interf erence when the
equipment is opera ted in a commer cial environ ment. This equ ipment gene rates, uses , and can radiate r adio freque ncy energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference
to radio communications. However, there is no guarantee that interference will not occur in a particular installation.
For further FCC informat ion, see “Customer Support Information” below.
Trademarks
DEFINITY, UNIX, AUDIX, DIMENSION, M ERLIN, and PA RTNER are register ed trademarks of Lucent Technologies in
the US and other countries.
For more information about Lucent Technologies documents, refer to the section entitled “Related Documents” in
“About This Book.”
Support Telephon e Number
In the continental US, Lucent Technologies provides a toll-free customer helpline 24 hours a day. Call the Lucent
Technologie s Helpline at 1 800 242-2121 or your Lu cent Technolo gies author ized dealer i f you need ass istance when
installing, programming, or using your system. Outside the continental US, contact your local Lucent Technologies
representative.
Lucent Technologies Fraud Interventi o n
If you
suspect you ar e being victimi zed
nical Service Cent er at 1 800 643-2353 or 1 800 242-2121.
Warranty
Lucent Technologies provides a limited warranty on this product. Refer to “Limited Warranty” in “Customer Support
Information.”
by toll fr aud and you need techn ical support or assist ance, call the BCS Tec h-
Remote Port Security Device
User’s Guide
555-024-402
Contents
Contents
Contents iii
Customer Support Information xi
■ Support Telephone Numberxi
■ Security of Your System: Preventing Toll Fraudxii
System Activity Log1-12
Single Point Administration1-14
Block Lucent Technologies and Other Key Users1-15
Force Connect/Disconnect1-15
Authorized Keys1-16
2 Installation 2-1
■ Room Layout/Environment2-2
Power Supply2-2
Location of Administration Terminal or Printer2-3
■ Installation2-4
Cables, Connectors, and Ports2-5
Issue 1
October 1996
Page iv
Insta lling the RPSD L oc k2-5
Insta lling the RPSD K e y2-16
Testing an Uninitialized Key2-18
Initializing the RPSD Lock2-18
Initializing the RPSD Key2-19
■ Testing the RPSD Lock Installation2-20
3 RPSD System Admini s t rat ion 3-1
■ Menu of Commands3-2
■ Command Functions3-5
A—Add User3-6
AH—Access History3-11
AA—Administra ti ve Acce ss His to ry3-14
AF—A dministra ti ve Fa ilur e H is t o ry3-17
AS—AUX Security3-19
B—Block User3-21
CR—Change Restriction3-22
C—Clock Set3-24
D—Date Set3-25
FH—Failure History3-26
FC—Force Connect3-29
FD—Force Disconnect3-30
I—ID Set3-31
LR—List Restrictions3-32
LS—List Statistics3-34
Remote Port Security Device
User’s Guide
Contents
555-024-402
L—List User Table3-36
LH—Log History3-40
Q—Quit3-44
R—Remove User3-45
RS—Reset Statistics3-46
SC—Set Communicat ions Parameters3-47
ST— Statu s Displa y3-48
T—Test User3-50
U—Unblock User3-51
UR—User Restrictions3-52
Help Screens3-54
Issue 1
October 1996
Page v
4 Key Administration and Use 4-1
■ RPSD Key User Command Set4-2
■ Initialization Functions4-3
U—Set User ID4-3
K—Set Secret Key4-4
N—Set Device Number4-5
A Cabl es, Conn ector s , and Ports A-1
B Front Pa nel LEDs B-1
■ RPSD LockB-2
■ RPSD KeyB-3
Issue 1
October 1996
Page vi
Remote Port Security Device
User’s Guide
555-024-402
October 1996
The exclamation point in an equilateral triangle is
intended to alert the user to the presence of important
operating and maintenance (servicing) instructions in
the literature accompanying the product.
When installing telephone equipment, always follow basic safety precautions to reduce
the risk of fire, electrical shock, and injury to persons, including:
■Read and understand all instructions.
■Follow all warnings and instructions marked on or packed with the
product.
■Never install this unit or telephone wiring for it during a lightning storm.
Issue 1
Page ix
■Never install a telephone jack in a wet location unless the jack is
specifically designed for wet locations.
■Never touch uninsulated telephone wires or terminals unless the
telephone wiring has been disconnected at the network interface.
■Use caution when installing or modifying telephone lines.
■Use only Lucent Technologies-manufactured circuit packs, carrier
assemblies, and power units in the control unit.
■Use only Lucent Technologies-recommended/approved accesso ries.
■Do not install this product near water, for example, in a wet basement
location.
■Do not overload wall outlets, as this can result in the risk of fire or
electrical shock.
■Do not attach the power supply cord to building surfaces. Do not allow
anything to rest on the power cord. Do not locate this product where the
cord will be abused by per s on s wa lk ing on it.
■Unplug the product from the wall outlet b efore cleaning. Use a damp cloth
for cleaning. Do not use cleaners or aerosol cleaners.
■Do not operate the system if chemical gas leakage is suspected in the
area. Use telephones located in some other safe area to rep ort the trouble.
!
WARNING:
DO NOT open the RPSD Lock or Key devices. There are no user
serviceable parts inside the units. Only an authorized technician should
open a unit for required maintenance or upgrading purpo ses.
SAVE THESE INSTRUCTIONS
Remote Port Security Device
User’s Guide
555-024-402
Issue 1
October 1996
Page x
Remote Port Security Device
User’s Guide
Customer Suppor t Information
555-024-402
Customer Support Information
Support Telephone Number
In the USA only, Lucent Technologies provides a toll-tree customer Helpline,
1 800 242-2121, 24 hours a day. If you need assistance when ins t allin g,
programming, or using your system, call the Helpline, or your Lucent
Technologies authorized representative.
Issue 1
October 1996
Page xiSupport Telephone Number
Outside the USA, if you need assistance when installing, programming, or using
your system, contact your Lucent Technologies authorized representative.
Remote Port Security Device
User’s Guide
Customer Suppor t Information
555-024-402
Security of Your System: Preventing
Toll Fraud
As a customer of a new communications device, you should be aware that there
is an increasing problem of telephone toll fraud. Telephone toll fraud can occur in
many forms, despite the numerous efforts of telephone companies and
telephone equipment manufacturers to control it. Some individuals use electronic
devices to prevent or falsify records of these calls. Others charge calls to
someone else’s number by illegall y usin g los t or stolen calling cards, billing
innocent parties, clipping on to some one else’s line, or breaking into someone
else’s telephone equipment phys ically or electronically. In certain instances,
unauthorized individuals make connections to the telephone network through the
use of remote access features.
Common carriers are required by law to collect their tariffed charges. While these
charges are fraudulent charges made by persons with criminal intent, applicable
tariffs state that the customer of record is responsible for payment of all longdistance or other network charges. Lucent Technologies cannot be responsible
for such charges and will not make any allowance or give any credit for charges
that result from unauthorized access.
Issue 1
October 1996
Page xiiSecurit y of Your System: Preventi ng Toll Fraud
To minimize the risk of unauthorized access to your communications system or
device:
■When possible, restrict the off-network capability of off- premises callers,
using calling restrictions, Facility Restriction Levels, and Disallowed List
capabilities.
■When possible, block out-of-hours calling.
■Frequently monitor system call detail reports for quicker detection of any
unauthorized or abnorma l calling patterns .
■Limit outcallin g to pe rson s on a need-to- have bas i s.
The communications system, through proper administration, can help you
reduce the risk of unauthorized persons gaining access to the network. However ,
phone numbers and authorization codes can be compromised when overheard
in a public location, lost through theft of a wallet or purse containing acc ess
information, or when treated carelessly (writing codes on a piece of paper and
improper ly discarding them).
Additionally, hackers may use a computer to dial an access code and then
publish the information to other hackers. Substanti al charges can accu mulate
quickly. It is your responsibility to take appropriate ste ps to im plement th e
features properly, to evaluate and administer the various restriction levels, and to
protect and carefully distribute access codes.
Under applicable tariffs, you will be responsible for payment of toll charges.
Lucent Technologies cannot be responsible for such charges and will not make
any allowance or give any credit resulting from unauthorized access.
Remote Port Security Device
User’s Guide
Customer Suppor t Information
555-024-402
Lucent Technologies Fraud
Intervention
If you suspect you are being victimized by toll fraud and you need technical
support or assistance, call the following:
■For DEFINITY and Voice Mail products, call the Technical Service Center
(TSC) at 1 800 242-2121.
■For system 25, MERLIN, and PARTNER products, call t he National S ervice
Assistance Center (NSAC) at 1 800 628-2888.
Guarantee
Lucent Technologies sells the Remote Port Security Device (RPSD) to provide an
additional layer of security for the remote administration port on Lucent
Technologies communications systems and other Lucent Technologies BCS
products. Lucent Technologies offers the following guarantee for the RPSD on
Lucent Technologies communications systems located within the United States.
Issue 1
October 1996
Page xiiiLucent Technologies Fraud Int ervention
RPSD Lock with no Keys
If the customer purchases an RPSD Lock with no Keys, Lucent Technologies will
pay for unauthorized calls that occur as a result of access to the system via the
remote administration port through the RPSD, provided the following conditions
are met:
■The RPSD was installed correctly on the remote administration port on the
Lucent Technologies communications system and conf igured at the time
of the fraud incident to accept only Lucent Technologies Keys.
NOTE:
In this context, correct installation means that the RPSD Lock is
installed consistent with installation instructions and in such a way as
to deny access in case of power failure.
■The customer provides RPSD documentat ion to Lucent Technologies
showing the time of access.
■The customer pr ovi des th e communi cations system h istory l og informati on
to Lucent Technologies showing the changes made to the system to allow
toll fraud at the time shown by the RPSD log.
■The customer provides telephone records to Lucent Tech nolog ies that
indicate the fraud was accomplished via the change s made at that time.
■The customer provides Lucent Technologies with access to all additional
information requested by Lucent Technologies regarding the fraud
incident.
Remote Port Security Device
User’s Guide
Customer Suppor t Information
555-024-402
RPSD Lock with Keys
If the customer purchases RPSD Keys to access the systems protected by RPSD
Locks, Lucent Technologies does not assume responsibility for the use of
customer-purchased Keys. Accordingly, Lucent Technologies will pay for the
unauthorized calls that occur as a result of access to such systems via the
remote administration port through the RPSD provided the following conditions
are met:
■The RPSD Lock was installed correctly on the remote administration port
on the DEFINITY system at the time of the fraud incident.
NOTE:
In this context, correct installation means that the RPSD Lock is
installed consistent with installation instructions and in such a way as
to deny access in case of power failure.
Issue 1
October 1996
Page xivGuarantee
■The customer provides RPSD documentat ion to Lucent Technologies
showing the time of access and
Lucent Technologies ID
■The customer pr ovi des th e communi cations system h istory l og informati on
.
that the access was accomplished via a
to Lucent Technologies showing the changes made to the system to allow
toll fraud at the time shown by the RPSD log.
■The customer provides telephone records to Lucent Tech nolog ies that
indicate the fraud was accomplished via the change s made at that time.
■The customer provides Lucent Technologies with access to all additional
information requested by Lucent Technologies regarding the fraud
incident.
Remote Port Security Device
User’s Guide
Customer Suppor t Information
555-024-402
Whether or not the customer uses Keys, the customer agrees to promptly take all
necessary steps to stop the toll fraud after becoming aware of it. Lucent
Technologies’ liability under this RPSD guarantee ceases two hours after the
customer becomes aware of the toll fraud incident. In no event shall Lucent
Technologies’ responsibility exceed the amount of the customer’s payment to the
network provider for the unauthorized calls. Lucent T echnologies’ liability is
limited to the unauthorized calls and does not include consequential d ama ges
such as lost profits due to phone lines being unavailable.
Limited Warranty
Lucent Technologies, Inc. warrants this equipment to be free of defects in
materials and workmanship for a period of one year from date of shipment. All
defects within this time will be repaired without charge upon return of the unit to
the factory.
Issue 1
October 1996
Page xvLimited Warranty
This warranty is null and void if the manufacturer determines that any
modifications have been made to the unit or the unit has been subjected to
physical or electrical stress.
This warranty covers parts and labor only and does not include shipping costs,
travel expenses, or travel time.
Installation of the equipm ent is the sole responsib ilit y of the purchaser. The
manufacturer, its agents, or its distributors accept no responsibility for
malfunction or damage caused by improper treatment or connection of the unit.
The manufacturer, its agents, or its distributors are not liable for any losses
incurred through use or malfunction of the equipment or any losses or damages
incurred by the use of the equipment in any means whatsoever.
This warranty is limited to the repair of the equipment to its normal functioning
capability .
This warranty is complete as stated and all other warranties, expressed or
implied, are invalid. The Remote Port Security Device should be installed only by
qualified personnel. No user-serviceable parts are contained within the units.
Installation or programming should not begin prior to review of all sections of this
manual.
Remote Port Security Device
User’s Guide
Customer Suppor t Information
555-024-402
FCC Notification and Repair
Information
This equipment is registered with the FCC in accordance with Part 68 of its rules.
In compliance with those rules, you are advised of the following:
■Means of Connection. Connection of this equipment to the telephone
network shall be through a standard network interface jack, USOC RJ11C.
These USOCs must be ordered from your telephone company.
■Party Lines and Coin Telephones. This equipment can not be used with
party lines or coin telephone lines.
■Notification to the Tel epho ne Comp anie s. Before connecting this
equipment, you or your equipment supplier must notify your local
telephone company’s business office of the following:
Issue 1
October 1996
Page xviFCC Notification and Repair Inform ati on
— The telephone number(s) you will be using with this equipment.
— The appropriate registration number and ringer equivalence
number (REN), which can be found on the back or bottom of the
control unit.
— For each jack, the sequence in which lines are to be connected, the
line types, the Facility Interface Code (FIC), and the Ringer
Equivalence Number (REN) by position when applicable.
■Ringer Equivalence Number (REN). The REN is used to determine the
number of devices that can be connected to the telephone line. Excessive
RENs on the line can result in the devices not ringing in response to an
incoming call. In most, but not all, areas the sum of the RENs should not
exceed five (5.0). To be cert ain of the number of devices that can be
connected to the line, as determined by the total RENs, contact the local
telephone company to determine the maximum REN for the calling area.
■Disconnection. You must also notify your local telephone company if and
when this equipment is permanent ly discon nect ed from the line(s).
Remote Port Security Device
User’s Guide
Customer Suppor t Information
555-024-402
Installatio n a nd Operational
Procedures
This manual contains information ab out installation and opera tional procedures.
■Repair Instructions. If you experience trouble because your equipment is
malfunctioning, the FCC requires that the equipment not be used and that
it be disconnected from the network until the problem has been corrected.
Repairs to this equipment can be made only by the manufacturers, their
authorized agents, or others who may be authorized by the FCC. In the
event repairs are needed on this equipment, contact your authorized
Lucent Technologies dealer or, in the USA only, contact the National
Service Assistance Center (NSAC) at 1 800 242-2121.
■Rights of the Local Telephone Company. If this equipment causes harm to
the telephone network, the local telephone company may discontinue your
service temporarily . If possible, they will notify you in advance. But if
advance notice is not practical, you will be notified as soon as poss ibl e.
You will also be in f ormed of y our ri ght to fi le a co mplaint wit h the FC C .
Issue 1
October 1996
Page xviiInstallation and Operational Procedures
■Changes at Local Telephone Company. Your local telephone company
may make changes in its facilities, equipment, operations, or procedures
that affect the proper functioning of this equipment. If they do, you will be
notified in advance to give you an opportunity to maintain uninterrupted
telephone service.
■New Network Area and Exchange Codes. The communications system
software does not restrict access to any new area codes or exchange
codes established by a local telephone comp any. If the user has
established toll restrictions on the system that could restrict access, then
the user should check the lists of allowed and disallowed dial codes and
modify them as needed.
■Equal Access Codes. This equipment is capable of providing users
access to interstate providers of operator services through the use of
access codes. Modifications of this equipment by call aggregators to
block access dialing codes is a violation of the Telephone Operator
Consumers Act of 1990.
Remote Port Security Device
User’s Guide
Customer Suppor t Information
555-024-402
Federal Communication Commission
(FCC) Electromagn eti c Inter feren ce
Information
This equipment has been tested and found to comply with the limits for a Class A
digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to
provide reasonable protection against harmful interference when the equipmen t
is operated in a commercial environment. This equipment generates, uses, and
can radiate radio frequency energy and, if not installed and used in accordance
with the instruction manual, may cause harmful interference to radio
communications .
Issue 1
October 1996
Page xviiiFederal Communication Co mmission (FCC) Electromagnetic Interference Information
Remote Port Security Device
User’s Guide
About This Book
555-024-402
About This Book
Intended Audiences
This document is intended for the following audience:
Issue 1
October 1996
Page xixIntended Audiences
■Lucent Technologies technicians
■RPSD system administrato rs
■RPSD Key users
Lucent Technologies technicians are the personnel from Lucent Tec hnolog ies
who install the Remote Port Security Device (RPSD) Lock at the customer
premises. It is assumed that Lucent Te chnolo gies te chnicians are familiar with
the technical language used to describe the hardware components, cables,
connectors, and ports involved in the installation of the RPSD Lock. It is further
assumed that they will have the tools and equipment necessary for installation.
RPSD system administrators are the customer personnel who administer and
maintain the RPSD Lock. It is assumed that RPSD system adm inistrators are
familiar with menu-driven telecommunications hardware components. It is also
assumed that they understand the need for maintaining security in administering
the communications system.
RPSD Key users are those who dial in to a channel locked with a Lock by using a
Key. It is assumed that Key users are familiar with placing calls via a modem,
either from a telephone, terminal, or PC.
Responsibilities
Lucent Technologies technicians are responsible for installing the RPSD Lock,
testing it upon installation, and making certain that a working product has been
installed. Lucent Technologies technicians also perform any replacement of the
Lock should it become necessary. Lucent T echnologies technicians are not
responsible for the initialization of the Lock. The Lock is initialized prior to
delivery, and the Key devices that are used by Lucent Technologies are already
installed and initia liz e d.
Remote Port Security Device
User’s Guide
About This Book
555-024-402
RPSD Keys purchased by the customer can be installed by Lucent Technologies
technicians at the customer’s request or installed by the customers.
The troubleshooting material in this document may be used by the technician at
the time of installation, but it is written primarily for the customer. Failure of any
Lock or Key is always resolved by replacement of the failed device.
The Lock commands and administration material is written for RPSD system
administrators. The material on Key commands and use is written for Key users.
Supplying equipment peripheral to the Lock, such as term inals, mod em s,
printers , etc., is the cust omer’s respons ibility. If any mat e ria l is req uired in
addition t o the m a terial shipp ed in the RPSD pack age, it is billab le to the
customer.
Issue 1
October 1996
Page xxTerms and Conventions
Terms and Conven ti ons
The Remote Port Security Device (RPSD) Lock is often referred to as the Lock.
Similarly the RPSD Key is often referred to as the Key.
Throughout this document, toll fraud security hazards are indicated by an
exclamation point inside a triangle and the words Security Alert.
!
Security Alert:
Security Alert indicates the presence of a toll fraud security hazard. Toll
fraud is the unauthorized use of your telecommunications system by an
unauthorized party (for example, persons other than your company’s
employees, agents, subcontractors, or persons working on your company’s
behalf). Be sure to read “Your Responsibility for Your System’s Security” on
the inside front cover of this book and “Security of Your System: Preventing
Toll Fraud” in “About This Book.”
Remote Port Security Device
User’s Guide
About This Book
555-024-402
Typogra phi c al Conventions
Throughout this manual RPSD system responses are shown in italic, sans serif
type. For example:
Call authentication completed
Data that you enter is shown in bold sans serif type. For example:
Issue 1
October 1996
Page xxiTypographi cal Conventions
Block user
ENTER
The button at the end of the line tells you to press the Enter or Return key
ENTER
to complete the command.
NOTE:
In this document, a remote caller’ s computer terminal or personal computer
is referred to as the user’s terminal. The local terminal conn ected to the
RPSD Lock is referred to as the system administrator’s terminal or
administration terminal.
How to Use This Book
This is organized into chapters that give information on procedures necessary for
the proper installation and administration of your Remote Port Security Device.
“Related Documents,” later in this section, provides a complete list of system
documentation, together with ordering information.
If you have problems with your RPSD system, contact your system administrator.
If the problem cannot be solved by the system administrator, in the continental
U.S. your system wi ll c a ll o u r to l l-free Helpline , ava i lab le 2 4 h ours a day, at 1 800
242-2121. Outside of the continental U.S., contact your Lucent Technologies
representative or local authorized dealer .
Remote Port Security Device
User’s Guide
About This Book
555-024-402
Product Safety Labels
Throughout these documents, hazardous situations are indicated by an
exclamation point inside a triangle and the word
!
WARNING:
Warning indicates the presence of a hazard that could cause death or
severe personal injury if the hazard is not avoided.
!
CAUTION:
Caution indicates the presence of a hazard that could cause minor personal
injury or property damage if the hazard is not avoided.
caution
or
warning
Issue 1
October 1996
Page xxiiProdu ct Saf ety Labels
.
Related Documents
In addition to this book, the document listed below is part of the documentation
set. Within the continental United States, order this document from the BCS
Publications Fulf illm ent Cente r by call ing 1 800 457-1235.
Document No.Title
555-025-6000
GBCS Products Security Handbook
How to Comment on This Document
We welcome your comments, both positive and negative. Please use the
feedback form on the next page to let us know how we can continue to serve you.
If the feedback form is missing, write directly to:
Documentation Manag er
Lucent Technologies, Inc.
211 Mount Airy Road
Room 2W-226
Basking Ridge, NJ 07920-2332
Remote Port Security Device
User’s Guide
555-024-402
About This Book
FEEDBACK FORM
Remote Port Security Device
Title:Remote Port Security Device User’s Guide
Order No.: 555-024-402 Date: October 1996
1.Please rate the effe ctiveness of this book in the following areas:
ExcellentGoodFairPoorNot
Ease of Use
Clarity
Completeness
Accuracy
Organization
Appearance
Examples
Illustrations
Overall Satisfaction
Issue 1
October 1996
Page xxiiiHow to Comment on This Document
Applicable
2.Please check ways you feel we could improve this book:
4.Feel f ree to write any comments below or on an attached sheet.
_________________________ _________________________________ _________________________________
If we may contact you about yo ur comments, please complete the following:
Name: _________________________ _________________ ________Telephone Number: ___________ _______
Company/Organization: ____________ ___ _____________ ________Date: ________________ ______________
Address: ____________________________________________________________________________________
o
Add more examples
o
Add more detail
o
Make it more concise
o
Add more step-by-
step procedures
o
Add troubleshooting information
o
Make it less technical
o
Add more/better quick reference
aids
o
Impro v e the index/glos sary
Send completed forms to: Documentation Manager, Lucent Technologies, 211 Mount Airy Road, Room 2W226,
Basking Ridge, NJ 07920. Fax: ( 908) 953-6912.
THIS FORM MAY BE PHOTOCOPIED
Remote Port Security Device
User’s Guide
555-024-402
About This Book
Issue 1
October 1996
Page xxivHow to Comment on This Document
Remote Port Security Device
User’s Guide
Introduction
1
1
Introduction
555-024-402
Issue 1
October 1996
Page 1-1
1
The Remote Port Security Device (RPSD) is a single-line dial-up port protection
system that prevents unauthorized access to a host resource. Host resource
dial-up ports are protected by installing the RPSD Lock on the analog telephone
line leading to the port. Access is provided only when the calling party uses the
RPSD Key, a unit installed on the analog telephone line at the calling party end.
Remote Port Security Device
User’s Guide
Introduction
1
555-024-402
RPSD Syst e m
The RPSD system provides security and control for virtually any type of dial-up
port on any host resource, regardless of the type of modem associated with the
host’ s dial-up ports. This document specifically targets Lucent T echnologies
Business Communications Systems customers and users of the communications
systems listed belo w and supporting periph er al pr o ducts; therefore, most
references in this document are specific to Business Communications Systems.
However, other applications of the RPSD system are possible.
Lucent Technologies supports RPSD use on the following types of
communications syst e ms:
■System 75 (R1V2, R1V3)
■System 85 (R1V1, R1V2, R2V1, R2V2, R2V3, R2V4)
Issue 1
October 1996
Page 1-2RPSD System
■DEFINITY® Enterprise Communications Server (ECS) (all models)
■DIMENSION
■Other communications systems with dial-up ports
■All voice-mail systems
■Any product that supports analog tip-and-ring capability.
With the RPSD Lock and Key system you can set the time of day that access to a
port is permitted, or you can block any or all access to the line by users of RPSD
Keys. In addition, a system activity log provides a real-time record of access
attempts and their outcomes. Session sum maries track statistics on all
successful and failed attempts, providing convenient MIS data resources.
As shown in Fi gure 1-1
, the RPSD Lock is approximately the size of a modem
and is connected between the communi cations syst em modem and the cent ral
office line. The RPSD Key is of similar size and is connected between the caller’s
modem and central office line.
NOTE:
In Figure 1-1, the term “Lucent Technologies Remote Operations” refers to
Technical Services Center remote administration and maintenance
operations, Bell Labs Field Support, and other entities.
Remote Port Security Device
User’s Guide
Introduction
1
Communications
System
Customer Remote
Administration
Terminals, Lucent
Technologies
Remote Operations,
System Management
Applications, etc.
555-024-402
Modem
Modem
POWER RINGINRING
POWER RING
OUT
IN
Administration
Terminal or
Printer
DEFINITY RPSD
CALL
LOCKED VERIFY CONNECTED
OUT
Administration
Terminal
DEFINITY RPSD
CALL
IDLE VERIFY CONNECTED
OUT
Issue 1
October 1996
Page 1-3RPSD System
LOCK
Public
Telephone
Network
KEY
Figure 1-1 .RPSD Loc k a nd Key Confi gu r at ion
The system administrator administers the RPSD Lock via a direct connection
from an administration terminal to the Lock. The administration interface is menu
driven.
The RPSD system protects a por t in the following manner: a call into the channel
to the protected host activates the RPSD Lock. Without involving the protected
host resource or its associated modem, the RPSD Lock verifies the caller’s
identity by using dual-tone, multifrequency (DTMF) signaling with the RPSD Key .
This process is as follows (see Figure 1-1
1. The Lock, installed on tip and ring on the network side of any modem or
protected host resource, answers the incoming call.
2. The Lock sends the caller a poll ing t one. If the callin g party has an RPSD
Key, the Ke y responds wit h its U ser ID. If there is no K ey on th e c alling
end, the Lock terminates the call.
3. The Lock must recognize the Key’s User ID (the Lock must be previously
initialized with all valid Keys); if not, the Lock terminates the call.
4. Using an algorithm governed by ANSI/DES standards, the Lock generates
a random 10-digit value (known as the “dynamic challenge,” for which
there are 10 billion possible values). Using a secret encryption key unique
to the calling RPSD Key’s User ID, the Lock encrypts the value.
).
Remote Port Security Device
User’s Guide
Introduction
1
555-024-402
5. The Lock stores this encrypted “expected value” and sends the dynamic
challenge to the Key.
6. When the Key receives the challenge from the Lock, it uses the secret
encryption key unqiue to the user ID assigned to the Key and encrypts the
value the Lock sent. Following this, the Key calculates the necessary
response. The Key transmits this “expected value” to the Lock.
7. The Lock compares the Key’s response to the expected value it
calculated and stored. If the Lock receives the precise value it expects, it
generates ringing and sends the call on to the protected resource.
The entire sequence occurs in fewer than 20 seconds.
Issue 1
October 1996
Page 1-4RPSD System
Remote Port Security Device
User’s Guide
Introduction
1
555-024-402
Hardwa re Compon e nts
To install a complete RPSD system, you need a Lock and a Key. A
communications system and modem are assumed to be at the customer site
already.
NOTE:
Although a printer is not essential to system operation, you should consider
dedicating a serial printer to the RPSD Lock. (The printer should be set to
9600 kbps, N, 8, 1.) The System Activity Log can store up to 1400
messages, but the only means of retaining a more permanent record of
system activi ty is eit her to i nstal l a dedic ated printer for the RPS D Lock or to
save all messages from the Lock to disk.
The Lucent Technologies personnel who require access to the communications
system already have the Keys they need. Any additional RPSD Keys f or customer
use mu st be orde red s eparately.
Issue 1
October 1996
Page 1-5Hardware Componen ts
The hardware components (both supplied and otherwise) and their requirements
are described in the following sections.
RPSD Lock
When you order the RPSD Lock, you receive:
If any other cables or connectors are required, they must be ordered separately.
In addition, any peripheral devices, such as the administration terminal or printer,
are customer supplied. Install the RPSD Lock between the maintenance and
administration channel and the commu nications s ystem modem.
■The Lock
■Power s upply
■7-foot line cord with RJ11 modular connectors on each end
■14-foot line cord with RJ11 modular connectors on each end
■DB9 (male) to DB25 (female) cable
Remote Port Security Device
User’s Guide
Introduction
1
555-024-402
The RPSD Lock is 5.75 inches wide by 9.5 inches long by 1.75 inches high. It has
seven LEDs on the front panel and four ports on the back panel (see Figure 1-2).
For a detailed description of the front panel LEDs, see Appendix B, “Front Panel
LEDs.” The back panel ports are:
■RJ11 port for the modem connection, labeled SUBSCRIBER
■RJ11 port for the central office line, labeled TELCO
■Female DB9 port for the terminal or printer (or a modem), labeled AUX.
PORT
■Alarm leads to connect an external alarm
■Port for the power supply (supplied with the RPSD Lock)
Issue 1
October 1996
Page 1-6Hardware Componen ts
POWER RINGINRING
SUBSCRIBER
(MODEM)TELCO
Figure 1-2.RPSD Lock
DEFINITY RPSD
CALL
OUT
LOCKED VERIFY CONNECTED
OUT
Front
RED
GREENBYPASS
POWER MONITOR
SECURE
Back
AUX. PORT
LOCK
ALARM
LEADS
!
+
12VDC
1A
Power M on ito r Fu nctio n
The Power Monitor function allows you to control the behavior of the RPSD during
power failure conditions. The POWER MONITOR button on the back of the Lock
enables or disables this function.
Remote Port Security Device
User’s Guide
Introduction
1
555-024-402
In the event of a unit failure or a power failure, the RPSD blocks incoming and
outgoing calls to the port, protecting the port against unauthorized access. This
call blocking also prevents the communications system or other protected
resources from originating an alarm and blocks dial-up access to the port.
However , you can push in the POWER MONITOR button on the back of the Lock
to enable the Power Monitor function. The green LED lights to indicate that the
Power Monitor function is enabled. When this function is enabled, the TELCO and
SUBSCRIBER ports are connected during a power failure, thereby bypassing the
Lock security. This bypassing permits incoming call s to the communication s
system or other host resource.
!
Security Alert:
When the POWER MONITOR button is IN during a unit or power failure, the
security of the RPSD Lock is bypassed. Leave the button in the OUT
position for security reasons.
Issue 1
October 1996
Page 1-7Hardware Componen ts
External Alarm
You can connect alarm leads to the screw terminals on the back of the Lock.
When a Lock failure occurs, contacts inside the Lock close and send a signal out
the alarm terminals to the communications system or other external alarm.
You can also use the Power Monitor function to generate a signal failure through
the alarm leads without bypassing the RPSD and compromising security. This is
called an
RPSD Key
The RPSD Key is similar to the RPSD Lock in size and appearance. When you
order the RPSD Key, you receive:
■The Key
■Power s upply
■7-foot line cord with RJ11 modular connectors on each end
■14-foot line cord with RJ11 modular connectors on each end
Alarm Only
installation.
■DB9 (male) to DB25 (female) cable
Like the RPSD Lock, the RPSD Key has LEDs on the front panel and ports on the
back panel. For a detailed description of the front panel LEDs, see Appendix B,
“Front Panel LEDs.” The back panel ports are (see Figure 1-4):
■RJ11 port for the central office line, labeled TELCO
■RJ11 port for the modem connection, labeled SUBSCRIBER
■Female DB9 port for the terminal or printer , labeled AUX. PORT
■Port fo r the powe r supply (supplied with the RPSD Key) .
Remote Port Security Device
User’s Guide
Introduction
1
555-024-402
Install the RPSD Key between the Key user’s central office line and modem.
Issue 1
October 1996
Page 1-8Hardware Componen ts
KEY
DEFINITY RPSD
Modems
POWER RING
IN
CALL
IDLE VERIFY CONNECTED
OUT
Front
SUBSCRIBER
(MODEM)TELCO
AUX. PORT
!
+
12VDC
1A
Back
Figure 1-3.RPSD Key
The RPSD Lock works with any modem that can be used with the
communications system. Similarly, the RPSD Key works with any modem that can
be used with a terminal.
NOTE:
Version 3 of the RPSD Lock and Key works with low- and high-speed
modems up to 28.8 kbps. Versions 1 and 2 work only with low-speed
modems up to 9.6 kbps.
Loading...
+ 126 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.