AT&T Remote Port Security Device manuel d'utilisation

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109

Aller à la page of

Un bon manuel d’utilisation

Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation AT&T Remote Port Security Device. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel AT&T Remote Port Security Device ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.

Qu'est ce que le manuel d’utilisation?

Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation AT&T Remote Port Security Device décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.

Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.

Donc, ce qui devrait contenir le manuel parfait?

Tout d'abord, le manuel d’utilisation AT&T Remote Port Security Device devrait contenir:
- informations sur les caractéristiques techniques du dispositif AT&T Remote Port Security Device
- nom du fabricant et année de fabrication AT&T Remote Port Security Device
- instructions d'utilisation, de réglage et d’entretien de l'équipement AT&T Remote Port Security Device
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes

Pourquoi nous ne lisons pas les manuels d’utilisation?

Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage AT&T Remote Port Security Device ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles AT&T Remote Port Security Device et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service AT&T en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées AT&T Remote Port Security Device, comme c’est le cas pour la version papier.

Pourquoi lire le manuel d’utilisation?

Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif AT&T Remote Port Security Device, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.

Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation AT&T Remote Port Security Device. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.

Table des matières du manuel d’utilisation

  • Page 1

    AT&T DEFINITY ® Communications System Remote Port Security Device User’s Manual[...]

  • Page 2

    © 1991 AT&T All Rights Reserved Printed in USA While reasonable effort was made to ensure that the information in this document was complete and accurate at the time of printing, AT&T can not assume responsibility for any errors. Changes and/or corrections to the information contained in this document may be incorporated into future issues[...]

  • Page 3

    IMPORTANT SAFETY INSTRUCTIONS To reduce the risk of injury from fire or electric shock, always follow the basic safety precautions when using this product. The safety symbol (exclamation point inside a triangle) on the RPSD Lock or RPSD Key alerts you to the important operating and maintenance instructions below. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15[...]

  • Page 4

    16 This product should be operated only from the type of power source indicated on the power transformer (see Item 18 below). If you are not sure of the type of power supply to your business or home, consult your local power company. 17 The wiring from the Subscriber (modem) jack should not leave the building premises unless it interfaces to a prod[...]

  • Page 5

    FCC Notices Part 15, Subpart A This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. Note: This equipment has been tested and fo[...]

  • Page 6

    Contents 1 Getting Started Getting Started 1-1 Audience 1-4 Responsibilities 1-4 In This Document 1-5 Typographical Conventions 1-5 Hotline or Other Service Call Numbers/Addresses 1-6 2 Installation Installation Room Layout/Environment Power Supply Location of Administration Terminal or Printer Hardware Components RPSD Lock RPSD Power Monitor Adapt[...]

  • Page 7

    3 RPSD System Administration RPSD RPSD System Administration Time of Day Access System Activity Log Single Point Administration Enable/Disable (Block) AT&T and Other Key Users Force Connect/Disconnect Authorized Keys System Administrator Command Set A - Add User B - Block User U - Unblock User T - Test User R - Remove User L - List User Table C[...]

  • Page 8

    4 RPSD Key Use RPSD Key Use 4-1 Access Failure Messages 4-2 Last Call Status Test 4-2 RPSD Key User Command Set 4-3 U - Set User ID 4-4 K - Set Secret Key 4-4 N - Set Device Number 4-5 L - List User Information 4-5 H - History Display 4-6 D - Date Set 4-7 C - Clock Set 4-7 I - Set Log ID 4-8 S - Status Display 4-9 SC - Set Communications Parameters[...]

  • Page 9

    List of Figures Figure 1-1 1-2 2-1 2-2 2-3 2-4 2-5 2-6 2-7 2-8 2-9 2-10 B-1 B-2 Protection Process RPSD Lock and Key Configuration Bypass Connections RPSD Lock RPSD Key Common RPSD Lock Configuration RPSD Lock to CO Line (RMATS Channel) RPSD Lock to Modem RPSD Lock to Administration Terminal or Printer DB25 Connections From RPSD Lock or Key to Data[...]

  • Page 10

    List of Tables Table Page 2-1 2-2 3-1 4-1 2-16 2-23 3-3 4-2 5-4 A-1 B-2 B-3 5-1 A-1 B-1 B-2 Aux. Port, Terminal, and Printer Pinouts Cables, Connectors, and Ports Access Failure Messages Access Failure Messages Access Failure Messages Cables, Connectors, and Ports RPSD Lock LEDs RPSD Key LEDs[...]

  • Page 11

    1 Getting Started Getting Started Audience Responsibilities In This Document Typographical Conventions Hotline or Other Service Call Numbers/Addresses 1-1 1-4 1-4 1-5 1-5 1-6[...]

  • Page 12

    Getting Started The DEFINITY ® Remote Port Security Device (RPSD) is a single line dial-up port protection system that prevents unauthorized access to a host resource. Host resource dial-up ports, called “subscribers,” are protected by the installation of the RPSD Lock hardware unit on the analog interface channel leading to the subscriber por[...]

  • Page 13

    The RPSD system protects a port in the following manner: a call into the channel to the protected host activates the RPSD Lock. Without involving the protected host resource or its associated modem, the RPSD Lock performs a verification of the caller’s identity through a set of communications with the RPSD Key using DTMF signaling. This process i[...]

  • Page 14

    The RPSD Lock device is approximately the size of a modem and is connected between the PBX modem and the Central Office (CO) line. The RPSD Key device is of similar size and is connected between the client’s (caller’s) modem and CO line. See Figure 1-2. FIGURE 1-2 RPSD Lock and Key Configuration In Figure 1-2, the term “AT&T Remote Operat[...]

  • Page 15

    Audience This document is intended for the following audience: ■ AT&T Technicians ■ RPSD System Administrators ■ RPSD Key Users AT&T Technicians refers to the personnel from AT&T who install the RPSD Lock device at the customer premises. It is assumed that AT&T Technicians are familiar with the technical language used to descr[...]

  • Page 16

    In This Document This document comprises the following material: ■ ■ ■ ■ Chapter 1: Getting Started provides an overview of the RPSD system, a description of this document and its intended audience, and an explanation of typographical conventions. Chapter 2: Installation describes the recommended hardware environment and lists the RPSD syst[...]

  • Page 17

    Hotline or Other Service Call Numbers/Addresses If assistance is needed with the RPSD Lock, Key, or the PBX, or problems occur in the RPSD Lock or Key that cannot be resolved by using Chapter 5, Troubleshooting, contact the technical support center at: 1 800 242-2121 1-6 Getting Started[...]

  • Page 18

    2 Installation Installation 2-1 Room Layout/Environment 2-3 2-3 2-4 Power Supply Location of Administration Terminal or Printer Hardware Components RPSD Lock RPSD Power Monitor Adapter PBX s Other Modems RPSD Lock or Key Administration Terminal RPSD Lock Administration Printer RPSD Key 2-5 2-5 2-6 2-8 2-9 2-9 2-9 2-9 2-10 Hardware Installation Proc[...]

  • Page 19

    Installation This chapter describes the recommended room layout and environment, hardware components, installation procedures, and testing for the RPSD. In addition to this chapter, you may wish to refer to Appendix A, Cables, Connectors, and Ports Tables for quick reference materials on the installation of the hardware components. If this is the f[...]

  • Page 20

    2-2 Installation[...]

  • Page 21

    Room Layout/Environment While the location of the RPSD Lock is not critical to its function, it is best if the Lock is kept in an equipment cabinet near the PBX modem. This helps protect the Lock against dust and other precipitate, as well as protecting against physical damaging from being knocked to the floor or having things dropped on it. Altern[...]

  • Page 22

    Location of Administration Terminal or Printer For the purposes of installation, it is simplest if the RPSD Lock or Key administration terminal or printer is co-located with the RPSD Lock or Key. However, this is not always possible. In the event that the terminal or printer must be located at some distance from the RPSD Lock or Key (in another roo[...]

  • Page 23

    Hardware Components When you order the RPSD Lock device, you receive the Lock, power supply, a 7-foot cable with modular connectors on each end, and a 14 foot cable with modular connectors on each end. If any other cables or connectors are required, they must be ordered separately. In addition, any peripheral devices, such as the administration ter[...]

  • Page 24

    RPSD Power Monitor Adapter The Power Monitor Adapter (PMA) (Comcode 406453662) provides an installation option that allows you to control the behavior of the RPSD during power failure conditions. In the event of a unit failure or a power failure, the RPSD is designed to block incoming and outgoing calls to the port, protecting the port against unau[...]

  • Page 25

    A second pair of RJ11 port connections may be installed for simple bypass of the RPSD Lock. To bypass the Lock, the modular connection cords are removed from the RPSD Lock Telco and Subscriber ports and connected to the bypass connection block, which connects the line directly. See Figure 2-1 for the recommended cabling diagram. Modem Telco Typical[...]

  • Page 26

    FRONT BACK FIGURE 2-2 RPSD Lock PBXs AT&T supports RPSD use on the following types of PBXs: ■ System 75 (R1V2, R1V3) ■ System 85 (R1V1, R1V2, R2V1, R2V2, R2V3, R2V4) ■ DEFINITY Generic 1 (all models) ■ DEFINITY Generic 2 (all models) ■ Dimension® PBX To install the RPSD Lock you must locate the CO line used for RMATS service. This wi[...]

  • Page 27

    Other Other dial-up port applications may be supported. To install an RPSD Lock device for these applications, locate the CO line used to service that port and install the Lock as you would for the remote maintenance and administration application. Modems The RPSD Lock works with any modem that may be used with the PBX. Similarly, the RPSD Key work[...]

  • Page 28

    RPSD Key The RPSD Key is similar to the RPSD Lock in size and appearance. Like the RPSD Lock, the RPSD Key has seven LEDs on the front panel and four ports on the back panel. For a detailed description of the front panel LEDs, see Appendix B, Front Panel LEDs. The back panel ports are: ■ an RJ11 port for the CO line, labeled Telco ■ an RJ11 por[...]

  • Page 29

    Hardware Installation Procedures It is absolutely required that the first step in installing the RPSD Lock device is to inform the INADS System Administrator at the local or central technical support center when the installation will take place and that the channel will be down at that time. This ensures that they will not attempt to administer the[...]

  • Page 30

    FIGURE 2-4 Common RPSD Lock Configuration The Lock is installed between the CO line and the PBX modem. The modem location depends on the type of PBX. The modem is located: ■ on the circuit pack for System 75 and DEFINITY Generic 1 ■ external to the PBX for System 85 and DEFINITY Generic 2 The RPSD Lock must also be connected to the administrati[...]

  • Page 31

    You will need the following components to install the RPSD Lock: ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ RPSD Lock device the CO line assigned as the RMATS channel (on customer premises) the PBX modem (on customer premises) 6 position wire (length depends on local configuration) two modular connectors two DB25 connectors (male) RS-232 cable adminis[...]

  • Page 32

    Modular Plug RJ11 Jack CO Line (RMATS Channel) Modular Plug FIGURE 2-5 RPSD Lock to CO Line (RMATS Channel) Connecting the RPSD Lock to the PBX Modem The 212A modem has a DB25 input, so the connection to the RPSD Lock must be adapted to connect the tip and ring from a modular plug to a DB25. The two relevant pins for the 212A are pins 7 and 8. Pin [...]

  • Page 33

    Modular Plug PBX Modem Modular Plug FIGURE 2-6 RPSD Lock to Modem Connecting the RPSD Lock to the Administration Terminal or Printer You will need the following hardware components to connect the RPSD Lock device to the administration terminal, printer, or modem: ■ RPSD Lock device ■ administration terminal or printer (printer is optional but r[...]

  • Page 34

    To connect the RPSD Lock device to the administration terminal or printer, use the following procedure: 1 Using Table 2-1, make up a DB25 connector with EIA-RS232 cable for the Aux. Port of the RPSD Lock. 2 Make up the appropriate connector for the terminal or printer according to the pin descriptions in Table 2-1. 3 Connect the first DB25 connecto[...]

  • Page 35

    FIGURE 2-7 RPSD Lock to Administratlon Terminal or Printer Hardware Installation Procedures 2-17[...]

  • Page 36

    2 3 4 5 6 7 8 20 22 Transmit Data Receive Data Request to Send Clear to Send Data Set Ready Signal Ground Data Carrier Detect Data Terminal Ready Ring Indicator RPSD Terminal or Printer 2 3 4 5 6 7 8 20 22 (DCE) (DTE) FIGURE 2-8 DB25 Connections From RPSD Lock or Key to Data Terminal Equipment 2-18 Installation[...]

  • Page 37

    2 3 4 5 6 7 8 20 2 3 4 5 6 7 8 20 RPSD (DCE) FIGURE 2-9 Printer (DCE) DB25 Connections From RPSD Lock or Key to Data Communications Equipment Obtain further information for the specific terminal or printer in use from the documentation accompanying them. Powering Up the RPSD Lock To power the RPSD Lock, you need: ■ the RPSD Lock Power Supply ■ [...]

  • Page 38

    AC Outlet FIGURE 2-10 RPSD Lock Power Supply Installing the RPSD Key The RPSD Key is installed between the user’s terminal and modem. To install an RPSD Key device, you need: ■ ■ ■ ■ ■ ■ ■ ■ ■ RPSD Key Terminal Modem two modular connectors 6 position wire one RS-232 connectors one DB25 connector (male) RS-232 cable AC outlet Not[...]

  • Page 39

    Connecting the RPSD Key to the Terminal The RPSD Key is connected to the terminal via the Aux. Port on the back of the RPSD Key device and the terminal’s RS-232 port. Obtain or make up a cable with the RS-232 wire, the RS-232 connector on one end, and the DB25 connector (male) on the other end. Connect the DB25 connector to the Aux. Port on the R[...]

  • Page 40

    Power-Up Behavior of Uninitialized Key With an uninitialized Key, the left four LEDs will all light up upon power-up. If any other behavior occurs, there is a firmware error and the Key should be replaced. Testing an Uninitialized Key Test an RPSD Key that has not been initialized by connecting either a telephone or a terminal to the Subscriber por[...]

  • Page 41

    Cables, Connectors, and Ports Table Table 2-2 shows the cables, connectors, and ports required to install the RPSD system. This table includes optional connections as well as the basic configuration. TABLE 2-2 Cables, Connectors, and Ports Part From To modular connector 6 position wire modular connector 1 7 ft. cable with modular connector on each [...]

  • Page 42

    2-24 Installation[...]

  • Page 43

    Software Components The software for the RPSD system is contained within the hardware components and does not need to be loaded separately. Additionally, if you are not installing an RPSD Key or Keys, you need only set the date and time for the RPSD Lock and, in the case of multiple Locks, a Lock ID. If you are installing RPSD Keys, you will need t[...]

  • Page 44

    Initializing an RPSD Key Initialization of an RPSD Key involves both the Key and the RPSD Lock. On the Lock, the Key User ID in question must be added using the Add User command. See Chapter 3, System Administrator Command Set for the procedure for using the Add User command. On the Key, the following commands are used for initializing the device: [...]

  • Page 45

    Test RPSD Lock Installation The Self Check tests the health of the RPSD Lock. If the correct response is received when the test is run, the RPSD Lock is functioning properly. To perform the Self Check, dial the RMATS channel from a touch-tone telephone. When the call is answered, you hear a short tone (indicating a connection to the RPSD Lock). Pre[...]

  • Page 46

    3 RPSD System Administration RPSD System Administration 3-1 Time of Day Access 3-1 System Activity Log 3-2 Single Point Administration 3-4 Enable/Disable (Block) AT&T and Other Key Users 3-4 Force Connect/Disconnect 3-4 Authorized Keys 3-5 RPSD System Administrator Command Set 3-7 A - Add User B - Block User U - Unblock User T - Test User R - R[...]

  • Page 47

    RPSD System Administration The RPSD Lock device prevents unauthorized access to the RMATS channel on your PBX. In administering the RPSD, keep in mind that access via telephone lines is not the only means of breaching the security of your system. A system can be breached, for example, by physically intercepting lines and adding unauthorized equipme[...]

  • Page 48

    System Activity Log The System Activity Log retains a log history of the last 60 status messages generated by the RPSD Lock. As a new message is generated, the oldest message in the buffer is deleted. The most recent twenty messages are sent to the RPSD Lock administration terminal or printer and displayed or printed in real-time. That is, the olde[...]

  • Page 49

    The fields of the System Activity Log entries are: Log ID provides the ID of the Lock associated with the system activity message. Sequence numbers each message in sequence. The sequence goes from 000 to999 Number and then restarts at 000. Date provides the date of the message. Time provides the time the message was generated in 24 hour clock forma[...]

  • Page 50

    Single Point Administration A single administration terminal or printer can be used to administer multiple Locks. To do so, you will need to either administer the Locks from tty ports via the UNIX ® Operating System, or you can use, in the case of printers, a printer sharing device. Where multiple Locks are used, a Lock ID should be assigned to ea[...]

  • Page 51

    Authorized Keys You may have up to twenty-five RPSD Key user IDs on the RPSD Lock. Ten RPSD Key user IDs are reserved as permanent for AT&T personnel to administer and maintain the PBX, peripheral, or adjunct via the RMATS port. These user IDs cannot be deleted. The permanent user IDs can, however, be blocked by issuing a block command on the R[...]

  • Page 52

    3-6 RPSD System Administration[...]

  • Page 53

    RPSD System Administrator Command Set This section describes the commands available on the RPSD Lock and their syntax. The procedures in which the commands are used have been described earlier in this chapter. This material is provided as a quick reference. Also described in this section is the method of accessing the help screens that accompany th[...]

  • Page 54

    Optionally, a single Key can be used to access multiple Locks. This is done by entering the [secret_key] information when adding that Key. The same [secret_key] information is then used when adding that Key to other Locks. The information is then used to generate the test responce. The secret key chosen by the administrator is the key information t[...]

  • Page 55

    B - Block User Syntax: b <user_id> [ RETURN ] Blocks an RPSD Key user from access to the RMATS channel. Both permanent and non-permanent users may be blocked. In the syntax line above, b is the command and <user_id> is the user ID. To determine whether a user is already blocked, or to check the user IDs, use the List User Table command.[...]

  • Page 56

    T - Test User Syntax: t <user_id> [ RETURN ] Returns a seven-digit, pseudo-random code to be matched by a code from the specified RPSD Key user. This is used to check whether the RPSD Key has been seeded properly with the secret information. The Test Response on the RPSD Key is obtained by using the List User Information command on the RPSD K[...]

  • Page 57

    L - List User Table Syntax: l [ RETURN ] or l <full_or_partial_user_id> [ RETURN ] The List User Table command lists information regarding all users if no user ID is specified. The command lists information regarding a specified user if the full user ID is given, or all users beginning with whichever characters are used, meaning it will list [...]

  • Page 58

    The fields of the List User Table screen are: User ID Provides the user ID. Blocked? States whether a Block command has been issued for that user. The default is no block. If a user is not blocked, the field is left blank. Blocks can be issued on both permanent and non-permanent users. Permanent? Tells whether the user is one of the AT&T perman[...]

  • Page 59

    Third Sample Command and Response: The following is a sample of the output returned by using the second syntax example, which lists all users beginning with the same characters. > l KEY User ID Blocked? Perm? Restriction(s) KEY11 KEY12 B KEY13 B KEY14 KEY15 KEY16 KEY17 KEY18 B KEY19 KEY20 -- End of List -- A C D A B D A A A A A The fields of thi[...]

  • Page 60

    CR - Change Restriction Syntax: cr <restr_id,start(hh:mm),end(hh:mm),day_no.> [ RETURN ] The Change Restriction command is used to set the list of time restrictions that may be placed on a user or users. Time restrictions block access to the RMATS channel for a specified portion of time on a specified day or days. That is, you can block acces[...]

  • Page 61

    start(hh:mm) The beginning time of the restriction in 24 hour clock format. In the sample above, the beginning time for restriction IDA is 20:00, which is 8:00PM. Note: You must use the colon (:) as a separator between the hours and minutes or the entry will not work. You must also use a leading zero (0) to enter any time that is less than 10:00, f[...]

  • Page 62

    LR - List Restrictions [ RETURN ] Syntax : lr or lr <restr_id> [ RETURN ] The List Restrictions command is used to list the time restrictions that have been administered. Up to 14 separate restrictions maybe created (A-N). The first syntax example above will list the time restrictions for all restriction IDs A to N. In the second example, ent[...]

  • Page 63

    UR - User Restrictions Syntax: ur <full_or_partial_user_id, restr_id(s)> [ RETURN ] The User Restrictions command is used to assign time restrictions to a user or set of users. The command assigns restrictions to a specified user if the full user ID is given, or all users beginning with whichever characters are used, meaning it will assign th[...]

  • Page 64

    LH - Log History Syntax: lh [ RETURN ] Displays the last sixty messages in the System Activity Log. The messages are displayed twenty to a page with a total of three pages. – More to Come – appears at the bottom of the first two pages and – End of List – appears at the bottom of the last (third) page. Press [ RETURN ] to move from the first[...]

  • Page 65

    The fields of the Log History screen are: Log ID provides the ID of the Lock associated with the system activity message. Sequence numbers each message in sequence. The sequence goes from 000 to 999 Number and then restarts at 000. Date provides the date of the message. Time provides the time the message is generated in 24 hour clock format. Messag[...]

  • Page 66

    AH - Access History Syntax: [ RETURN ] ah The Access History command displays details regarding the last twenty accesses of the RMATS channel for both incoming and outgoing calls. The command takes no arguments. Sample Command and Response: > ah ---Access History --- Date Time User ID Device # Duration 08/16/90 13:08:51 ATT-INADS1 12345 0: 0:20 [...]

  • Page 67

    FH - Failure History Syntax: fh [ RETURN ] The Failure History command displays a log of the last twenty failed access attempts and the details of those calls. The command takes no arguments. Sample Command and Response: > fh -- Failure History Date Time 06/04/90 13:08:51 06/15/90 13:09:42 07/01/90 15:12:06 07/03/90 15:20:51 07/09/90 15:24:19 07[...]

  • Page 68

    ST - Status Display Syntax: st [ RETURN ] The Status Display command displays the version, date, time, communications parameters, and current status of the RPSD Lock. Sample Command and Response: > st AT&T RPSD/JPLock01 - V1.1a Firmware V2.Ot Init. Code: DR Current Date: Mon 11/12/90 Time: 16:11:55 Log ID: Comms. Set to: 9600/8N Current Stat[...]

  • Page 69

    LS - List Statistics Syntax: ls [ RETURN ] The List Statistics command displays a statistical summary of call attempts and failures, both cumulative and since the last time the statistical summary was reset. The summary is reset by the administrator using the Reset Statistics command, described in this section. Sample Command and Response: > ls [...]

  • Page 70

    RS - Reset Statistics [ RETURN ] Syntax: rs [ RETURN ] Entering r S resets the access attempts statistics to zero. This command does not reset cumulative totals. The access attempts statistics are obtained by using the List Statistics command. FC - Force Connect Syntax: fc If a call comes in that the administrator wants to go through regardless of [...]

  • Page 71

    FD - Force Disconnect Syntax: fd [ RETURN ] The Force Disconnect command disconnects a call in progress. This might be used to clear the channel for a higher priority call. The Lock will request confirmation of a Force Disconnect command. If a Force Disconnect command is issued when no call is in progress, an error message will be returned. Sample [...]

  • Page 72

    C - Clock Set Syntax: c <hh:mm> [ RETURN ] Set the clock to local time standards in 24 hour clock format (for example, 16:00 for 4:00 PM). The clock must be set in order to ensure the accuracy of the System Activity Log and also because the clock is used by the RPSD Lock for enabling and disabling time restrictions. Be certain to use a colon [...]

  • Page 73

    SC - Set Communications Parameters Syntax: sc <speed,length_parity> [ RETURN ] The Set Communications Parameters command is used to set the communications link speed, character length, and parity on the serial port. The default setting is 9600 baud, 8 bit, no parity. In the syntax above sc is the command, speed is the link speed, and length_p[...]

  • Page 74

    Help Screens To obtain a help screen for any command, enter a question mark (?) followed by the command and [ RETURN ]. Sample Help Request and Help Response: > ?i Command: I - ID Set Function: Set ID to precede all log messages from this device. Format: I log id Example: >I LOCK-A To clear ID type: I "" 3-28 RPSD System Administrat[...]

  • Page 75

    4 RPSD Key Use RPSD Key Use 4-1 Access Failure Messages 4-2 Last Call Status Test 4-2 RPSD Key User Command Set U - Set User ID K - Set Secret Key N - Set Device Number L - List User Information H - History Display D - Date Set C - Clock Set I - Set Log ID S - Status Display 4-3 4-4 4-4 4-5 4-5 4-6 4-7 4-7 4-8 4-9 SC - Set Communications Parameters[...]

  • Page 76

    RPSD Key Use When the RPSD system is working correctly, Key use and authentication should be almost invisible to the RPSD Key user. The user dials the RMATS channel from the user’s terminal, authentication takes place (during which time the LEDs on the front panel of the RPSD Key indicate the status of the call), and the RPSD Key user is correcte[...]

  • Page 77

    Access Failure Messages Table 4-1 describes the access failure messages and their meanings. Access failure messages do not necessarily mean that an error has occurred. For example, if a Key user fails to gain access to the RMATS channel because the administrator has put a block on that Key, or because access has been restricted for that time of day[...]

  • Page 78

    RPSD Key User Command Set The RPSD Key device displays a different Menu of Commands to standard output depending on whether the device is in a virgin state. The following shows the Menu of Commands when the Key is in a virgin state: --- Menu of Commands --- L - List User Information H - History Display D - Date Set C - Clock Set I - Set Log ID S - [...]

  • Page 79

    U - Set User ID Syntax: u <user_id> [ RETURN ] The Set User ID command is used to enter a name that will identify the RPSD Key to the RPSD Lock. This command is only used when initializing a Key in the virgin state. See Chapter 2, Initializing an RPSD Key for a complete description of the procedure which uses this command. To use this command[...]

  • Page 80

    N - Set Device Number Syntax: n <number> [ RETURN ] The Set Device Number command enters a number from 100 to 9999999 as an identifier for the RPSD Key device. Use this command when you have two or more RPSD Keys with the same user ID. The device number is associated with the Key for the purpose of identification by the RPSD Lock. This comman[...]

  • Page 81

    H - History Display Syntax: h [ RETURN ] The History Display command displays a log history of the last twenty messages generated by or sent to the RPSD Key device. See Table 4-1 for an explanation of the status messages sent to the Key by the RPSD Lock when a connection attempt fails. Sample Command and Response: > h --- Log History --- 07/12/9[...]

  • Page 82

    D - Date Set Syntax: d <mm/dd/yy> [ RETURN ] The Date Set command is used to set the date for the RPSD Key’s internal calendar. You should set the date when you begin using the Key just to be certain that it is correct. To check the date you can use the Status Display command described in this section. In the above syntax, d is the command [...]

  • Page 83

    I - Set Log ID Syntax: i <log_id> [ RETURN ] The Set Log ID command is used to identify which Key is associated with which status message. This is especially important where multiple devices share a single administration terminal. The command adds the ID to the beginning of each message generated by the Key. In the syntax described above, i i[...]

  • Page 84

    S - Status Display Syntax: s [ RETURN ] The Status Display command displays the current status of the RPSD Key to the user’s terminal. To use this command, enter s [ RETURN ] at the > prompt. Sample Command and Response: >s AT&T RPSD/KEY11 - V1.0 Firmware V2.0x Init Code: Current Date: Mon 08/14/90 Time: 14:28:09 Log ID: 12345678 Comms [...]

  • Page 85

    SC - Set Communications Parameters Syntax: sc <speed,length_parity> [ RETURN ] The Set Communications Parameters command is used to set the communications link speed, character length, and parity on the serial port. The default setting is 9600 baud, 8 bit, no parity. In the syntax above, sc is the command, speed is the link speed, and Iength_[...]

  • Page 86

    W - Wipe Out Syntax: w [ RETURN ] The Wipe Out command will erase the user ID, secret key information, and device ID of the RPSD Key and return it to a virgin state. If the Wipe Out command is used, the Key will be unable to access the RPSD Lock unless the entire initialization procedure is performed again. For this reason, you should be certain th[...]

  • Page 87

    5 Troubleshooting Troubleshooting 5-1 Access Failure Messages 5-3 Testing the RPSD Lock 5-7 Built-in Diagnostics 5-7 Self Check 5-8 Last Call Status Test 5-8 Modem Ring Test 5-9 Hardware Replacement 5-9 Replacing the PBX Modem 5-10 Replacing the Lock or Key 5-11 Saving the Key Seed Value 5-13[...]

  • Page 88

    Troubleshooting This chapter provides a basis for establishing the cause of trouble or access failure with your RPSD system. In the event that you are unable to determine the cause of the problem or resolve the matter to your satisfaction, contact the technical support center at: 1 800 242-2121 Note: The only solution to a hardware or firmware prob[...]

  • Page 89

    5-2 Troubleshooting[...]

  • Page 90

    Access Failure Messages When calls to the RPSD Lock are disconnected without reaching the PBX modem, the Lock generates an access failure message that is sent to standard output and saved in the system activity log. The access failure message is also sent as a reply to the caller whose attempt failed (the message can only be received, however, if t[...]

  • Page 91

    TABLE 5-1 Access Failure Messages Code No. Message Meaning Action 1 No RPSD/Key No RPSD Key First test the RPSD Lock using the Self Detected was detected on Check described in Testing the RPSD Lock the caller’s line. in this chapter. If the Lock tests okay, and there is an RPSD Key on the line but the RPSD Lock failed to detect it, escalate the t[...]

  • Page 92

    TABLE 5-1 (Continued) Access Failure Messages Code No. Message Meaning 4 Blocked User 5 Invalid Response 6 Outgoing Call 7 Ring - No Answer 8 Force Disconnect The administrator placed a block on the caller’s RSPD Key user ID. The RSPD Key responded to the RSPD Lock’s challenge, but the response was incorrect. An outgoing call is being placed. I[...]

  • Page 93

    Code No. 9 Message Time Restriction TABLE 5-1 (Continued) Access Failure Messages Meaning The call was placed during a time of day when the Lock is restricted from taking any calls. Action No action necessary. This is a deliberate restriction placed on access to the RSPD Lock by the administrator. If access must be permitted at this time, contact t[...]

  • Page 94

    Testing the RPSD Lock There are two ways in which the RPSD Lock can be tested to determine the cause of access failures and whether the Lock or some associated piece of hardware is malfunctioning. ■ Built-in diagnostics ■ Hardware replacement Note: In all cases where a connection fails, if it is important for the caller to get into the RMATs ch[...]

  • Page 95

    Self Check The Self Check tests the health of the RPSD Lock. To perform the Self Check, dial the RMATS channel from a touch-tone telephone. When the call is answered, you hear a short tone (indicating a connection to the RPSD Lock). Press 1 ✱ on the telephone pad. If the response is 3 quick tones, followed by the RPSD Lock disconnecting, the Lock[...]

  • Page 96

    Modem Ring Test The Modem Ring Test tells you whether the call attempts are getting through to the modem. If there is a problem with the RPSD Lock, the PBX modem, or the cabling, the call will not reach the modem. The likeliest result, in the case of a problem, is a Ring No Answer. To perform the Modem Ring Test, dial the RMATS channel from a touch[...]

  • Page 97

    Replacing the PBX Modem To test whether the problem diagnosed by the Modem Ring Test is in the PBX modem, perform the following procedure: 1 2 3 4 5 6 7 Disconnect the modular telephone plug from the PBX modem and connect a touch-tone telephone to the modem. Call the RMATS channel from a touch-tone telephone and perform the Modem Ring Test describe[...]

  • Page 98

    Replacing the Lock or Key If an RPSD Lock must be replaced, the service call is classified as the highest priority because a failed Lock prevents all access to or from the RMATS channel. The RPSD Lock may be removed from the line and, to maintain access to the RMATS channel, the modem may be connected directly to the CO line. (This is only if the F[...]

  • Page 99

    5-12 Troubleshooting[...]

  • Page 100

    Saving the Key Seed Value All of the secret information used to initialize the RPSD Lock should be saved in a secure location. If a Lock needs to be replaced, you will want to initialize the replacement Lock with the same information as the original. However, it is important to remember that the secret information must be saved in a secure location[...]

  • Page 101

    A Cables, Connectors, and Ports Table Cables, Connectors, and Ports Table A-1[...]

  • Page 102

    Cables, Connectors, and Ports Table Table A-1 shows the cables, connectors, and ports for installing the RPSD system. This table includes optional connections as well as the basic configuration. TABLE A-1 Cables, Connectors, and Ports Part COMCODE From To modular connector XXXXXX PBX RJ11 at modem 6 position wire XXXXXX RJ11 at PBX RJ11 at modem mo[...]

  • Page 103

    B Device LEDs Front Panel LEDs B-1 RPSD Lock B-1 RPSD Key B-2[...]

  • Page 104

    Front Panel LEDs Both the RPSD Lock and the RPSD Key have seven LEDs each on their front panels. The following sections explain the meaning of each LED and their various states. RPSD Lock FIGURE B-1 RPSD Lock LEDs The first LED on the left is the red Power light. This indicates that the power is on. This LED should remain lit whenever the RPSD Lock[...]

  • Page 105

    Table B-1 explains the status of the RPSD Lock when the different LEDs are lit. TABLE B-1 RPSD Lock LEDs LED Meaning 1 On On On 2 On Off Off 3 Off On Off 4 Off Off On 5 Off Off Off 6 Off Off Off 7 Off Off Off On Off Off Off On Off Off An incoming call is being processed. The RPSD Lock is ringing the modem. An outgoing call is in progress from the m[...]

  • Page 106

    Table B-2 explains the status of the RPSD Key when the different LEDs are lit. TABLE B-2 RPSD Key LEDs LED Meaning 1 2 3 4 5 6 7 On On Off Off Off Off Off An incoming call is being processed. On Off On Off Off Off Off Should only light when it blinks on power-up. On Off Off On Off Off Off An outgoing call is in progress from the modem. On Off Off O[...]

  • Page 107

    Index F A AC outlet, 2-3 Access failure messages, 3-3, 4-2, 5-3 RPSD Key, 4-1, 4-2 Access history command, 3-20 screen explained, 3-20 Add user command, 3-7 Administration printer connection, 2-9 location, 2-4 EIA-RS232 limitations, 2-4 reason to have one, 2-5 requirements, 2-9 set link speed, 2-4 Administration terminal connection, 2-9 location, 2[...]

  • Page 108

    L Last call status test, 4-2, 5-7, 5-8 procedure, 5-8 List Commands, statistics, 3-23 user information, 4-5 user table, 3-11 Log history command, 3-18 M Modem ring test, 5-7, 5-9 procedure, 5-9 Modems, 2-9 location on PBX, 2-12 N National Parts Sales Center (NPSC), 5-11 telephone number, 5-11 P PBXs RPSD Lock connection, 2-8 supported, 2-8 Power Fa[...]

  • Page 109

    Set communications parameters command, 3-27 status display command, 3-22 test user command, 3-10 unblock user command, 3-9 user restrictions command, 3-17 Remove user command, 3-10 Replacing the Lock or Key for customers to, 5-11 for technicians to, 5-11 Reset statistics command, 3-24 Room layout and environment, 2-3 multiple Lock temperature consi[...]