COMSPHERE 6700 SERIES NETWORK MANAGEMENT SYSTEM

Size: px
Start display at page:

Download "COMSPHERE 6700 SERIES NETWORK MANAGEMENT SYSTEM"

Transcription

1 COMSPHERE 6700 SERIES NETWORK MANAGEMENT SYSTEM SECURITY MANAGER FEATURE SUPPLEMENT Document No A2-GB41-30 February 1998

2 Copyright 1998 Paradyne Corporation. All rights reserved. Printed in U.S.A. Notice This publication is protected by federal copyright law. No part of this publication may be copied or distributed, transmitted, transcribed, stored in a retrieval system, or translated into any human or computer language in any form or by any means, electronic, mechanical, magnetic, manual or otherwise, or disclosed to third parties without the express written permission of Paradyne Corporation, th Ave. N., Largo, FL Paradyne Corporation makes no representation or warranties with respect to the contents hereof and specifically disclaims any implied warranties of merchantability or fitness for a particular purpose. Further, Paradyne Corporation reserves the right to revise this publication and to make changes from time to time in the contents hereof without obligation of Paradyne Corporation to notify any person of such revision or changes. Changes and enhancements to the product and to the information herein will be documented and issued as a new release to this manual. Warranty, Sales, and Service Information Contact your local sales representative, service representative, or distributor directly for any help needed. For additional information concerning warranty, sales, service, repair, installation, documentation, training, distributor locations, or Paradyne worldwide office locations, use one of the following methods: Via the Internet: Visit the Paradyne World Wide Web site at Via Telephone: Call our automated call system to receive current information via fax or to speak with a company representative. Within the U.S.A., call Outside the U.S.A., call Trademarks All products and services mentioned herein are the trademarks, service marks, registered trademarks or registered service marks of their respective owners. Printed on recycled paper A February A2-GB41-30

3 Important Information Important Safety Instructions 1. Read and follow all warning notices and instructions marked on the product or included in the manual. 2. General purpose cables are provided with this product. Special cables, which may be required by the regulatory inspection authority for the installation site, are the responsibility of the customer. 3. When installed in the final configuration, the product must comply with the applicable Safety Standards and regulatory requirements of the country in which it is installed. If necessary, consult with the appropriate regulatory agencies and inspection authorities to ensure compliance. B

4 Contents About This Guide Document Purpose and Intended Audience iii Document Summary iii Product-Related Documents iv 1 Introduction Overview Software Description Customer-Supplied Equipment Network Configuration Overview Configuring the Network Elements Configuring a Contact List Configuring a Device Group Configuring the Network Alerts Configuring Event Controls for Call Security Configuring System Attributes and Options Setting System Options Defining NMS Users Defining System Colors Configuring Call Security Defining VF Passwords Using Security Control Command Option Window Print i

5 Contents 3 Displays Overview Event Monitor Action Reset Security Table Clear Event Disconnect Device Busy Out/Remove Busy Out Device Download Security Table Confirmation Required Sort Security Name Device Name Event Time Event Priority Include Control Info Reports Overview Configuration Contact Device Groups VF Security Event Control Priorities Report Event History Glossary Index ii February A2-GB41-30

6 About This Guide Document Purpose and Intended Audience This supplement describes how to use the COMSPHERE 6700 Series Network Management System (NMS) Security Manager feature. It is assumed that you have a basic understanding of modems and their operation, that you are knowledgeable about data communications, that you are familiar with Windows terminology and conventions, and that you have installed and can operate the COMSPHERE 6700 Series NMS software. Document Summary Section Chapter 1 Chapter 2 Chapter 3 Chapter 4 Glossary Index Description Introduction. Provides an overview of the Security Manager feature. Network Configuration. Provides information about the changes to configuration with the Security Manager feature. Displays. Provides information on changes to Displays with the Security Manager feature. Reports. Provides information on changes to Reports with the Security Manager feature. Defines acronyms and terms used in this document. Lists key terms, acronyms, concepts, and sections in alphabetical order. iii

7 About This Guide Product-Related Documents Document Number 3000-A2-GA31 Document Title COMSPHERE 3000 Series Carrier, Installation Manual 3810-A2-GB30 COMSPHERE 3800 Series Modems, Models 3810, 3811, and 3820, User s Guide 6700-A2-GY31 COMSPHERE 6700 Series Network Management System, User s Guide Contact your sales or service representative to order additional product documentation. Paradyne documents are also available on the World Wide Web at: Select Service & Support Technical Manuals iv February A2-GB41-30

8 Introduction 1 Overview The Security Manager feature is an enhancement to the COMSPHERE 6700 Series Network Management System (NMS) which supports the call security features of the COMSPHERE 2400 Series and COMSPHERE 3800 Series devices. The 6700 Series NMS is described in the COMSPHERE 6700 Series Network Management System User s Guide. This supplement is designed to be used in conjunction with the User s Guide. The changes and additions to the basic NMS software product are described in this supplement in the same logical flow as in the User s Guide, e.g., applicable chapter titles are the same in both manuals. For ease of use, repetition of information between manuals has been kept to a minimum. Therefore, it is suggested that you have the User s Guide available when referencing this supplement. Software Description The Security Manager feature is designed to be used in conjunction with NMS and the call security features of the 2400 Series and 3800 Series devices. The Security Manager feature provides the following functionality enhancements to the 2400 Series and 3800 Series devices call security features: A new 2400/3800 Series device alert, Access Security Alarm. This alert is generated by the device and can appear on any display that shows device alerts. New call failure status codes supported in call statistics. Calls monitored for security violations. Additional security for login ID and time of day access verification. Creation and maintenance of a security database within each device. Download of the security database to the devices. Recording to an event history file. 1-1

9 Introduction The Security Manager is used to perform the following functions to configure a 2400/3800 Series device for security use: Configuring security event priorities and actions. Configuring all Voice Frequency (VF) passwords used by 2400/ 3800 Series devices. Configuring all login IDs and passwords used by 2400/3800 Series devices. Configuring device security groups to link login passwords and VF passwords with selected 2400/3800 Series devices. Configuring 2400/3800 Series devices security options, such as prompts. Downloading of login and VF passwords to 2400/3800 Series devices. The following dial access procedure is an example of how the Security Manager feature works in conjunction with a 2400/3800 Series device: 1. A remote device is commanded to dial a local 2400/3800 Series device. The dial command used contains a VF password, such as ATD W , which causes the remote device to dial and wait for a dial tone. 2. The local 2400/3800 Series device answers the call and responds with a dial tone. 3. The remote device receives the dial tone and then dials (the VF password). 4. The local 2400/3800 Series device verifies the VF password using Dual Tone Multi-Frequency (DTMF) tones against its internal password table. If the password is invalid, the device disconnects the line and a disconnect message is sent to the Security Manager. If the password is valid, the local 3800 Series device trains up with the remote device. 5. The VF password used contains a flag indicating whether an additional login/password sequence must be performed. If no additional sequence is required, then the local 2400/3800 Series device allows the remote device to access the Data Terminal Equipment (DTE) connection and send a connect message to the Security Manager. If an additional sequence is required: The local 2400/3800 Series device prompts the remote device (through the remote device s terminal or computer) for User ID, if this function is enabled via a device option. The remote device s user enters a login ID. The local 2400/3800 Series device receives the login ID and then prompts for a login ID password. 1-2 February A2-GB41-30

10 Introduction The local 2400/3800 Series device receives the login ID password and verifies it with its internal password table. Up to five attempts to enter a password can be made, after which the local device will disconnect and send a message to the Security Manager. If the VF and DTE passwords match, you only have one attempt to enter it before the device is disconnected. 6. When the Security Manager receives a connect message containing call security information from the local 2400/3800 Series device, the call security information is added to the event history file and the VF login ID and password reported by the device are verified. If any of the following occur, an event is registered with the Security Manager: The login ID is invalid. The password is invalid for the login ID. The login ID is not allowed to access the Security Manager at this time of day. 7. When the local 2400/3800 Series device sends a disconnect message containing call security information to the Security Manager: The call security information is added to the event history file. An internal event is generated to the Security Manager. 8. When the Security Manager generates an internal event: The event control record is checked to determine the event s priority and what action should be taken (e.g., busy out the local device, disconnect the local device, take no action, etc.). Any automatic action taken is logged to the event history file. All applications sensitive to security events will be notified and will update their displays. Customer-Supplied Equipment The following list contains recommended enhancements to your PC environment to adequately support the Security Manager feature: COMSPHERE 6700 NMS Software, Release or greater is installed. COMSPHERE 3800 Series Firmware, Release A or greater is installed. 1-3

11 2 Overview This chapter describes several additional network elements that you must configure when you have the Security Manager feature. These elements are: Event Control VF Passwords Security Control In addition, there are changes to the following network elements for the Call Security feature: Contact List Device Groups Network Alerts System Attributes and Options When you are ready to set up security for your network, select Config from the Main Menu. A pull-down menu displays four commands used for network configuration: Network, Alerts and Events, and System, plus the Call Security command which is available with the Security Manager feature. 2-1

12 Configuring the Network Elements The Security Manager feature provides enhancements to the following network elements described in Chapter 4, Configuration, of the COMSPHERE 6700 Series Network Management System User s Guide: Contact List expanded to keep track of security login IDs. Device Group expanded to include device security groups. These enhancements are described in the following sections. Configuring a Contact List To configure a contact list, complete the input form using the following steps: Procedure 1. Select Config from the Main Menu. 2. Choose Network from the Config menu. 3. Choose Contact Lists from the Network cascading menu. The Contact List Configuration input form appears. 2-2 February A2-GB41-30

13 4. Enter the requested data into the fields on the Contact List Configuration input form. 5. Choose Save or one of the other commands from the Action menu (see Table 2-1). Table 2-1. Action Commands (Contact List) (1 of 2) Action Commands Functions Procedures Save Clear Delete Change Contact Name Set Access Time Default Print Stores the contents of the input form to the network database. Use this command for updating or adding device security groups to the database. Removes the current field entries of the input form without affecting the network database. Removes the security group name from the network database. Changes the contact name throughout the network database. Resets the access time default values to those that are currently displayed. Prints the contact list information currently displayed. If Show Passwords is checked, then the password(s) for the contact name is printed. 1. Complete the input form. 2. Choose Save. 1. Choose Clear. 1. Access an existing security group name on the input form. 2. Choose Delete. 1. Access an existing contact list. 2. Choose Change Contact Name. 3. Enter the new contact name in the dialog box. 4. Choose OK. 1. Access an existing contact name on the input form. 2. Change the access times. 3. Choose Set Access Time Default. 1. Access an existing name on the input form. 2. Choose Print, or 1. Complete the input form. 2. Choose Save. 3. Choose Print. 2-3

14 Table 2-1. Action Commands (Contact List) (2 of 2) Action Commands Print All Show Passwords Functions Prints the contact information currently stored in the database. If Show Passwords is checked, then the password(s) for the contact name is printed. Permits the display and/or printing of passwords associated with the contact name. Procedures 1. Access an existing name on the input form. 2. Choose Print All, or 1. Complete the input form. 2. Choose Save. 3. Choose Print All. Select or deselect Show Passwords. A check mark indicates that the option is enabled. In addition to the Contact Name, Address, Telephone, and Comments fields, the Security Manager feature provides the following additional fields: Login ID An optional field (eight characters) that contains the alphanumeric characters (required if the device option is enabled). The login ID must be unique. Entry of a login ID enables the Login Password and Access Times fields, as well as the Security Group/# Passwords list box. Login Password A required field that contains the password required for you to log in to the Security Manager. These characters are displayed as asterisks (***) unless you have selected Show Passwords from the Action menu. If you wish NMS to generate the login password, choose Generate from the Configuration Contact List menu bar to automatically generate a random, 6-character password. Access Times A control used to indicate when the user owning the login ID and password entered is permitted to access the 6700 network. The control shows seven days divided into 24-hour periods. Boxes displayed in light gray indicate that the user who has logged in cannot access the network during those times ( off condition) without causing an Invalid Access Time security event. Times appearing in black indicate an on condition, meaning the user is permitted to access the network during those times. The default value for all times is off. 2-4 February A2-GB41-30

15 To change the valid access times, do one of the following: Click on each box individually (or press the spacebar) to toggle the condition setting. Select a group of time boxes by dragging the mouse to enclose boxes in a selection rectangle (or use the Arrow keys). The box you start dragging from determines the on/off condition of the other boxes selected. Clicking the mouse on the selected boxes (or pressing the spacebar) sets their condition to the opposite of the setting for the time box in the upper left corner within the rectangle. Click on a day of the week name (or press the spacebar) to set the condition for the entire day to the condition selected for the 00 hour. Choose Set Access Time Default from the Action menu to reset the access time default values to those that you have just set on the screen. Security Group/# Passwords This list box displays all security groups with which the contact is associated. Also shown are the number of passwords associated with each security group. To change the security groups listed in this box, select the Security Groups button. The Security Group Selections window appears. 2-5

16 Procedure To add a security group to the Selected Groups list box: 1. Select the group from the All Security Groups list box. 2. Choose the Add button. 3. Choose the OK button to confirm your selection or the Cancel button to cancel the selection. If you chose OK, then this security group is added to the Selected Groups list box and is removed from the All Security Groups list box, and appears on the Contact List input form on page Choose Save to save your selection. Procedure To remove a security group from the Selected Groups list box: 1. Select the group from the Selected Groups list box. 2. Choose the Remove button. 3. Choose the OK button to confirm your selection or the Cancel button to cancel the selection. If you chose OK, then this security group is removed from the Selected Groups list box and appears in the All Security Groups list box and on the Contact List input form on page Choose Save to save your selection. Configuring a Device Group A device group is a user-defined category that identifies a set of devices. The Device Groups command allows you to create, change, delete, or print device group configuration information. The Security Manager feature expands this function to provide the logical link between a group of devices and a list of security passwords. Using the device security group makes it easier to configure more than one device with exactly the same set of passwords and security options. NOTE: A device can be a member of only one security group at any one time. To create or change device group configuration, complete the Device Groups Configuration input form by entering information in the appropriate fields. Procedure To configure a device group, complete the input form by using the following steps: 1. Select Config from the Main Menu. 2. Choose Network from the Config menu. 3. Choose Device Groups from the Network cascading menu. The Device Groups Configuration input form appears. 2-6 February A2-GB41-30

17 4. Enter the information requested into the form. Use the commands from the Action menu to complete configuration. Use the Download menu to download all passwords and security modes assigned to the group name to the devices. If specific devices are selected, then the download only affects these devices. If no devices are selected, then the download affects the all of the devices in the group. In addition to the fields listed to configure a device group, use the following procedure to complete the Device Groups Configuration input form when configuring a device security group: Procedure 1. If the group listed in the Group Name field is a security group, place a check in the Security Group box. This enables the Security Passwords in Group box, the Answer Security Mode box, the Auto Dialer Security box, and the Reporting Modes box, as well as the Download menu item. 2. Choose Show Passwords from the Action menu if you want passwords to be displayed and/or printed. 3. View the Security Passwords in Group box to see the list of all VF (shown in italics) and DTE password names associated with the security group. This includes the maximum number of passwords that can be associated with this security group (standalone devices can have a maximum of 20 passwords, carrier devices can have a maximum of 3000 passwords). Two bold entries listed in the same line indicate that the VF and DTE passwords match. To add or remove passwords in this list, choose Passwords. The Select Groups Passwords window appears. 2-7

18 4. To add VF and/or DTE passwords to the selected passwords list, select the appropriate VF/DTE passwords and choose Add. To remove passwords from the selected passwords list, select the appropriate VF/DTE passwords and choose Remove. If the VF and DTE passwords match, both entries must be selected. In either case, choosing OK confirms your selection, while choosing Cancel closes the selection dialog box without making any changes. 5. To control which passwords will be required by the devices in the security group when an incoming call is answered, use the Answer Security Mode box. Disabled indicates that inbound security is disabled. DTE Only indicates that the modem requires the call originator to provide a DTE login password. VF and DTE indicates that both VF and DTE passwords are required by the devices in the security group. VF with Matching DTE indicates that a specific VF will always require a specific DTE. The entries cannot be mismatched. When VF with matching DTE is in effect, you must select a VF entry and its matching DTE entry from the All Available Password list boxes and add them to the Selected Passwords list box. Both entries will be displayed on the same line in bold in the Selected Passwords and Security Passwords in Group list boxes. The appropriate device option must be enabled before the device will prompt the user for a login ID. 6. To control access to the dialers for all devices in the security group, use the Auto Dialer Security box. If Enabled, the modem requires the call originator to issue a special command to enable the dial command to enable the dial command before this command can be issued. If Disabled, dial commands can be issued without restriction. 2-8 February A2-GB41-30

19 7. To have failed calls reported to the Security Manager, check the Call Failure box (this is the default). 8. To have successful calls reported to the Security Manager, check the Call Success box (this is the default). 9. Choose Save or one of the other commands from the Action menu (see Table 2-2). 10. Choose Download from the Device Groups menu bar to download all passwords and/or security modes assigned to the security group identified in the Group Name field. To download to selected devices in a security group, select those devices from the Devices in Group box. To download to all devices in the security group, do not select any specific devices. The download is limited to those devices in the security group with the security feature installed. NOTE: A download busies-out all selected devices that are currently idle. All devices that are connected at the time that a download is requested are downloaded without interrupting primary data. The busy-out condition is removed after the download is completed. Table 2-2. Action Commands (Device Security Groups) (1 of 2) Action Commands Functions Procedures Save Delete Change Print Stores the contents of the input form to the network database. Use this command for updating or adding device security groups to the database. Removes the security group name from the network database. Changes the security group name throughout the network database. Prints the security group information currently displayed. If Show Passwords is checked, then the password(s) for the security group name is printed. 1. Complete the input form. 2. Choose Save. 1. Access an existing security group name on the input form. 2. Choose Delete. 1. Access an existing security group name on the input form. 2. Choose Change. 3. Enter the new security group name in the dialog box. 4. Choose OK. 1. Access an existing name on the input form. 2. Choose Print, or 1. Complete the input form. 2. Choose Save. 3. Choose Print. 2-9

20 Table 2-2. Action Commands (Device Security Groups) (2 of 2) Action Commands Print All Show Passwords Functions Prints the security group information currently stored in the database. If Show Passwords is checked, then the password(s) for the security groups are printed. Permits the display and/or printing of passwords associated with security groups. Procedures 1. Access an existing name on the input form. 2. Choose Print All, or 1. Complete the input form. 2. Choose Save. 3. Choose Print All. 1. Select or deselect Show Passwords. A check mark indicates that the option is enabled. Configuring the Network Alerts To define the device alerts and security events that the network will monitor, select Config from the Main Menu and then Choose Alerts and Events. The Security Manager feature adds the new device alert Access Security to the existing alert controls for device and model. This alert indicates that a user has successfully logged into the Security feature of a device by using its front panel. This alert can only be cleared by the user. In addition, the Event Controls Call Security function is added February A2-GB41-30

21 Configuring Event Controls for Call Security The event control function enables you to control what actions are initiated by the Security Manager and the priority level assigned to the call security events. Table 2-3 describes each security event and their default values. Table 2-3. Call Security Event Descriptions (1 of 2) Event Description Event Definition Event Source Event Duration Event Priority Auto Actions VF Login OK User Login OK User Login Rejected: 3 Retries Failed User Login Rejected: Password Time Out User Login Aborted: Line Disconnected VF Login Rejected: Password Invalid VF Login Rejected: Password Time Out VF Login Aborted: Line Disconnected A remote user has gained access using a valid node password. A remote user has gained access using a valid security password. A remote user has attempted access and did not enter a valid security password in three attempts. A remote user has attempted access but did not enter a security password before the time-out period expired. A remote user has attempted access but the connection was dropped before the user entered a security password. A remote user has attempted access using an invalid node password. A remote user has attempted access but did not enter a node password before the time-out period expired. A remote user as attempted access but the connection was dropped before the user entered a node password. Modem Duration No Event None Modem Duration No Event None Modem Duration Minor None Modem Duration Minor None Modem Duration Major None Modem Duration Major None Modem Duration Minor None Modem Duration Major None User Login OK: Multiple Password Retries A remote user has gained access using a valid security password, but multiple attempts were required to enter a valid password. Security Manager Duration Major None Login ID and Password Combination Invalid A remote user has gained access using a valid security password, but the valid login ID entered is not valid for the security password entered. Security Manager Duration Critical Disconnect Invalid Login ID, Password Valid for Device A remote user has gained access using a valid security password, but the login ID entered is not valid. Security Manager Duration Critical Disconnect Invalid Access Time A remote user has gained access using a valid security password, but the access time is not valid. Security Manager Duration Critical Disconnect 2-11

22 Table 2-3. Call Security Event Descriptions (2 of 2) Event Description Event Definition Event Source Event Duration Event Priority Auto Actions User Login Hack. Multiple Sequential Password Retries A remote user has gained access using a valid security password, but to do so required entry of multiple passwords, each separated by a numeric value of one. Security Manager Until Cleared by Operator Critical Busy Out Device Security Table Invalid The security password table maintained by the device is invalid and must be downloaded. Security Manager Duration Critical None Security Download in Progress The security password table for the device indicated is being downloaded. Security Manager Duration Minor None Security Download Failed The security password download has failed. The system has tried to perform the download three times prior to this event. Security Manager Until Download Started or Device Deleted Critical Reset & Busy Out Front Panel Modification A user has made changes to the modem security via the front panel. Modem Duration Critical None Make Busy Mode The device is currently busied out. This may have been done by the Security Manager. Device Duration As per Alert Controls None 2-12 February A2-GB41-30

23 Procedure To change the security event default values: 1. Select Config from the Main Menu. 2. Choose Alerts and Events from the Config menu. 3. Choose Event Controls Call Security from the Alerts and Events cascading menu. The Event Controls Call Security window appears. 4. Select the priority (Critical, Major, Minor, or No Event) for each event. Your selection determines sort order and differentiates the severity of the event by color. 5. Select the automatic action to be taken by the Security Manager. Table 2-4 lists the auto actions available. 6. Choose Save or one of the other commands from the Action menu. Action commands for events are the same as those for alerts. Refer to the COMSPHERE 6700 Series Network Management System User s Guide. Table 2-4. Event Control Security Manager Auto Actions Auto Action Description Busy Out The Security Manager commands the reporting device to disconnect the telephone connection, then go into a busy out state. Download The device is busied out and its security table is downloaded. Only valid for the Device Security Table Invalid event. Disconnect The Security Manager commands the reporting device to disconnect the telephone connection. Ignore The event will be ignored by the NMS. None Reset The Security Manager will take no automatic action. The device is busied out and all of its security table assignments are cleared. 2-13

24 Configuring System Attributes and Options To configure the system attributes and options, choose Config from the Main Menu and then choose System. This menu allows you to define the operational criteria for NMS. The Security Manager feature provides the additional operation criterion, Collect Event History. The Collect Event History system option enables you to control the purging of the call event history. Setting System Options The System Options input form is shown below. Select the check box to the left of the Collect Event History field, then make your selection in the number range field. Collect Event History Select the check box if you want NMS to record all security events in an event history file. The event history can then be displayed or printed via the Event History Report. Use the number range field to select the number of days to keep active history records (Default = 30 days). Defining NMS Users User Profile commands allow you to define the NMS users and their system privileges. A user who has the User Profile privilege can assign or change User IDs, passwords, and system privileges for all other users on NMS. The Security Manager provides an additional privilege, Call Security. Users without the User Profile privilege can change only their own User ID, password, and comments February A2-GB41-30

25 The User Profile Configuration input form is shown below. Select the check box before the Call Security field. Call Security A Security Manager privilege that allows you to change NMS call security parameters and to cause these changes to occur in devices. If the check box is not selected, you are limited to displaying call security information; you cannot change it. Defining System Colors The Security Manager feature adds a new color group for security events. System colors are used to distinguish event priorities. The default colors are listed in Table 2-5. Table 2-5. Event Priorities System Colors Group Color Group Elements Default Colors Events Cyan Gray (light) Green 2-15

26 Configuring Call Security Call Security enables you to define VF Passwords and to control the operation of the NMS security features. Defining VF Passwords You can require that the COMSPHERE 2400 Series and 3800 Series devices receive a valid password before training. This is a VF password which is a series of DTMF signals, generated by either a telephone or by adding a password to the end of a dial command to the calling modem. A device uses this VF password to verify that the remote calling device is permitted access. To create VF passwords, complete the Call Security VF Passwords input form and use the Action commands (see Table 2-6). Table 2-6. Action Commands (VF Passwords) Action Commands Functions Procedures Save Stores the contents of the input form to the network database. Use this command for updating or adding VF password names to the 1. Complete the input form. 2. Choose Save. database. Delete Removes the VF Password name and all associations from the network database. 1. Access an existing VF Password name on the input form. 2. Choose Delete. Clear Removes the current field entries of the input form without affecting the network database. 1. Choose Clear. Change VF Password Name Print Print All Show Passwords Changes the VF Password name throughout the network database. Prints the VF Password name information currently displayed. If Show Passwords is checked, then the password(s) for the VF Password name is printed. Prints the VF Password information currently displayed. If Show Passwords is checked, then the password(s) for the VF Password name is printed. Permits the display and/or printing of passwords associated with VF Password names. 1. Access an existing VF Password name on the input form. 2. Choose Change. 3. Enter the new VF Password name in the dialog box. 4. Choose OK. 1. Access an existing name on the input form. 2. Choose Print, or 1. Complete the input form. 2. Choose Save. 3. Choose Print. 1. Access an existing name on the input form. 2. Choose Print All, or 1. Complete the input form. 2. Choose Save. 3. Choose Print All. 1. Select or deselect Show Passwords. A check mark indicates that the option is enabled February A2-GB41-30

27 Procedure To define VF Passwords: 1. Select Config from the Main Menu. 2. Choose Call Security from the Config menu. 3. Choose VF Passwords from the Call Security menu. The VF Passwords input form appears. 4. Enter the information in the fields on the VF Passwords input form by either: Using the selection list button to the right of the field to access existing field entries, or Typing the information in the field, then pressing Tab. For the VF Password field only, you can choose Generate from the VF Passwords menu to automatically generate an 8-digit password. Field VF Name VF Password Comments Access Type Description A label (eight characters maximum) that is unique to the network and used to identify the VF Password. A password (eight digits maximum) that is unique to the network and used to allow the remote device to gain access to the training sequence of a local device. Must be a DTMF signal. An optional field for additional VF Password name information (maximum 40 characters). An optional field that indicates any additional security that is necessary when the VF Password is used. Select one of the following: VF Only Select this option to require only the VF password from the remote device to gain access to the DTE side of the local device. User Login Select this option to require a valid security login password from the remote device in addition to the VF password to gain access to the DTE side of the local device. 2-17

28 The list of security groups associated with the VF password, along with the number of VF and login passwords assigned to each group, displays in the lower portion of the VF Passwords input form. NOTE: Do not use alpha or special characters in the VF Password field. 5. To add or remove devices from the list of selected security groups displayed, choose the Security Groups button. The Security Group Selections window appears. 6. Select the desired security group, then choose either Add or Remove. Choose OK to change the list of selected security groups displayed on the VF Passwords input form. Procedure To add a security group to the Selected Groups list box: 1. Select the group from the All Security Groups list box. 2. Choose the Add button. 3. Choose the OK button to confirm your selection or the Cancel button to cancel the selection. If you chose OK, then this security group is added to the Selected Groups list box and is removed from the All Security Groups list box, and appears on the Contact List input form on page Choose Save to save your selection February A2-GB41-30

29 Procedure To remove a security group from the Selected Groups list box: 1. Select the group from the Selected Groups list box. 2. Choose the Remove button. 3. Choose the OK button to confirm your selection or the Cancel button to cancel the selection. If you chose OK, then this security group is removed from the Selected Groups list box and appears in the All Security Groups list box and on the Contact List input form on page Choose Save to save your selection. Using Security Control Security Control allows you to perform the following functions: Reset the security table Display and change security prompt strings Download the security table Display and change the administrative password Procedure To use Security Control: 1. Select Config from the Main Menu. 2. Choose Call Security from the Config menu. 3. Choose Control from the Call Security menu. The Security Control menu items are visible in the menu bar. The following is a list of the Security Control menu commands with a brief description of each. Command Allows you to execute commands to control the operation of security functions for NMS. Option Enables you to control the display of passwords and to request the display of a confirmation box. Window Allows for changing the method of displaying windows opened from the Security Control window or closing all the windows opened from the current Security Control window. Print Prints the current Security Control window and all windows opened from it. 2-19

30 Command Select Command from the Security Control menu bar and the Command pull-down menu appears. Use Command to control the security functions available through the Security Manager feature. These commands only apply to devices in security groups with the Security feature installed. CAUTION: If the device requires password access, resetting its security password table prevents incoming calls to that device and resets the administrative password to its system default value. Reset Security Table Choose Reset Security Table from the Command pull-down menu to clear the security password table for one or more devices. The Reset Security Table window displays the names of all the devices selected for the Reset Security Table command (default is global selection list). Choose Devices to select different devices to appear on the list. Choose Execute to reset the security table for each device in the selection list February A2-GB41-30

31 Security Prompt Strings Choose Security Prompt Strings from the Command pull-down menu to display and/or change prompts and messages related to the login ID and password access for selected devices. The Security Prompt Strings window displays security prompt strings for selected devices. Device List The device names selected to receive the new security prompt strings. ID Prompt Used to query for the user s login ID (32 characters maximum). Password Prompt Used to query for the user s login password (32 characters maximum). Verifying Message The message to be displayed while the device is verifying the login password (32 characters maximum). 2-21

32 Access Granted Message The message displayed when the user is granted access to the device s DTE connection (32 characters maximum). To change the devices selected as displayed in the Device List box, choose Devices, then make your selection from the displayed dialog box. To read the security prompts from the selected device(s) and display these values on the Security Prompt Strings window, select a device from the Device List box and choose Display. To change the security prompts for the selected device(s) to the values displayed on the Security Prompt Strings window, select device(s) from the Device List box and choose Change. NOTE: When entering data into the ID Prompt, Password Prompt, Verifying Message, and Access Granted Message fields, be sure to include any appropriate carriage returns and line feeds. To do this, use a backslash (\) followed by the hexadecimal value for the character (0A for line feed or 0D for carriage return). For example, type 0A\0D Enter Password \0A\0D to have the prompt Enter Password appear on a line by itself. Administrative Password Choose Administrative Password from the Command pull-down menu to display and/or change the password for selected device(s). This is the password the modem requires before permitting a user to access security functions from the modem s front panel. The Administrative Password window displays the names of all the devices selected for the new administrative password (default is global selection list). Choose Devices to select different devices to appear on the list. Choose Display to show the password for the selected device in the 8-digit Password field. Choose Change to update the password for selected device(s) to the one displayed in the Password field February A2-GB41-30

33 Download Security Table Choose Download Security Table from the Command pull-down menu to download the security table to one or more devices. The Download Security Table window displays the names of all the devices selected for the Download Security Table command (default is global selection list). Choose Devices to select different devices to appear on the list. Choose Execute to download the security table for each device in the selection list. This process consists of a broadcast message to all selected devices and could take as long as several minutes. NOTE: A download busies-out all selected devices that are currently idle. All devices that are connected at the time that a download is requested are downloaded without interrupting primary data. The busy-out condition is removed after the download is completed. 2-23

34 Option Select Option from the Security Control menu bar and the Option pull-down menu appears. Use Option to request a confirmation box to verify that requested changes are to be implemented and to control the display of passwords. Confirmation Choose Confirmation from the Option menu to request that a confirmation box be shown before any changes are made to a device. A check mark next to Confirmation indicates that the box is enabled. This is a toggle function. Show Password Choose Show Password from the Option menu to allow the display of passwords. A check mark next to Show Passwords indicates that the display of passwords is allowed. This is a toggle function. Window Choose Window from the Security Control menu bar to change how Security Control windows are displayed or to close all the open Security Control windows. Choosing Window causes a drop-down menu to appear listing the commands Tile, Cascade, Arrange Icons, and Close All. The Window commands only affect the windows or icons opened from the same Security Control window. If two or more Security Control windows are open, the Window commands only operate on the windows opened from the current Security Control window. The windows opened from the current Security Control window are listed below the last command. A check mark indicates the active window. To change the active window, select the window name from the list February A2-GB41-30

35 Tile Choose Tile from the pull-down menu to have the windows arranged in a side-by-side manner. This allows viewing of several windows simultaneously (side-by-side) with the disadvantage that each window is smaller than if they were displayed on top of each other. The following shows three Security Control windows displayed in the tile fashion. Cascade Choose Cascade from the pull-down menu to have windows arranged in a stacked fashion while allowing the upper and left side of each window to remain in view. This permits viewing of the primary window, in a larger size than Tile, and makes changing from one window to another easier than if they were displayed directly on top of each other. The following shows three Security Control windows displayed in the cascade fashion. 2-25

36 Arrange Icons Choose Arrange Icons from the pull-down menu to display any icons along the lower portion of the window. Close All Choose Close All from the pull-down menu to close all the windows called from the current Security Control menu. Print Choose Print from the Security Control menu to print the current Security Control window and all windows opened from it. See the COMSPHERE 6700 Series Network Management System User s Guide for additional information on using printers February A2-GB41-30

37 Displays 3 Overview This chapter describes the Event Monitor command that is provided by the Security Manager feature. This command is accessed from the Displays menu and is an additional way to monitor the condition of your network. Event Monitor Event Monitor commands allow you to view all the current events related to call security. The displayed events can be sorted by security ID, device name, event time, or event description. From the Event Monitor window, you can control displayed events, display security control or information windows, and limit the events displayed by priority level. Select Event Monitor from the Displays pull-down menu. The Event Monitor window appears with the menus Action, Sort, Include, Control, Info and a listing of the current events reported by the Security Manager. Each listing uses five fields of information containing the security ID, device name, event time, event description, and automatic action taken. 3-1

38 Displays Action Select Action from the Event Monitor menu bar to access the Action pull-down menu. The Action menu is inactive (gray) unless an event is selected. Use the Action pull-down menu commands to perform the following functions: Reset Security Table Clear Event Disconnect Device Busy Out Device Download Security Table Confirmation Required Reset Security Table Choose Reset Security Table from the Action pull-down menu to reset the security table in the selected device, then cause the device to be busied-out. The device s security table is cleared, preventing dial-in access when the device is configured to require password verification. This creates a security event, indicating to the Security Manager that the device requires a security table download. If you do not have security privileges, this menu item is inactive (gray). Clear Event Choose Clear Event from the Action pull-down menu to delete the selected events from the Event Monitor window. If you do not have security privileges, this menu item is inactive (gray). 3-2 February A2-GB41-30

39 Displays Disconnect Device Choose Disconnect Device from the Action pull-down menu to command the device to disconnect the telephone connection. The selected event is removed from the Event Monitor window. If you do not have security privileges, this menu item is inactive (gray). Busy Out/Remove Busy Out Device Choose Busy Out Device from the Action pull-down menu to either busy out the device or choose Remove Busy Out to remove this condition. If you do not have security privileges, this menu item is inactive (gray). Download Security Table Choose Download Security Table from the Action pull-down menu to busy out the device, then download a security table. You must select a Device Security Table Invalid event to enable this command. If you do not have security privileges, this menu item is inactive (gray). NOTE: A download busies-out all selected devices that are currently idle. All devices that are connected at the time that a download is requested are downloaded without interrupting primary data. The busy-out condition is removed after the download is completed. Confirmation Required Choose Confirmation Required from the Action pull-down menu to request a that confirmation box display for all Action menu commands. A check mark displays next to this menu item when the confirmation box is enabled. 3-3

COMSPHERE 6700 SERIES NETWORK MANAGEMENT SYSTEM REMOTE MONITOR FEATURE

COMSPHERE 6700 SERIES NETWORK MANAGEMENT SYSTEM REMOTE MONITOR FEATURE COMSPHERE 6700 SERIES NETWORK MANAGEMENT SYSTEM REMOTE MONITOR FEATURE USER S GUIDE Document No. 6700-A2-GB23-10 October 1998 Copyright 1998 Paradyne Corporation. All rights reserved. Printed in U.S.A.

More information

OPENLANE PERFORMANCE WIZARD

OPENLANE PERFORMANCE WIZARD OPENLANE PERFORMANCE WIZARD USER S GUIDE Document No. 7800-A2-GB28-50 October 1998 Copyright 1998 Paradyne Corporation. All rights reserved. Printed in U.S.A. Notice This publication is protected by federal

More information

1. Make sure that no client accounts are open. 2. Click on Setup, then click Modem. The Modem Setup window will appear.

1. Make sure that no client accounts are open. 2. Click on Setup, then click Modem. The Modem Setup window will appear. SECURITY SYSTEM MANAGEMENT SOFTWARE FOR WINDOWS WINLOAD MODEM SETUP The modem setup is a very important step in the connection process. If the modem setup is not properly completed communication between

More information

NETWORK PRINT MONITOR User Guide

NETWORK PRINT MONITOR User Guide NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Personal Call Manager User Guide. BCM Business Communications Manager

Personal Call Manager User Guide. BCM Business Communications Manager Personal Call Manager User Guide BCM Business Communications Manager Document Status: Standard Document Version: 04.01 Document Number: NN40010-104 Date: August 2008 Copyright Nortel Networks 2005 2008

More information

Getting Started with IntelleView POS Administrator Software

Getting Started with IntelleView POS Administrator Software Getting Started with IntelleView POS Administrator Software Administrator s Guide for Software Version 1.2 About this Guide This administrator s guide explains how to start using your IntelleView POS (IntelleView)

More information

ShoreTel Enterprise Contact Center 8 Using Agent Toolbar

ShoreTel Enterprise Contact Center 8 Using Agent Toolbar ShoreTel Enterprise Contact Center 8 Using Agent Toolbar November 2012 Legal Notices Document and Software Copyrights Copyright 1998-2012 by ShoreTel Inc., Sunnyvale, California, USA. All rights reserved.

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

ShoreTel Enterprise Contact Center Using Agent Toolbar

ShoreTel Enterprise Contact Center Using Agent Toolbar ShoreTel Enterprise Contact Center Using Agent Toolbar USER GUIDES RELEASE 7 Document and Software Copyrights Copyright 1998 2011 ShoreTel, Inc. All rights reserved. Printed in the United States of America.

More information

ShoreTel Contact Center Using ShoreWare Agent Toolbar

ShoreTel Contact Center Using ShoreWare Agent Toolbar ShoreTel Contact Center Using ShoreWare Agent Toolbar USER GUIDES RELEASE 6 Document and Software Copyrights Copyright 1998 2010 ShoreTel, Inc. All rights reserved. Printed in the United States of America.

More information

InfoPrint 4247 Serial Matrix Printers. Remote Printer Management Utility For InfoPrint Serial Matrix Printers

InfoPrint 4247 Serial Matrix Printers. Remote Printer Management Utility For InfoPrint Serial Matrix Printers InfoPrint 4247 Serial Matrix Printers Remote Printer Management Utility For InfoPrint Serial Matrix Printers Note: Before using this information and the product it supports, read the information in Notices

More information

Data Retrieval. Chapter III. In This Chapter

Data Retrieval. Chapter III. In This Chapter Chapter III. Data Retrieval In This Chapter This chapter gives you instructions for setting up and using TradingExpert Pro s automatic data retrieval system which is used for downloading end-of-day data

More information

Charter Business Phone. Online Control Panel Getting Started Guide. Document Version 1.0

Charter Business Phone. Online Control Panel Getting Started Guide. Document Version 1.0 Charter Business Phone Online Control Panel Getting Started Guide Document Version 1.0 Table of Contents 1 About This Guide...4 2 Overview...5 2.1 Online Control Panel and Call Manager... 5 3 Manual and

More information

VIP-102B IP Solutions Setup Tool Reference Manual

VIP-102B IP Solutions Setup Tool Reference Manual VIP-102B IP Solutions Setup Tool Reference Manual Table of Contents Overview...5 System Requirements for Managed VoIP Products...6 Term Definitions...7 Main Application Window...8 Legend Description...9

More information

User Guide. SafeNet MobilePASS for Windows Phone

User Guide. SafeNet MobilePASS for Windows Phone SafeNet MobilePASS for Windows Phone User Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information Product

More information

WAMLocal. Wireless Asset Monitoring - Local Food Safety Software. Software Installation and User Guide BA/WAM-L-F

WAMLocal. Wireless Asset Monitoring - Local Food Safety Software. Software Installation and User Guide BA/WAM-L-F Wireless Asset Monitoring - Local Food Safety Software BA/WAM-L-F Software Installation and User Guide System Overview The BAPI Wireless Asset Monitoring Local (WAM Local) Software receives temperature

More information

GUIDE. Web Client Application. Model: ER 4.0. Release 4.0.00 / Version No.: 1.01

GUIDE. Web Client Application. Model: ER 4.0. Release 4.0.00 / Version No.: 1.01 8e6R Enterprise Reporter USER GUIDE Web Client Application Model: ER 4.0 Release 4.0.00 / Version No.: 1.01 ii 8E6 TECHNOLOGIES, ENTERPRISE REPORTER WEB CLIENT USER GUIDE 8E6 ENTERPRISE REPORTER WEB CLIENT

More information

Avaya Network Configuration Manager User Guide

Avaya Network Configuration Manager User Guide Avaya Network Configuration Manager User Guide May 2004 Avaya Network Configuration Manager User Guide Copyright Avaya Inc. 2004 ALL RIGHTS RESERVED The products, specifications, and other technical information

More information

FMC VoIP. User Manual. OfficeServ 7000

FMC VoIP. User Manual. OfficeServ 7000 FMC VoIP User Manual OfficeServ 7000 COPYRIGHT This manual is proprietary to SAMSUNG Electronics Co., Ltd. and is protected by copyright. No information contained herein may be copied, translated, transcribed

More information

Table of Contents GETTING STARTED... 3. Enter Password Dialog...3 Using Online Help...3 System Configuration Menu...4

Table of Contents GETTING STARTED... 3. Enter Password Dialog...3 Using Online Help...3 System Configuration Menu...4 Table of Contents DV2000 Configuration - Service Release 3.0 GETTING STARTED... 3 Enter Password Dialog...3 Using Online Help...3 System Configuration Menu...4 SYSTEM CONFIGURATION OVERVIEW... 5 Using

More information

Protection and Control IED Manager PCM600 Getting Started Guide

Protection and Control IED Manager PCM600 Getting Started Guide Protection and Control IED Manager PCM600 Document ID: 1MRS757866 Issued: 2013-04-11 Revision: A Product version: 2.5 or later Copyright 2013 ABB. All rights reserved Copyright This document and parts

More information

User Manual for Web. Help Desk Authority 9.0

User Manual for Web. Help Desk Authority 9.0 User Manual for Web Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

Dell SonicWALL SRA 7.5 Secure Virtual Meeting and Secure Virtual Assist

Dell SonicWALL SRA 7.5 Secure Virtual Meeting and Secure Virtual Assist Dell SonicWALL SRA 7.5 Secure Virtual Meeting and Secure Virtual Assist Document Scope This document describes how to configure and use the Dell SonicWALL SRA Secure Virtual Meeting feature and the Dell

More information

WE VoIP User Guide For OfficeServ 7000 Series

WE VoIP User Guide For OfficeServ 7000 Series WE VoIP User Guide For OfficeServ 7000 Series WE-VoIP Client V3.5.0.3 WE VoIP User Guide for OfficeServ November 2013 1 Disclaimer Every effort has been made to eliminate errors and ambiguities in the

More information

Accounts Payable Workflow Guide. Version 11.2

Accounts Payable Workflow Guide. Version 11.2 Accounts Payable Workflow Guide Version 11.2 Copyright Information Copyright 2013 Informa Software. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

NEC Express5800 Series NEC ESMPRO AlertManager User's Guide

NEC Express5800 Series NEC ESMPRO AlertManager User's Guide NEC Express5800 Series NEC ESMPRO AlertManager User's Guide 7-2006 ONL-4152aN-COMMON-128-99-0606 PROPRIETARY NOTICE AND LIABILITY DISCLAIMER The information disclosed in this document, including all designs

More information

Eclipse Palm Sales Force Automation. Release 8.6.2 (Eterm)

Eclipse Palm Sales Force Automation. Release 8.6.2 (Eterm) Eclipse Palm Sales Force Automation Release 8.6.2 (Eterm) Legal Notices 2007 Activant Solutions Inc. All rights reserved. Unauthorized reproduction is a violation of applicable laws. Activant and the Activant

More information

A-AUTO 50 for Windows Setup Guide

A-AUTO 50 for Windows Setup Guide A-AUTO 50 for Windows Setup Guide 1st Edition 1 A-AUTO is a registered trade mark of UNIRITA Inc. "This product includes software developed by the Apache Software Foundation (http://www.apache.org/)."

More information

Converge. System Administration Guide. Revision Date: November 2015

Converge. System Administration Guide. Revision Date: November 2015 Converge System Administration Guide Revision Date: November 2015 Two Concourse Parkway, Suite 800, Atlanta, GA 30328 Elavon, Incorporated 2015. All Rights Reserved Converge System Administration Guide

More information

MightyCall Receptionist. Customers s Guide

MightyCall Receptionist. Customers s Guide MightyCall Receptionist Customers s Guide MightyCall Receptionist: Customers s Guide Document version: 5.2.857.0.rev.19012 Copyright 2012 INFRATEL, Inc. This document contains instructions and recommendations

More information

How To Use Freedomvoice On A Cell Phone Or Landline Phone On A Pc Or Mac Or Ipad Or Ipa Or Ipo Or Ipod Or Ipode Or Ipro Or Ipor Or Ipore Or Ipoe Or Ipob Or

How To Use Freedomvoice On A Cell Phone Or Landline Phone On A Pc Or Mac Or Ipad Or Ipa Or Ipo Or Ipod Or Ipode Or Ipro Or Ipor Or Ipore Or Ipoe Or Ipob Or Virtual Phone System User Guide v5.4 169 Saxony Road, Suite 212 Encinitas, CA 92024 Phone & Fax: (800) 477-1477 Welcome! Thank you for choosing FreedomVoice. This User Guide is designed to help you understand

More information

SonicWALL SSL VPN 3.5: Virtual Assist

SonicWALL SSL VPN 3.5: Virtual Assist SonicWALL SSL VPN 3.5: Virtual Assist Document Scope This document describes how to use the SonicWALL Virtual Assist add-on for SonicWALL SSL VPN security appliances. This document contains the following

More information

IPOne Phone System User Interface Guide

IPOne Phone System User Interface Guide IPOne Phone System User Interface Guide DoubleHorn Communications, LLC 1802 W. 6 th Street Austin, TX 78703 Main Office: 512-637-5200 Toll Free: 877-637-HORN (4676) DHC Support: Dial 611 IPOne Phone System

More information

Corporate Telephony Toolbar User Guide

Corporate Telephony Toolbar User Guide Corporate Telephony Toolbar User Guide 1 Table of Contents 1 Introduction...6 1.1 About Corporate Telephony Toolbar... 6 1.2 About This Guide... 6 1.3 Accessing The Toolbar... 6 1.4 First Time Login...

More information

BlackVue Cloud App Overview...3. Getting Started...6. Basic Menu Screens...15. BlackVue Cloud...24. BlackVue Wi-Fi...40. Internal Memory...

BlackVue Cloud App Overview...3. Getting Started...6. Basic Menu Screens...15. BlackVue Cloud...24. BlackVue Wi-Fi...40. Internal Memory... Table of Contents BlackVue Cloud App Overview...3 Key Functions When Cloud is Connected...4 Key Functions When Wi-Fi Connection is Made...4 Key Features of Internal Memory...4 Supported Devices...5 Getting

More information

Sophos SafeGuard File Encryption for Mac Quick startup guide. Product version: 6.1

Sophos SafeGuard File Encryption for Mac Quick startup guide. Product version: 6.1 Sophos SafeGuard File Encryption for Mac Quick startup guide Product version: 6.1 Document date: January 2014 Contents 1 About SafeGuard File Encryption for Mac...3 2 First use...4 3 Working with SafeGuard

More information

NDA-30141 ISSUE 1 STOCK # 200893. CallCenterWorX-Enterprise IMX MAT Quick Reference Guide MAY, 2000. NEC America, Inc.

NDA-30141 ISSUE 1 STOCK # 200893. CallCenterWorX-Enterprise IMX MAT Quick Reference Guide MAY, 2000. NEC America, Inc. NDA-30141 ISSUE 1 STOCK # 200893 CallCenterWorX-Enterprise IMX MAT Quick Reference Guide MAY, 2000 NEC America, Inc. LIABILITY DISCLAIMER NEC America, Inc. reserves the right to change the specifications,

More information

Conference Bridge User Guide P/N 0893416 Rev 1, September 2006 Printed in U.S.A. 5.99

Conference Bridge User Guide P/N 0893416 Rev 1, September 2006 Printed in U.S.A. 5.99 Empowered by Innovation Technical Support Web Site: http://ws1.necii.com (registration is required) Conference Bridge User Guide P/N 0893416 Rev 1, September 2006 Printed in U.S.A. 5.99 This manual has

More information

Real Time Monitor. A Real-Time Windows Operator Interface. DDE Compliant. (for remote data display)

Real Time Monitor. A Real-Time Windows Operator Interface. DDE Compliant. (for remote data display) Real Time Monitor A Real-Time Windows Operator Interface DDE Compliant (for remote data display) TABLE OF CONTENTS 1. INTRODUCTION...1 1.1 INSTALLATION...2 1.2 FIRST START UP - DDE CONFIGURE...2 1.3 AUTO-STARTUP...2

More information

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users Getting Started Getting Started with Time Warner Cable Business Class Voice Manager A Guide for Administrators and Users Table of Contents Table of Contents... 2 How to Use This Guide... 3 Administrators...

More information

Microsoft Dynamics GP. Electronic Signatures

Microsoft Dynamics GP. Electronic Signatures Microsoft Dynamics GP Electronic Signatures Copyright Copyright 2011 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information and views expressed in this document,

More information

Wave 4.5. Wave ViewPoint Mobile 2.0. User Guide

Wave 4.5. Wave ViewPoint Mobile 2.0. User Guide Wave 4.5 Wave ViewPoint Mobile 2.0 User Guide 2014 by Vertical Communications, Inc. All rights reserved. Vertical Communications and the Vertical Communications logo and combinations thereof and Applications

More information

CONFIGURATION MANUAL FILE TRANSFER DAEMON. Version 3.7 - June 2014

CONFIGURATION MANUAL FILE TRANSFER DAEMON. Version 3.7 - June 2014 CONFIGURATION MANUAL FILE TRANSFER DAEMON Version 3.7 - June 2014 CONFIGURATION MANUAL IP2Archive 1.4 File Transfer Daemon 3.7 Copyright EVS Broadcast Equipment SA Copyright 2003-2014. All rights reserved.

More information

End User Configuration

End User Configuration CHAPTER114 The window in Cisco Unified Communications Manager Administration allows the administrator to add, search, display, and maintain information about Cisco Unified Communications Manager end users.

More information

Charter Email. Email Addresses Create / Manage

Charter Email. Email Addresses Create / Manage Charter Email Email Addresses Create / Manage You can create and manage your email addresses from your My Account. If you have not already done so as the primary account holder, you will need to create

More information

MEETINGONE ONLINE ACCOUNT MANAGEMENT PORTAL HOST / ROOM USER GUIDE

MEETINGONE ONLINE ACCOUNT MANAGEMENT PORTAL HOST / ROOM USER GUIDE MEETINGONE ONLINE ACCOUNT MANAGEMENT PORTAL HOST / ROOM USER GUIDE TABLE OF CONTENTS How to Login... 4 Select a Role... 4 Multiple Rooms... 5 Home Tab... 6 Manage Users... 6 Add a New User... 7 Edit an

More information

Merchant Integration Guide

Merchant Integration Guide Merchant Integration Guide Card Not Present Transactions Authorize.Net Customer Support support@authorize.net Authorize.Net LLC 071708 Authorize.Net LLC ( Authorize.Net ) has made efforts to ensure the

More information

USER MANUAL APPLICATION MONITOR. Version 1.5 - March 2015

USER MANUAL APPLICATION MONITOR. Version 1.5 - March 2015 USER MANUAL APPLICATION MONITOR Version 1.5 - March 2015 USER MANUAL IP2Archive 1.5 Application Monitor Disclaimer This manual and the information contained herein are the sole property of EVS Broadcast

More information

Compuprint 4247 Serial Matrix Printers

Compuprint 4247 Serial Matrix Printers Compuprint 4247 Serial Matrix Printers Remote Printer Management Utility for Serial Matrix Printers MAN10300-00.00 First edition (October 2011) This edition applies to the Compuprint 4247 printers and

More information

ShoreTel 13 Conferencing User Guide. Part Number 850-1234-01

ShoreTel 13 Conferencing User Guide. Part Number 850-1234-01 ShoreTel 13 Part Number 850-1234-01 Document and Software Copyrights Copyright 1998-2012 by ShoreTel Inc., Sunnyvale, California, USA. All rights reserved. Printed in the United States of America. Contents

More information

GRS Advantage Website User Reference Guide

GRS Advantage Website User Reference Guide GRS Advantage Website User Reference Guide This document describes how to use the GRS Advantage Website. Table of Contents GRS Advantage Website... 2 Accessing the Website... 2 Requesting Access to the

More information

SCOPIA iview Communications Manager

SCOPIA iview Communications Manager SCOPIA iview Communications Manager User Guide Version 7.5 2000-2010 RADVISION Ltd. All intellectual property rights in this publication are owned by RADVISION Ltd and are protected by United States copyright

More information

Access Control and Audit Trail Software

Access Control and Audit Trail Software Varian, Inc. 2700 Mitchell Drive Walnut Creek, CA 94598-1675/USA Access Control and Audit Trail Software Operation Manual Varian, Inc. 2002 03-914941-00:3 Table of Contents Introduction... 1 Access Control

More information

First Data Global Gateway Virtual Terminal User Manual. Version 1.0

First Data Global Gateway Virtual Terminal User Manual. Version 1.0 First Data Global Gateway Virtual Terminal User Manual Version 1.0 Table of Contents 1 Introduction 5 1.1 First Data Global Gateway Virtual Terminal Overview 5 1.1.1 Processing Transactions 5 1.1.2 Managing

More information

Using SSH Secure Shell Client for FTP

Using SSH Secure Shell Client for FTP Using SSH Secure Shell Client for FTP The SSH Secure Shell for Workstations Windows client application features this secure file transfer protocol that s easy to use. Access the SSH Secure FTP by double-clicking

More information

EMC Smarts Network Configuration Manager

EMC Smarts Network Configuration Manager EMC Smarts Network Configuration Manager Version 9.4.1 Advisors User Guide P/N 302-002-279 REV 01 Copyright 2013-2015 EMC Corporation. All rights reserved. Published in the USA. Published October, 2015

More information

SuccessMaker Learning Management System User s Guide Release 1.0

SuccessMaker Learning Management System User s Guide Release 1.0 SuccessMaker Learning Management System User s Guide Release 1.0 Copyright 2007 2008 Pearson Education, Inc. or its affiliates Copyright 2007 2008 Pearson Education, Inc. or its affiliates. All rights

More information

Integrating Autotask Service Desk Ticketing with the Cisco OnPlus Portal

Integrating Autotask Service Desk Ticketing with the Cisco OnPlus Portal Integrating Autotask Service Desk Ticketing with the Cisco OnPlus Portal This Application Note provides instructions for configuring Apps settings on the Cisco OnPlus Portal and Autotask application settings

More information

Orbitel. Residential Digital Phone Service User s Guide

Orbitel. Residential Digital Phone Service User s Guide Orbitel Residential Digital Phone Service User s Guide All Rights Reserved Copyright 2005 The use, disclosure, modification, transfer, or transmittal of this work for any purpose, in any form, or by any

More information

Smart Web. User Guide. Amcom Software, Inc.

Smart Web. User Guide. Amcom Software, Inc. Smart Web User Guide Amcom Software, Inc. Copyright Version 4.0 Copyright 2003-2005 Amcom Software, Inc. All Rights Reserved. Information in this document is subject to change without notice. The software

More information

email-lead Grabber Business 2010 User Guide

email-lead Grabber Business 2010 User Guide email-lead Grabber Business 2010 User Guide Copyright and Trademark Information in this documentation is subject to change without notice. The software described in this manual is furnished under a license

More information

Network Installation Guide. WorkForce 610 Series Artisan 710 Series

Network Installation Guide. WorkForce 610 Series Artisan 710 Series Network Installation Guide WorkForce 610 Series Artisan 710 Series Contents Before You Begin.......................................... 3 Choose Your Connection Type................................ 4 Wireless.............................................

More information

For Active Directory Installation Guide

For Active Directory Installation Guide For Active Directory Installation Guide Version 2.5.2 April 2010 Copyright 2010 Legal Notices makes no representations or warranties with respect to the contents or use of this documentation, and specifically

More information

Network Installation Guide. Artisan 810 Series

Network Installation Guide. Artisan 810 Series Network Installation Guide Artisan 810 Series Before You Begin Make sure you installed ink cartridges and loaded paper as described on the Start Here sheet. Then follow the instructions in this guide to

More information

OCS Client Installation - Quick Start Guide. Web Conferencing & Secure Instant Messaging via Microsoft Office Communications Server 2007

OCS Client Installation - Quick Start Guide. Web Conferencing & Secure Instant Messaging via Microsoft Office Communications Server 2007 OCS Client Installation - Quick Start Guide Web Conferencing & Secure Instant Messaging via Microsoft Office Communications Server 2007 MailStreet Live Support: 866-461-0851 Document Revision: March, 2010

More information

CPEi 800/825 Series. User Manual. * Please see the Introduction Section

CPEi 800/825 Series. User Manual. * Please see the Introduction Section CPEi 800/825 Series User Manual * Please see the Introduction Section Contents Introduction...iii Chapter 1: CPEi 800/825 User Guide Overview... 1-1 Powerful Features in a Single Unit... 1-2 Front of the

More information

Authorize.Net Mobile Application

Authorize.Net Mobile Application Authorize.Net Mobile Application ios User Guide October 2015 Authorize.Net Developer Support http://developer.authorize.net Authorize.Net LLC 082007 Ver.2.0 Authorize.Net LLC ( Authorize.Net ) has made

More information

Meet Me Conferencing. Document Date: 05/15/2015 Document Version: 1.0d

Meet Me Conferencing. Document Date: 05/15/2015 Document Version: 1.0d Meet Me Conferencing Document Date: 05/15/2015 Document Version: 1.0d Creating Conferences Access You have access to Conferencing features if you have been assigned to a Meet-Me conference bridge. Go to

More information

Contents. Cbeyond Communicator for Mobile (ios) extends TotalCloud Phone System (TCPS) calling capabilities to an iphone.

Contents. Cbeyond Communicator for Mobile (ios) extends TotalCloud Phone System (TCPS) calling capabilities to an iphone. Cbeyond Communicator for TotalCloud Phone System for Mobile Cbeyond Communicator for Mobile (ios) extends TotalCloud Phone System (TCPS) calling capabilities to an iphone. Cbeyond Communicator is an intuitive

More information

VIP-102B IP Solutions Setup Tool Reference Manual

VIP-102B IP Solutions Setup Tool Reference Manual VIP-102B IP Solutions Setup Tool Reference Manual Table of Contents Overview... 5 System Requirements for Managed VoIP Products... 6 Term Definitions... 7 Main Application Window... 8 Legend Description...

More information

FOR WINDOWS FILE SERVERS

FOR WINDOWS FILE SERVERS Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

HyperFS PC Client Tools

HyperFS PC Client Tools SAN Management Software HyperFS PC Client Tools This guide provides step-by-step instructions for setup, configuration, and maintenance of the Rorke Data HyperFS SAN Management Software Ver 2.1 May 11,

More information

Xerox 700 Digital Color Press with Integrated Fiery Color Server. Utilities

Xerox 700 Digital Color Press with Integrated Fiery Color Server. Utilities Xerox 700 Digital Color Press with Integrated Fiery Color Server Utilities 2008 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45072726

More information

All Rights Reserved. Copyright 2009

All Rights Reserved. Copyright 2009 IMPORTANT NOTICE CONCERNING EMERGENCY 911 SERVICES Your service provider, not the manufacturer of the equipment, is responsible for the provision of phone services through this equipment. Any services

More information

USING THE MODEL IQ 1000 INTELLICLOCK

USING THE MODEL IQ 1000 INTELLICLOCK USING THE MODEL IQ 1000 INTELLICLOCK The IQ 1000 is an advanced model of time clock with many features and benefits designed to offer you a wide range of options in how you collect your time and attendance

More information

MiVoice Integration for Salesforce

MiVoice Integration for Salesforce MiVoice Integration for Salesforce USER GUIDE MiVoice Integration for Salesforce User Guide, Version 1, April 2014. Part number 58014124 Mitel is a registered trademark of Mitel Networks Corporation. Salesforce

More information

Connector for Microsoft Dynamics Configuration Guide for Microsoft Dynamics SL

Connector for Microsoft Dynamics Configuration Guide for Microsoft Dynamics SL Microsoft Dynamics Connector for Microsoft Dynamics Configuration Guide for Microsoft Dynamics SL Revised August, 2012 Find updates to this documentation at the following location: http://www.microsoft.com/download/en/details.aspx?id=10381

More information

Clear Choice Communications. Digital Voice Services User Guide

Clear Choice Communications. Digital Voice Services User Guide Clear Choice Communications Digital Voice Services User Guide 2 P a g e * Feature Access Codes *62 Access Voicemail *72 Call Forwarding Always Activation *73 Call Forwarding Always Deactivation *90 Call

More information

Time & Expense Entry WalkThrough

Time & Expense Entry WalkThrough PRACTICE CS Time & Expense Entry WalkThrough Version 2014.x.x TL 27573a (01/16/2015) Copyright Information Text copyright 2004-2015 by Thomson Reuters. All rights reserved. Video display images copyright

More information

MXIE. User s Manual. Manual Part Number 90-18002. Zultys Technologies 771 Vaqueros Avenue Sunnyvale CA 94085-5327 USA

MXIE. User s Manual. Manual Part Number 90-18002. Zultys Technologies 771 Vaqueros Avenue Sunnyvale CA 94085-5327 USA MXIE User s Manual Manual Part Number 90-18002 Zultys Technologies 771 Vaqueros Avenue Sunnyvale CA 94085-5327 USA +1-408-328-0450 http://www.zultys.com Notice The information contained in this document

More information

Accounts Payable Workflow Guide. Version 12.0

Accounts Payable Workflow Guide. Version 12.0 Accounts Payable Workflow Guide Version 12.0 Copyright Information Copyright 2014 Informa Software. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

CALL CENTER AGENT CCA APPLICATION GUIDE

CALL CENTER AGENT CCA APPLICATION GUIDE CALL CENTER AGENT CCA APPLICATION GUIDE TABLE OF CONTENTS BUTTONS DISPLAY... 3 1. OPEN THE CALL CENTER AGENT... 4 2. SWITCH YOUR AGENT STATUS TO AVAILABLE... 5 3. ACCEPT A CALL... 6 4. WRAPPING UP... 7

More information

Easy Manage Helpdesk Guide version 5.4

Easy Manage Helpdesk Guide version 5.4 Easy Manage Helpdesk Guide version 5.4 Restricted Rights Legend COPYRIGHT Copyright 2011 by EZManage B.V. All rights reserved. No part of this publication or software may be reproduced, transmitted, stored

More information

Temperature & Humidity SMS Alert Controller

Temperature & Humidity SMS Alert Controller Temperature & Humidity SMS Alert Controller Version 7 [Windows XP/Vista/7] GSMS THR / GSMS THP Revision 110507 [Version 2.2.14A] ~ 1 ~ SMS Alarm Messenger Version 7 [Windows XP/Vista/7] SMS Pro series

More information

Product names mentioned in this document may be trademarks and/or registered trademarks of their respective companies.

Product names mentioned in this document may be trademarks and/or registered trademarks of their respective companies. Softphone PDA User Softphone Guide PPC 10. User 2004. Guide COPYRIGHT This manual is proprietary to SAMSUNG Electronics Co., Ltd. and is protected by copyright. No information contained herein may be copied,

More information

ADP CollectAll Manager v2.4 User s Guide

ADP CollectAll Manager v2.4 User s Guide ADP CollectAll Manager v2.4 User s Guide ADP CollectAll Manager Version 2.4 User s Guide 2007 Automatic Data Processing, Inc. ADP provides this publication as is without warranty of any kind, either express

More information

Telephony Toolbar Corporate. User Guide

Telephony Toolbar Corporate. User Guide Telephony Toolbar Corporate User Guide Release 7.1 March 2011 Table of Contents 1 About This Guide...7 1.1 Open Telephony Toolbar - Corporate... 7 1.2 First Time Login... 8 1.3 Subsequent Use... 11 2 Using

More information

efiletexas.gov Review Queue User Guide

efiletexas.gov Review Queue User Guide efiletexas.gov Review Queue User Guide EFS-TF-200-3194 v.4 February 2014 Copyright and Confidentiality Copyright 2014 Tyler Technologies, Inc. All rights reserved. All documentation, source programs, object

More information

14.1. bs^ir^qfkd=obcib`qflk= Ñçê=emI=rkfuI=~åÇ=léÉåsjp=eçëíë

14.1. bs^ir^qfkd=obcib`qflk= Ñçê=emI=rkfuI=~åÇ=léÉåsjp=eçëíë 14.1 bs^ir^qfkd=obcib`qflk= Ñçê=emI=rkfuI=~åÇ=léÉåsjp=eçëíë bî~äì~íáåö=oéñäéåíáçå=ñçê=emi=rkfui=~åç=lééåsjp=eçëíë This guide walks you quickly through key Reflection features. It covers: Getting Connected

More information

Comdial Network Management System User Instructions

Comdial Network Management System User Instructions Comdial Network Management System User Instructions GCA40 237.01 8/00 printed in U.S.A. Microsoft and Windows 95 are registered trademarks of Microsoft Corporation, Redmond WA. pcanywhere is a registered

More information

... SphericallTM. Sphericall Desktop User Manual

... SphericallTM. Sphericall Desktop User Manual ................................... SphericallTM Sphericall Desktop User Manual ................................... Sphericall Desktop User Manual H T T P : / / W W W. S P H E R E C O M. C O M P A R T

More information

Provider Electronic Solutions Software User s Guide

Provider Electronic Solutions Software User s Guide Vermont Title XIX Provider Electronic Solutions Software User s Guide HP ENTERPRISE SERVICES 312 HURRICANE LANE, STE 101 PO BOX 888 WILLISTON VT 05495 Table of Contents 1 Introduction... 2 1.1 Provider

More information

Business Reports. ARUP Connect

Business Reports. ARUP Connect Business Reports ARUP Connect User Manual November 2015 Table of Contents Business Reports... 4 Quick Reference... 4 View Reports... 5 My Reports Tab... 5 Open a Report... 5 Save a Report... 5 Modify My

More information

Using the Control Panel for Wireless Network Installation. WorkForce 600 Series Artisan 700 Series

Using the Control Panel for Wireless Network Installation. WorkForce 600 Series Artisan 700 Series Using the Control Panel for Wireless Network Installation WorkForce 600 Series Artisan 700 Series Before You Begin Make sure you installed ink cartridges and loaded paper in the printer as described on

More information

AREA CODE CHANGE. You have accessed an older version of a Paradyne product document.

AREA CODE CHANGE. You have accessed an older version of a Paradyne product document. You have accessed an older version of a Paradyne product document. Paradyne is no longer a subsidiary of AT&T. Any reference to AT&T Paradyne is amended to read Paradyne Corporation. AREA CODE CHANGE Please

More information

SMS Database System Quick Start. [Version 1.0.3]

SMS Database System Quick Start. [Version 1.0.3] SMS Database System Quick Start [Version 1.0.3] Warning ICP DAS Inc., LTD. assumes no liability for damages consequent to the use of this product. ICP DAS Inc., LTD. reserves the right to change this manual

More information

COMSPHERE 6700 SERIES NETWORK MANAGEMENT SYSTEM

COMSPHERE 6700 SERIES NETWORK MANAGEMENT SYSTEM COMSPHERE 6700 SERIES NETWORK MANAGEMENT SYSTEM NETWORK CONFIGURATION GUIDE Document No. 6700-A2-GB22-20 February 1998 Copyright 1998 Paradyne Corporation. All rights reserved. Printed in U.S.A. Notice

More information

MultiOne. Getting started

MultiOne. Getting started MultiOne Getting started Philips Lighting B.V. 2015 1 Introduction This Getting started guide covers the following topics to help you start using MultiOne: The MultiOne system The MultiOne software Working

More information

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide Quest ChangeAuditor FOR ACTIVE DIRECTORY 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

EMC Documentum Webtop

EMC Documentum Webtop EMC Documentum Webtop Version 6.5 User Guide P/N 300 007 239 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com Copyright 1994 2008 EMC Corporation. All rights

More information