COMSPHERE 6700 SERIES NETWORK MANAGEMENT SYSTEM



Similar documents
OPENLANE PERFORMANCE WIZARD

1. Make sure that no client accounts are open. 2. Click on Setup, then click Modem. The Modem Setup window will appear.

NETWORK PRINT MONITOR User Guide

Personal Call Manager User Guide. BCM Business Communications Manager

Getting Started with IntelleView POS Administrator Software

ShoreTel Enterprise Contact Center 8 Using Agent Toolbar

Legal Notes. Regarding Trademarks KYOCERA Document Solutions Inc.

ShoreTel Enterprise Contact Center Using Agent Toolbar

ShoreTel Contact Center Using ShoreWare Agent Toolbar

InfoPrint 4247 Serial Matrix Printers. Remote Printer Management Utility For InfoPrint Serial Matrix Printers

Data Retrieval. Chapter III. In This Chapter

Charter Business Phone. Online Control Panel Getting Started Guide. Document Version 1.0

VIP-102B IP Solutions Setup Tool Reference Manual

User Guide. SafeNet MobilePASS for Windows Phone

WAMLocal. Wireless Asset Monitoring - Local Food Safety Software. Software Installation and User Guide BA/WAM-L-F

GUIDE. Web Client Application. Model: ER 4.0. Release / Version No.: 1.01

Avaya Network Configuration Manager User Guide

FMC VoIP. User Manual. OfficeServ 7000

Table of Contents GETTING STARTED Enter Password Dialog...3 Using Online Help...3 System Configuration Menu...4

Protection and Control IED Manager PCM600 Getting Started Guide

User Manual for Web. Help Desk Authority 9.0

Dell SonicWALL SRA 7.5 Secure Virtual Meeting and Secure Virtual Assist

WE VoIP User Guide For OfficeServ 7000 Series

Accounts Payable Workflow Guide. Version 11.2

NEC Express5800 Series NEC ESMPRO AlertManager User's Guide

Eclipse Palm Sales Force Automation. Release (Eterm)

A-AUTO 50 for Windows Setup Guide

Converge. System Administration Guide. Revision Date: November 2015

MightyCall Receptionist. Customers s Guide

How To Use Freedomvoice On A Cell Phone Or Landline Phone On A Pc Or Mac Or Ipad Or Ipa Or Ipo Or Ipod Or Ipode Or Ipro Or Ipor Or Ipore Or Ipoe Or Ipob Or

SonicWALL SSL VPN 3.5: Virtual Assist

IPOne Phone System User Interface Guide

Corporate Telephony Toolbar User Guide

BlackVue Cloud App Overview...3. Getting Started...6. Basic Menu Screens BlackVue Cloud BlackVue Wi-Fi Internal Memory...

Sophos SafeGuard File Encryption for Mac Quick startup guide. Product version: 6.1

NDA ISSUE 1 STOCK # CallCenterWorX-Enterprise IMX MAT Quick Reference Guide MAY, NEC America, Inc.

Conference Bridge User Guide P/N Rev 1, September 2006 Printed in U.S.A. 5.99

Real Time Monitor. A Real-Time Windows Operator Interface. DDE Compliant. (for remote data display)

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users

Microsoft Dynamics GP. Electronic Signatures

Wave 4.5. Wave ViewPoint Mobile 2.0. User Guide

CONFIGURATION MANUAL FILE TRANSFER DAEMON. Version June 2014

End User Configuration

Charter . Addresses Create / Manage

MEETINGONE ONLINE ACCOUNT MANAGEMENT PORTAL HOST / ROOM USER GUIDE

Merchant Integration Guide

USER MANUAL APPLICATION MONITOR. Version March 2015

Compuprint 4247 Serial Matrix Printers

ShoreTel 13 Conferencing User Guide. Part Number

GRS Advantage Website User Reference Guide

SCOPIA iview Communications Manager

Access Control and Audit Trail Software

First Data Global Gateway Virtual Terminal User Manual. Version 1.0

Using SSH Secure Shell Client for FTP

EMC Smarts Network Configuration Manager

SuccessMaker Learning Management System User s Guide Release 1.0

Integrating Autotask Service Desk Ticketing with the Cisco OnPlus Portal

Orbitel. Residential Digital Phone Service User s Guide

Smart Web. User Guide. Amcom Software, Inc.

-lead Grabber Business 2010 User Guide

Network Installation Guide. WorkForce 610 Series Artisan 710 Series

For Active Directory Installation Guide

Network Installation Guide. Artisan 810 Series

OCS Client Installation - Quick Start Guide. Web Conferencing & Secure Instant Messaging via Microsoft Office Communications Server 2007

CPEi 800/825 Series. User Manual. * Please see the Introduction Section

Authorize.Net Mobile Application

Meet Me Conferencing. Document Date: 05/15/2015 Document Version: 1.0d

Contents. Cbeyond Communicator for Mobile (ios) extends TotalCloud Phone System (TCPS) calling capabilities to an iphone.

VIP-102B IP Solutions Setup Tool Reference Manual

FOR WINDOWS FILE SERVERS

HyperFS PC Client Tools

Xerox 700 Digital Color Press with Integrated Fiery Color Server. Utilities

All Rights Reserved. Copyright 2009

USING THE MODEL IQ 1000 INTELLICLOCK

MiVoice Integration for Salesforce

Connector for Microsoft Dynamics Configuration Guide for Microsoft Dynamics SL

Clear Choice Communications. Digital Voice Services User Guide

Time & Expense Entry WalkThrough

MXIE. User s Manual. Manual Part Number Zultys Technologies 771 Vaqueros Avenue Sunnyvale CA USA

Accounts Payable Workflow Guide. Version 12.0

CALL CENTER AGENT CCA APPLICATION GUIDE

Easy Manage Helpdesk Guide version 5.4

Temperature & Humidity SMS Alert Controller

ADP CollectAll Manager v2.4 User s Guide

Telephony Toolbar Corporate. User Guide

efiletexas.gov Review Queue User Guide

14.1. bs^ir^qfkd=obcib`qflk= Ñçê=emI=rkfuI=~åÇ=léÉåsjp=eçëíë

Comdial Network Management System User Instructions

... SphericallTM. Sphericall Desktop User Manual

Provider Electronic Solutions Software User s Guide

Business Reports. ARUP Connect

Using the Control Panel for Wireless Network Installation. WorkForce 600 Series Artisan 700 Series

SMS Database System Quick Start. [Version 1.0.3]

COMSPHERE 6700 SERIES NETWORK MANAGEMENT SYSTEM

MultiOne. Getting started

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide

EMC Documentum Webtop

Transcription:

COMSPHERE 6700 SERIES NETWORK MANAGEMENT SYSTEM SECURITY MANAGER FEATURE SUPPLEMENT Document No. 6700-A2-GB41-30 February 1998

Copyright 1998 Paradyne Corporation. All rights reserved. Printed in U.S.A. Notice This publication is protected by federal copyright law. No part of this publication may be copied or distributed, transmitted, transcribed, stored in a retrieval system, or translated into any human or computer language in any form or by any means, electronic, mechanical, magnetic, manual or otherwise, or disclosed to third parties without the express written permission of Paradyne Corporation, 8545 126th Ave. N., Largo, FL 33773. Paradyne Corporation makes no representation or warranties with respect to the contents hereof and specifically disclaims any implied warranties of merchantability or fitness for a particular purpose. Further, Paradyne Corporation reserves the right to revise this publication and to make changes from time to time in the contents hereof without obligation of Paradyne Corporation to notify any person of such revision or changes. Changes and enhancements to the product and to the information herein will be documented and issued as a new release to this manual. Warranty, Sales, and Service Information Contact your local sales representative, service representative, or distributor directly for any help needed. For additional information concerning warranty, sales, service, repair, installation, documentation, training, distributor locations, or Paradyne worldwide office locations, use one of the following methods: Via the Internet: Visit the Paradyne World Wide Web site at http://www.paradyne.com Via Telephone: Call our automated call system to receive current information via fax or to speak with a company representative. Within the U.S.A., call 1-800-870-2221 Outside the U.S.A., call 1-727-530-2340 Trademarks All products and services mentioned herein are the trademarks, service marks, registered trademarks or registered service marks of their respective owners. Printed on recycled paper A February 1998 6700-A2-GB41-30

Important Information Important Safety Instructions 1. Read and follow all warning notices and instructions marked on the product or included in the manual. 2. General purpose cables are provided with this product. Special cables, which may be required by the regulatory inspection authority for the installation site, are the responsibility of the customer. 3. When installed in the final configuration, the product must comply with the applicable Safety Standards and regulatory requirements of the country in which it is installed. If necessary, consult with the appropriate regulatory agencies and inspection authorities to ensure compliance. B

Contents About This Guide Document Purpose and Intended Audience......................... iii Document Summary............................................. iii Product-Related Documents...................................... iv 1 Introduction Overview...................................................... 1-1 Software Description............................................ 1-1 Customer-Supplied Equipment.................................... 1-3 2 Network Configuration Overview...................................................... 2-1 Configuring the Network Elements................................ 2-2 Configuring a Contact List.................................... 2-2 Configuring a Device Group.................................. 2-6 Configuring the Network Alerts.................................... 2-10 Configuring Event Controls for Call Security..................... 2-11 Configuring System Attributes and Options......................... 2-14 Setting System Options...................................... 2-14 Defining NMS Users......................................... 2-14 Defining System Colors...................................... 2-15 Configuring Call Security......................................... 2-16 Defining VF Passwords.......................................... 2-16 Using Security Control........................................... 2-19 Command.................................................. 2-20 Option..................................................... 2-24 Window.................................................... 2-24 Print....................................................... 2-26 i

Contents 3 Displays Overview...................................................... 3-1 Event Monitor.................................................. 3-1 Action......................................................... 3-2 Reset Security Table......................................... 3-2 Clear Event................................................. 3-2 Disconnect Device........................................... 3-3 Busy Out/Remove Busy Out Device............................ 3-3 Download Security Table..................................... 3-3 Confirmation Required....................................... 3-3 Sort........................................................... 3-4 Security Name.............................................. 3-4 Device Name............................................... 3-4 Event Time................................................. 3-4 Event Priority............................................... 3-4 Include........................................................ 3-5 Control........................................................ 3-5 Info........................................................... 3-5 4 Reports Overview...................................................... 4-1 Configuration................................................... 4-1 Contact.................................................... 4-1 Device Groups.............................................. 4-2 VF Security................................................. 4-3 Event Control Priorities Report.................................... 4-5 Event History................................................... 4-5 Glossary Index ii February 1998 6700-A2-GB41-30

About This Guide Document Purpose and Intended Audience This supplement describes how to use the COMSPHERE 6700 Series Network Management System (NMS) Security Manager feature. It is assumed that you have a basic understanding of modems and their operation, that you are knowledgeable about data communications, that you are familiar with Windows terminology and conventions, and that you have installed and can operate the COMSPHERE 6700 Series NMS software. Document Summary Section Chapter 1 Chapter 2 Chapter 3 Chapter 4 Glossary Index Description Introduction. Provides an overview of the Security Manager feature. Network Configuration. Provides information about the changes to configuration with the Security Manager feature. Displays. Provides information on changes to Displays with the Security Manager feature. Reports. Provides information on changes to Reports with the Security Manager feature. Defines acronyms and terms used in this document. Lists key terms, acronyms, concepts, and sections in alphabetical order. iii

About This Guide Product-Related Documents Document Number 3000-A2-GA31 Document Title COMSPHERE 3000 Series Carrier, Installation Manual 3810-A2-GB30 COMSPHERE 3800 Series Modems, Models 3810, 3811, and 3820, User s Guide 6700-A2-GY31 COMSPHERE 6700 Series Network Management System, User s Guide Contact your sales or service representative to order additional product documentation. Paradyne documents are also available on the World Wide Web at: http://www.paradyne.com Select Service & Support Technical Manuals iv February 1998 6700-A2-GB41-30

Introduction 1 Overview The Security Manager feature is an enhancement to the COMSPHERE 6700 Series Network Management System (NMS) which supports the call security features of the COMSPHERE 2400 Series and COMSPHERE 3800 Series devices. The 6700 Series NMS is described in the COMSPHERE 6700 Series Network Management System User s Guide. This supplement is designed to be used in conjunction with the User s Guide. The changes and additions to the basic NMS software product are described in this supplement in the same logical flow as in the User s Guide, e.g., applicable chapter titles are the same in both manuals. For ease of use, repetition of information between manuals has been kept to a minimum. Therefore, it is suggested that you have the User s Guide available when referencing this supplement. Software Description The Security Manager feature is designed to be used in conjunction with NMS and the call security features of the 2400 Series and 3800 Series devices. The Security Manager feature provides the following functionality enhancements to the 2400 Series and 3800 Series devices call security features: A new 2400/3800 Series device alert, Access Security Alarm. This alert is generated by the device and can appear on any display that shows device alerts. New call failure status codes supported in call statistics. Calls monitored for security violations. Additional security for login ID and time of day access verification. Creation and maintenance of a security database within each device. Download of the security database to the devices. Recording to an event history file. 1-1

Introduction The Security Manager is used to perform the following functions to configure a 2400/3800 Series device for security use: Configuring security event priorities and actions. Configuring all Voice Frequency (VF) passwords used by 2400/ 3800 Series devices. Configuring all login IDs and passwords used by 2400/3800 Series devices. Configuring device security groups to link login passwords and VF passwords with selected 2400/3800 Series devices. Configuring 2400/3800 Series devices security options, such as prompts. Downloading of login and VF passwords to 2400/3800 Series devices. The following dial access procedure is an example of how the Security Manager feature works in conjunction with a 2400/3800 Series device: 1. A remote device is commanded to dial a local 2400/3800 Series device. The dial command used contains a VF password, such as ATD 530-9999W12345678, which causes the remote device to dial 5309999 and wait for a dial tone. 2. The local 2400/3800 Series device answers the call and responds with a dial tone. 3. The remote device receives the dial tone and then dials 12345678 (the VF password). 4. The local 2400/3800 Series device verifies the VF password using Dual Tone Multi-Frequency (DTMF) tones against its internal password table. If the password is invalid, the device disconnects the line and a disconnect message is sent to the Security Manager. If the password is valid, the local 3800 Series device trains up with the remote device. 5. The VF password used contains a flag indicating whether an additional login/password sequence must be performed. If no additional sequence is required, then the local 2400/3800 Series device allows the remote device to access the Data Terminal Equipment (DTE) connection and send a connect message to the Security Manager. If an additional sequence is required: The local 2400/3800 Series device prompts the remote device (through the remote device s terminal or computer) for User ID, if this function is enabled via a device option. The remote device s user enters a login ID. The local 2400/3800 Series device receives the login ID and then prompts for a login ID password. 1-2 February 1998 6700-A2-GB41-30

Introduction The local 2400/3800 Series device receives the login ID password and verifies it with its internal password table. Up to five attempts to enter a password can be made, after which the local device will disconnect and send a message to the Security Manager. If the VF and DTE passwords match, you only have one attempt to enter it before the device is disconnected. 6. When the Security Manager receives a connect message containing call security information from the local 2400/3800 Series device, the call security information is added to the event history file and the VF login ID and password reported by the device are verified. If any of the following occur, an event is registered with the Security Manager: The login ID is invalid. The password is invalid for the login ID. The login ID is not allowed to access the Security Manager at this time of day. 7. When the local 2400/3800 Series device sends a disconnect message containing call security information to the Security Manager: The call security information is added to the event history file. An internal event is generated to the Security Manager. 8. When the Security Manager generates an internal event: The event control record is checked to determine the event s priority and what action should be taken (e.g., busy out the local device, disconnect the local device, take no action, etc.). Any automatic action taken is logged to the event history file. All applications sensitive to security events will be notified and will update their displays. Customer-Supplied Equipment The following list contains recommended enhancements to your PC environment to adequately support the Security Manager feature: COMSPHERE 6700 NMS Software, Release 2.0.0 or greater is installed. COMSPHERE 3800 Series Firmware, Release A3.30.00 or greater is installed. 1-3

2 Overview This chapter describes several additional network elements that you must configure when you have the Security Manager feature. These elements are: Event Control VF Passwords Security Control In addition, there are changes to the following network elements for the Call Security feature: Contact List Device Groups Network Alerts System Attributes and Options When you are ready to set up security for your network, select Config from the Main Menu. A pull-down menu displays four commands used for network configuration: Network, Alerts and Events, and System, plus the Call Security command which is available with the Security Manager feature. 2-1

Configuring the Network Elements The Security Manager feature provides enhancements to the following network elements described in Chapter 4, Configuration, of the COMSPHERE 6700 Series Network Management System User s Guide: Contact List expanded to keep track of security login IDs. Device Group expanded to include device security groups. These enhancements are described in the following sections. Configuring a Contact List To configure a contact list, complete the input form using the following steps: Procedure 1. Select Config from the Main Menu. 2. Choose Network from the Config menu. 3. Choose Contact Lists from the Network cascading menu. The Contact List Configuration input form appears. 2-2 February 1998 6700-A2-GB41-30

4. Enter the requested data into the fields on the Contact List Configuration input form. 5. Choose Save or one of the other commands from the Action menu (see Table 2-1). Table 2-1. Action Commands (Contact List) (1 of 2) Action Commands Functions Procedures Save Clear Delete Change Contact Name Set Access Time Default Print Stores the contents of the input form to the network database. Use this command for updating or adding device security groups to the database. Removes the current field entries of the input form without affecting the network database. Removes the security group name from the network database. Changes the contact name throughout the network database. Resets the access time default values to those that are currently displayed. Prints the contact list information currently displayed. If Show Passwords is checked, then the password(s) for the contact name is printed. 1. Complete the input form. 2. Choose Save. 1. Choose Clear. 1. Access an existing security group name on the input form. 2. Choose Delete. 1. Access an existing contact list. 2. Choose Change Contact Name. 3. Enter the new contact name in the dialog box. 4. Choose OK. 1. Access an existing contact name on the input form. 2. Change the access times. 3. Choose Set Access Time Default. 1. Access an existing name on the input form. 2. Choose Print, or 1. Complete the input form. 2. Choose Save. 3. Choose Print. 2-3

Table 2-1. Action Commands (Contact List) (2 of 2) Action Commands Print All Show Passwords Functions Prints the contact information currently stored in the database. If Show Passwords is checked, then the password(s) for the contact name is printed. Permits the display and/or printing of passwords associated with the contact name. Procedures 1. Access an existing name on the input form. 2. Choose Print All, or 1. Complete the input form. 2. Choose Save. 3. Choose Print All. Select or deselect Show Passwords. A check mark indicates that the option is enabled. In addition to the Contact Name, Address, Telephone, and Comments fields, the Security Manager feature provides the following additional fields: Login ID An optional field (eight characters) that contains the alphanumeric characters (required if the device option is enabled). The login ID must be unique. Entry of a login ID enables the Login Password and Access Times fields, as well as the Security Group/# Passwords list box. Login Password A required field that contains the password required for you to log in to the Security Manager. These characters are displayed as asterisks (***) unless you have selected Show Passwords from the Action menu. If you wish NMS to generate the login password, choose Generate from the Configuration Contact List menu bar to automatically generate a random, 6-character password. Access Times A control used to indicate when the user owning the login ID and password entered is permitted to access the 6700 network. The control shows seven days divided into 24-hour periods. Boxes displayed in light gray indicate that the user who has logged in cannot access the network during those times ( off condition) without causing an Invalid Access Time security event. Times appearing in black indicate an on condition, meaning the user is permitted to access the network during those times. The default value for all times is off. 2-4 February 1998 6700-A2-GB41-30

To change the valid access times, do one of the following: Click on each box individually (or press the spacebar) to toggle the condition setting. Select a group of time boxes by dragging the mouse to enclose boxes in a selection rectangle (or use the Arrow keys). The box you start dragging from determines the on/off condition of the other boxes selected. Clicking the mouse on the selected boxes (or pressing the spacebar) sets their condition to the opposite of the setting for the time box in the upper left corner within the rectangle. Click on a day of the week name (or press the spacebar) to set the condition for the entire day to the condition selected for the 00 hour. Choose Set Access Time Default from the Action menu to reset the access time default values to those that you have just set on the screen. Security Group/# Passwords This list box displays all security groups with which the contact is associated. Also shown are the number of passwords associated with each security group. To change the security groups listed in this box, select the Security Groups button. The Security Group Selections window appears. 2-5

Procedure To add a security group to the Selected Groups list box: 1. Select the group from the All Security Groups list box. 2. Choose the Add button. 3. Choose the OK button to confirm your selection or the Cancel button to cancel the selection. If you chose OK, then this security group is added to the Selected Groups list box and is removed from the All Security Groups list box, and appears on the Contact List input form on page 2-2. 4. Choose Save to save your selection. Procedure To remove a security group from the Selected Groups list box: 1. Select the group from the Selected Groups list box. 2. Choose the Remove button. 3. Choose the OK button to confirm your selection or the Cancel button to cancel the selection. If you chose OK, then this security group is removed from the Selected Groups list box and appears in the All Security Groups list box and on the Contact List input form on page 2-2. 4. Choose Save to save your selection. Configuring a Device Group A device group is a user-defined category that identifies a set of devices. The Device Groups command allows you to create, change, delete, or print device group configuration information. The Security Manager feature expands this function to provide the logical link between a group of devices and a list of security passwords. Using the device security group makes it easier to configure more than one device with exactly the same set of passwords and security options. NOTE: A device can be a member of only one security group at any one time. To create or change device group configuration, complete the Device Groups Configuration input form by entering information in the appropriate fields. Procedure To configure a device group, complete the input form by using the following steps: 1. Select Config from the Main Menu. 2. Choose Network from the Config menu. 3. Choose Device Groups from the Network cascading menu. The Device Groups Configuration input form appears. 2-6 February 1998 6700-A2-GB41-30

4. Enter the information requested into the form. Use the commands from the Action menu to complete configuration. Use the Download menu to download all passwords and security modes assigned to the group name to the devices. If specific devices are selected, then the download only affects these devices. If no devices are selected, then the download affects the all of the devices in the group. In addition to the fields listed to configure a device group, use the following procedure to complete the Device Groups Configuration input form when configuring a device security group: Procedure 1. If the group listed in the Group Name field is a security group, place a check in the Security Group box. This enables the Security Passwords in Group box, the Answer Security Mode box, the Auto Dialer Security box, and the Reporting Modes box, as well as the Download menu item. 2. Choose Show Passwords from the Action menu if you want passwords to be displayed and/or printed. 3. View the Security Passwords in Group box to see the list of all VF (shown in italics) and DTE password names associated with the security group. This includes the maximum number of passwords that can be associated with this security group (standalone devices can have a maximum of 20 passwords, carrier devices can have a maximum of 3000 passwords). Two bold entries listed in the same line indicate that the VF and DTE passwords match. To add or remove passwords in this list, choose Passwords. The Select Groups Passwords window appears. 2-7

4. To add VF and/or DTE passwords to the selected passwords list, select the appropriate VF/DTE passwords and choose Add. To remove passwords from the selected passwords list, select the appropriate VF/DTE passwords and choose Remove. If the VF and DTE passwords match, both entries must be selected. In either case, choosing OK confirms your selection, while choosing Cancel closes the selection dialog box without making any changes. 5. To control which passwords will be required by the devices in the security group when an incoming call is answered, use the Answer Security Mode box. Disabled indicates that inbound security is disabled. DTE Only indicates that the modem requires the call originator to provide a DTE login password. VF and DTE indicates that both VF and DTE passwords are required by the devices in the security group. VF with Matching DTE indicates that a specific VF will always require a specific DTE. The entries cannot be mismatched. When VF with matching DTE is in effect, you must select a VF entry and its matching DTE entry from the All Available Password list boxes and add them to the Selected Passwords list box. Both entries will be displayed on the same line in bold in the Selected Passwords and Security Passwords in Group list boxes. The appropriate device option must be enabled before the device will prompt the user for a login ID. 6. To control access to the dialers for all devices in the security group, use the Auto Dialer Security box. If Enabled, the modem requires the call originator to issue a special command to enable the dial command to enable the dial command before this command can be issued. If Disabled, dial commands can be issued without restriction. 2-8 February 1998 6700-A2-GB41-30

7. To have failed calls reported to the Security Manager, check the Call Failure box (this is the default). 8. To have successful calls reported to the Security Manager, check the Call Success box (this is the default). 9. Choose Save or one of the other commands from the Action menu (see Table 2-2). 10. Choose Download from the Device Groups menu bar to download all passwords and/or security modes assigned to the security group identified in the Group Name field. To download to selected devices in a security group, select those devices from the Devices in Group box. To download to all devices in the security group, do not select any specific devices. The download is limited to those devices in the security group with the security feature installed. NOTE: A download busies-out all selected devices that are currently idle. All devices that are connected at the time that a download is requested are downloaded without interrupting primary data. The busy-out condition is removed after the download is completed. Table 2-2. Action Commands (Device Security Groups) (1 of 2) Action Commands Functions Procedures Save Delete Change Print Stores the contents of the input form to the network database. Use this command for updating or adding device security groups to the database. Removes the security group name from the network database. Changes the security group name throughout the network database. Prints the security group information currently displayed. If Show Passwords is checked, then the password(s) for the security group name is printed. 1. Complete the input form. 2. Choose Save. 1. Access an existing security group name on the input form. 2. Choose Delete. 1. Access an existing security group name on the input form. 2. Choose Change. 3. Enter the new security group name in the dialog box. 4. Choose OK. 1. Access an existing name on the input form. 2. Choose Print, or 1. Complete the input form. 2. Choose Save. 3. Choose Print. 2-9

Table 2-2. Action Commands (Device Security Groups) (2 of 2) Action Commands Print All Show Passwords Functions Prints the security group information currently stored in the database. If Show Passwords is checked, then the password(s) for the security groups are printed. Permits the display and/or printing of passwords associated with security groups. Procedures 1. Access an existing name on the input form. 2. Choose Print All, or 1. Complete the input form. 2. Choose Save. 3. Choose Print All. 1. Select or deselect Show Passwords. A check mark indicates that the option is enabled. Configuring the Network Alerts To define the device alerts and security events that the network will monitor, select Config from the Main Menu and then Choose Alerts and Events. The Security Manager feature adds the new device alert Access Security to the existing alert controls for device and model. This alert indicates that a user has successfully logged into the Security feature of a device by using its front panel. This alert can only be cleared by the user. In addition, the Event Controls Call Security function is added. 2-10 February 1998 6700-A2-GB41-30

Configuring Event Controls for Call Security The event control function enables you to control what actions are initiated by the Security Manager and the priority level assigned to the call security events. Table 2-3 describes each security event and their default values. Table 2-3. Call Security Event Descriptions (1 of 2) Event Description Event Definition Event Source Event Duration Event Priority Auto Actions VF Login OK User Login OK User Login Rejected: 3 Retries Failed User Login Rejected: Password Time Out User Login Aborted: Line Disconnected VF Login Rejected: Password Invalid VF Login Rejected: Password Time Out VF Login Aborted: Line Disconnected A remote user has gained access using a valid node password. A remote user has gained access using a valid security password. A remote user has attempted access and did not enter a valid security password in three attempts. A remote user has attempted access but did not enter a security password before the time-out period expired. A remote user has attempted access but the connection was dropped before the user entered a security password. A remote user has attempted access using an invalid node password. A remote user has attempted access but did not enter a node password before the time-out period expired. A remote user as attempted access but the connection was dropped before the user entered a node password. Modem Duration No Event None Modem Duration No Event None Modem Duration Minor None Modem Duration Minor None Modem Duration Major None Modem Duration Major None Modem Duration Minor None Modem Duration Major None User Login OK: Multiple Password Retries A remote user has gained access using a valid security password, but multiple attempts were required to enter a valid password. Security Manager Duration Major None Login ID and Password Combination Invalid A remote user has gained access using a valid security password, but the valid login ID entered is not valid for the security password entered. Security Manager Duration Critical Disconnect Invalid Login ID, Password Valid for Device A remote user has gained access using a valid security password, but the login ID entered is not valid. Security Manager Duration Critical Disconnect Invalid Access Time A remote user has gained access using a valid security password, but the access time is not valid. Security Manager Duration Critical Disconnect 2-11

Table 2-3. Call Security Event Descriptions (2 of 2) Event Description Event Definition Event Source Event Duration Event Priority Auto Actions User Login Hack. Multiple Sequential Password Retries A remote user has gained access using a valid security password, but to do so required entry of multiple passwords, each separated by a numeric value of one. Security Manager Until Cleared by Operator Critical Busy Out Device Security Table Invalid The security password table maintained by the device is invalid and must be downloaded. Security Manager Duration Critical None Security Download in Progress The security password table for the device indicated is being downloaded. Security Manager Duration Minor None Security Download Failed The security password download has failed. The system has tried to perform the download three times prior to this event. Security Manager Until Download Started or Device Deleted Critical Reset & Busy Out Front Panel Modification A user has made changes to the modem security via the front panel. Modem Duration Critical None Make Busy Mode The device is currently busied out. This may have been done by the Security Manager. Device Duration As per Alert Controls None 2-12 February 1998 6700-A2-GB41-30

Procedure To change the security event default values: 1. Select Config from the Main Menu. 2. Choose Alerts and Events from the Config menu. 3. Choose Event Controls Call Security from the Alerts and Events cascading menu. The Event Controls Call Security window appears. 4. Select the priority (Critical, Major, Minor, or No Event) for each event. Your selection determines sort order and differentiates the severity of the event by color. 5. Select the automatic action to be taken by the Security Manager. Table 2-4 lists the auto actions available. 6. Choose Save or one of the other commands from the Action menu. Action commands for events are the same as those for alerts. Refer to the COMSPHERE 6700 Series Network Management System User s Guide. Table 2-4. Event Control Security Manager Auto Actions Auto Action Description Busy Out The Security Manager commands the reporting device to disconnect the telephone connection, then go into a busy out state. Download The device is busied out and its security table is downloaded. Only valid for the Device Security Table Invalid event. Disconnect The Security Manager commands the reporting device to disconnect the telephone connection. Ignore The event will be ignored by the NMS. None Reset The Security Manager will take no automatic action. The device is busied out and all of its security table assignments are cleared. 2-13

Configuring System Attributes and Options To configure the system attributes and options, choose Config from the Main Menu and then choose System. This menu allows you to define the operational criteria for NMS. The Security Manager feature provides the additional operation criterion, Collect Event History. The Collect Event History system option enables you to control the purging of the call event history. Setting System Options The System Options input form is shown below. Select the check box to the left of the Collect Event History field, then make your selection in the number range field. Collect Event History Select the check box if you want NMS to record all security events in an event history file. The event history can then be displayed or printed via the Event History Report. Use the number range field to select the number of days to keep active history records (Default = 30 days). Defining NMS Users User Profile commands allow you to define the NMS users and their system privileges. A user who has the User Profile privilege can assign or change User IDs, passwords, and system privileges for all other users on NMS. The Security Manager provides an additional privilege, Call Security. Users without the User Profile privilege can change only their own User ID, password, and comments. 2-14 February 1998 6700-A2-GB41-30

The User Profile Configuration input form is shown below. Select the check box before the Call Security field. Call Security A Security Manager privilege that allows you to change NMS call security parameters and to cause these changes to occur in devices. If the check box is not selected, you are limited to displaying call security information; you cannot change it. Defining System Colors The Security Manager feature adds a new color group for security events. System colors are used to distinguish event priorities. The default colors are listed in Table 2-5. Table 2-5. Event Priorities System Colors Group Color Group Elements Default Colors Events Cyan Gray (light) Green 2-15

Configuring Call Security Call Security enables you to define VF Passwords and to control the operation of the NMS security features. Defining VF Passwords You can require that the COMSPHERE 2400 Series and 3800 Series devices receive a valid password before training. This is a VF password which is a series of DTMF signals, generated by either a telephone or by adding a password to the end of a dial command to the calling modem. A device uses this VF password to verify that the remote calling device is permitted access. To create VF passwords, complete the Call Security VF Passwords input form and use the Action commands (see Table 2-6). Table 2-6. Action Commands (VF Passwords) Action Commands Functions Procedures Save Stores the contents of the input form to the network database. Use this command for updating or adding VF password names to the 1. Complete the input form. 2. Choose Save. database. Delete Removes the VF Password name and all associations from the network database. 1. Access an existing VF Password name on the input form. 2. Choose Delete. Clear Removes the current field entries of the input form without affecting the network database. 1. Choose Clear. Change VF Password Name Print Print All Show Passwords Changes the VF Password name throughout the network database. Prints the VF Password name information currently displayed. If Show Passwords is checked, then the password(s) for the VF Password name is printed. Prints the VF Password information currently displayed. If Show Passwords is checked, then the password(s) for the VF Password name is printed. Permits the display and/or printing of passwords associated with VF Password names. 1. Access an existing VF Password name on the input form. 2. Choose Change. 3. Enter the new VF Password name in the dialog box. 4. Choose OK. 1. Access an existing name on the input form. 2. Choose Print, or 1. Complete the input form. 2. Choose Save. 3. Choose Print. 1. Access an existing name on the input form. 2. Choose Print All, or 1. Complete the input form. 2. Choose Save. 3. Choose Print All. 1. Select or deselect Show Passwords. A check mark indicates that the option is enabled. 2-16 February 1998 6700-A2-GB41-30

Procedure To define VF Passwords: 1. Select Config from the Main Menu. 2. Choose Call Security from the Config menu. 3. Choose VF Passwords from the Call Security menu. The VF Passwords input form appears. 4. Enter the information in the fields on the VF Passwords input form by either: Using the selection list button to the right of the field to access existing field entries, or Typing the information in the field, then pressing Tab. For the VF Password field only, you can choose Generate from the VF Passwords menu to automatically generate an 8-digit password. Field VF Name VF Password Comments Access Type Description A label (eight characters maximum) that is unique to the network and used to identify the VF Password. A password (eight digits maximum) that is unique to the network and used to allow the remote device to gain access to the training sequence of a local device. Must be a DTMF signal. An optional field for additional VF Password name information (maximum 40 characters). An optional field that indicates any additional security that is necessary when the VF Password is used. Select one of the following: VF Only Select this option to require only the VF password from the remote device to gain access to the DTE side of the local device. User Login Select this option to require a valid security login password from the remote device in addition to the VF password to gain access to the DTE side of the local device. 2-17

The list of security groups associated with the VF password, along with the number of VF and login passwords assigned to each group, displays in the lower portion of the VF Passwords input form. NOTE: Do not use alpha or special characters in the VF Password field. 5. To add or remove devices from the list of selected security groups displayed, choose the Security Groups button. The Security Group Selections window appears. 6. Select the desired security group, then choose either Add or Remove. Choose OK to change the list of selected security groups displayed on the VF Passwords input form. Procedure To add a security group to the Selected Groups list box: 1. Select the group from the All Security Groups list box. 2. Choose the Add button. 3. Choose the OK button to confirm your selection or the Cancel button to cancel the selection. If you chose OK, then this security group is added to the Selected Groups list box and is removed from the All Security Groups list box, and appears on the Contact List input form on page 2-2. 4. Choose Save to save your selection. 2-18 February 1998 6700-A2-GB41-30

Procedure To remove a security group from the Selected Groups list box: 1. Select the group from the Selected Groups list box. 2. Choose the Remove button. 3. Choose the OK button to confirm your selection or the Cancel button to cancel the selection. If you chose OK, then this security group is removed from the Selected Groups list box and appears in the All Security Groups list box and on the Contact List input form on page 2-2. 4. Choose Save to save your selection. Using Security Control Security Control allows you to perform the following functions: Reset the security table Display and change security prompt strings Download the security table Display and change the administrative password Procedure To use Security Control: 1. Select Config from the Main Menu. 2. Choose Call Security from the Config menu. 3. Choose Control from the Call Security menu. The Security Control menu items are visible in the menu bar. The following is a list of the Security Control menu commands with a brief description of each. Command Allows you to execute commands to control the operation of security functions for NMS. Option Enables you to control the display of passwords and to request the display of a confirmation box. Window Allows for changing the method of displaying windows opened from the Security Control window or closing all the windows opened from the current Security Control window. Print Prints the current Security Control window and all windows opened from it. 2-19

Command Select Command from the Security Control menu bar and the Command pull-down menu appears. Use Command to control the security functions available through the Security Manager feature. These commands only apply to devices in security groups with the Security feature installed. CAUTION: If the device requires password access, resetting its security password table prevents incoming calls to that device and resets the administrative password to its system default value. Reset Security Table Choose Reset Security Table from the Command pull-down menu to clear the security password table for one or more devices. The Reset Security Table window displays the names of all the devices selected for the Reset Security Table command (default is global selection list). Choose Devices to select different devices to appear on the list. Choose Execute to reset the security table for each device in the selection list. 2-20 February 1998 6700-A2-GB41-30

Security Prompt Strings Choose Security Prompt Strings from the Command pull-down menu to display and/or change prompts and messages related to the login ID and password access for selected devices. The Security Prompt Strings window displays security prompt strings for selected devices. Device List The device names selected to receive the new security prompt strings. ID Prompt Used to query for the user s login ID (32 characters maximum). Password Prompt Used to query for the user s login password (32 characters maximum). Verifying Message The message to be displayed while the device is verifying the login password (32 characters maximum). 2-21

Access Granted Message The message displayed when the user is granted access to the device s DTE connection (32 characters maximum). To change the devices selected as displayed in the Device List box, choose Devices, then make your selection from the displayed dialog box. To read the security prompts from the selected device(s) and display these values on the Security Prompt Strings window, select a device from the Device List box and choose Display. To change the security prompts for the selected device(s) to the values displayed on the Security Prompt Strings window, select device(s) from the Device List box and choose Change. NOTE: When entering data into the ID Prompt, Password Prompt, Verifying Message, and Access Granted Message fields, be sure to include any appropriate carriage returns and line feeds. To do this, use a backslash (\) followed by the hexadecimal value for the character (0A for line feed or 0D for carriage return). For example, type 0A\0D Enter Password \0A\0D to have the prompt Enter Password appear on a line by itself. Administrative Password Choose Administrative Password from the Command pull-down menu to display and/or change the password for selected device(s). This is the password the modem requires before permitting a user to access security functions from the modem s front panel. The Administrative Password window displays the names of all the devices selected for the new administrative password (default is global selection list). Choose Devices to select different devices to appear on the list. Choose Display to show the password for the selected device in the 8-digit Password field. Choose Change to update the password for selected device(s) to the one displayed in the Password field. 2-22 February 1998 6700-A2-GB41-30

Download Security Table Choose Download Security Table from the Command pull-down menu to download the security table to one or more devices. The Download Security Table window displays the names of all the devices selected for the Download Security Table command (default is global selection list). Choose Devices to select different devices to appear on the list. Choose Execute to download the security table for each device in the selection list. This process consists of a broadcast message to all selected devices and could take as long as several minutes. NOTE: A download busies-out all selected devices that are currently idle. All devices that are connected at the time that a download is requested are downloaded without interrupting primary data. The busy-out condition is removed after the download is completed. 2-23

Option Select Option from the Security Control menu bar and the Option pull-down menu appears. Use Option to request a confirmation box to verify that requested changes are to be implemented and to control the display of passwords. Confirmation Choose Confirmation from the Option menu to request that a confirmation box be shown before any changes are made to a device. A check mark next to Confirmation indicates that the box is enabled. This is a toggle function. Show Password Choose Show Password from the Option menu to allow the display of passwords. A check mark next to Show Passwords indicates that the display of passwords is allowed. This is a toggle function. Window Choose Window from the Security Control menu bar to change how Security Control windows are displayed or to close all the open Security Control windows. Choosing Window causes a drop-down menu to appear listing the commands Tile, Cascade, Arrange Icons, and Close All. The Window commands only affect the windows or icons opened from the same Security Control window. If two or more Security Control windows are open, the Window commands only operate on the windows opened from the current Security Control window. The windows opened from the current Security Control window are listed below the last command. A check mark indicates the active window. To change the active window, select the window name from the list. 2-24 February 1998 6700-A2-GB41-30

Tile Choose Tile from the pull-down menu to have the windows arranged in a side-by-side manner. This allows viewing of several windows simultaneously (side-by-side) with the disadvantage that each window is smaller than if they were displayed on top of each other. The following shows three Security Control windows displayed in the tile fashion. Cascade Choose Cascade from the pull-down menu to have windows arranged in a stacked fashion while allowing the upper and left side of each window to remain in view. This permits viewing of the primary window, in a larger size than Tile, and makes changing from one window to another easier than if they were displayed directly on top of each other. The following shows three Security Control windows displayed in the cascade fashion. 2-25

Arrange Icons Choose Arrange Icons from the pull-down menu to display any icons along the lower portion of the window. Close All Choose Close All from the pull-down menu to close all the windows called from the current Security Control menu. Print Choose Print from the Security Control menu to print the current Security Control window and all windows opened from it. See the COMSPHERE 6700 Series Network Management System User s Guide for additional information on using printers. 2-26 February 1998 6700-A2-GB41-30

Displays 3 Overview This chapter describes the Event Monitor command that is provided by the Security Manager feature. This command is accessed from the Displays menu and is an additional way to monitor the condition of your network. Event Monitor Event Monitor commands allow you to view all the current events related to call security. The displayed events can be sorted by security ID, device name, event time, or event description. From the Event Monitor window, you can control displayed events, display security control or information windows, and limit the events displayed by priority level. Select Event Monitor from the Displays pull-down menu. The Event Monitor window appears with the menus Action, Sort, Include, Control, Info and a listing of the current events reported by the Security Manager. Each listing uses five fields of information containing the security ID, device name, event time, event description, and automatic action taken. 3-1

Displays Action Select Action from the Event Monitor menu bar to access the Action pull-down menu. The Action menu is inactive (gray) unless an event is selected. Use the Action pull-down menu commands to perform the following functions: Reset Security Table Clear Event Disconnect Device Busy Out Device Download Security Table Confirmation Required Reset Security Table Choose Reset Security Table from the Action pull-down menu to reset the security table in the selected device, then cause the device to be busied-out. The device s security table is cleared, preventing dial-in access when the device is configured to require password verification. This creates a security event, indicating to the Security Manager that the device requires a security table download. If you do not have security privileges, this menu item is inactive (gray). Clear Event Choose Clear Event from the Action pull-down menu to delete the selected events from the Event Monitor window. If you do not have security privileges, this menu item is inactive (gray). 3-2 February 1998 6700-A2-GB41-30

Displays Disconnect Device Choose Disconnect Device from the Action pull-down menu to command the device to disconnect the telephone connection. The selected event is removed from the Event Monitor window. If you do not have security privileges, this menu item is inactive (gray). Busy Out/Remove Busy Out Device Choose Busy Out Device from the Action pull-down menu to either busy out the device or choose Remove Busy Out to remove this condition. If you do not have security privileges, this menu item is inactive (gray). Download Security Table Choose Download Security Table from the Action pull-down menu to busy out the device, then download a security table. You must select a Device Security Table Invalid event to enable this command. If you do not have security privileges, this menu item is inactive (gray). NOTE: A download busies-out all selected devices that are currently idle. All devices that are connected at the time that a download is requested are downloaded without interrupting primary data. The busy-out condition is removed after the download is completed. Confirmation Required Choose Confirmation Required from the Action pull-down menu to request a that confirmation box display for all Action menu commands. A check mark displays next to this menu item when the confirmation box is enabled. 3-3

Displays Sort Select Sort from the Event Monitor menu bar to access the Sort pull-down menu. Use the Sort pull-down menu commands to sort the listing by Security Name, Device Name, Event Time, or Event Priority. Security Name Choose Security Name from the Sort pull-down menu to list the events alphanumerically by security ID. Device Name Choose Device Name from the Sort pull-down menu to have the events listed according to device name. The device names are alphanumerically sorted. Use the scroll bar to view events not currently displayed. Event Time Choose Event Time from the Sort pull-down menu to list events according to the time they occurred. Each new event displays at the bottom of the list. Use the scroll bar to locate an event. This event will remain displayed until another event is chosen. Event Priority Choose Event Priority from the Sort pull-down menu to list events according to their priority (critical, major, minor, no event). 3-4 February 1998 6700-A2-GB41-30

Displays Include Select Include from the Event Monitor menu bar to access the Include pull-down menu. Use the Include pull-down menu commands to limit the Event Monitor display to only those events that fall into the priorities selected for view. The Include pull-down menu contains four selections: No Event, Critical, Major, Minor. To include events with one or more of these priorities, select the menu item(s). A check mark will be placed next to your selection. At least one of these priorities must be selected. Control Select Control from the Event Monitor menu bar to open a Security Control window for events selected on the Event Monitor window. You can also double-click on an event to display its Security Control window. Info Select Info from the Event Monitor menu bar to open an information dialog box for the selected device. See Information Display in Appendix A, NMS Conventions, in the COMSPHERE 6700 Series Network Management System User s Guide for additional information. Close the Info window to continue with Displays. 3-5

Reports 4 Overview This chapter describes three new reports offered with the Security Manager feature (VF Passwords, Event Control and Event History) and enhancements to the Contact configuration and Device Group configuration reports. Refer to Chapter 10, Reports, in the COMSPHERE 6700 Series Network Management System User s Guide for more information about reports. Configuration Configuration creates a report listing the current NMS configuration records. Two configuration reports, Contact and Device Groups, are changed to include call security information. Contact Use the Contact command to generate a report of all the contacts configured in NMS. The following call security information can be configured in a contact list (see Chapter 2, Network Configuration) and viewed in a Contact Configuration Report. 4-1

Reports Login ID The user s login. Login Password The user s password. Access Times The hours of the day that the user owning the login ID has permission to dial in to NMS. Security Groups All security groups with which the user login ID is associated. Device Groups Use the Device Groups command to generate a report of all the device groups configured in NMS. Devices can be placed into a device security group to make it easier to configure more than one device with the same set of passwords and security options (see Configuring the Network Elements in Chapter 2). The device security group information can then be viewed in a configuration report by using the Print All command. The fields in a Device Security Group Configuration Report are as follows: Security Group The security group name entered on the Device Group Configuration input form. Comments Any comments entered during configuration. 4-2 February 1998 6700-A2-GB41-30

Reports Answer Security Mode The security mode assigned to the group name. Valid entries are the following: VF indicating that the local device must verify the password transmitted using DTMF tones. Login Only indicating that the DTE requires a password from the device before it permits access. VF/DTE indicating that both types of passwords are required by this security device group. Auto Dialer Security If enabled, then the user must issue a unique command to the modem before the user can issue a dial command. Call Failure Reporting If enabled, the modem reports call failures to the Security Manager. Call Success Reporting If enabled, the modem reports successful calls to the Security Manager. Devices in Group Lists the devices in the security group. Login Passwords Lists the login passwords associated with the group. VF Passwords Lists the VF passwords associated with the group. VF Security Use the VF Security command to generate a report of the VF names configured in NMS. See the Configuring Call Security section in Chapter 2, Network Configuration. Procedure To create a VF Security Report: 1. Select Call Security from the Config pull-down menu. 2. Choose VF Passwords from the Call Security menu. The VF Passwords input form displays. 3. Enter information into the fields. 4. Choose Save from the Action menu. 4-3

Reports 5. Choose either of the following from the Action menu: Print. The currently displayed VF password name will be printed. Print All. All VF names currently stored in the database will be printed. You can also use the following procedure to generate this report: Procedure 1. Select Reports from the Main Menu. 2. Select Configuration from the Reports pull-down menu. 3. Select Type from the Device Configuration Report menu bar. 4. Select VF Security. The fields on the VF Password Report are described as follows: VF Name The name used to identify the VF password within the Security Manager feature. VF Password The password that allows the remote device to gain access to the training sequence of a local device. Comments Any comments entered during configuration. Access Type What additional security is needed to gain access to the DTE side of the local device when the VF password is used. Valid entries are the following: VF Only indicates that only the VF password is needed. User Login indicates that a valid security password must be entered. Security Groups All security groups associated with the VF password. 4-4 February 1998 6700-A2-GB41-30

Reports Event Control Priorities Report Event controls and their assigned priorities can be printed. Procedure To print event priorities: 1. Select Alerts and Events from the Config pull-down menu. 2. Choose Event Controls Call Security from the Alerts and Events cascading menu. The Event Controls Call Security window displays. 3. Enter the information. 4. Choose Save from the Action menu. 5. Choose Print from the Action menu. Event History Use Event History to create a report listing all the events that occurred during a selected period of time. Procedure To create an Event History Report: 1. Select Event History from the Reports pull-down menu. The Event History Report window appears. 2. Select either All Devices or choose the Devices button to use the Selection Browser to select the devices to appear in the report. 4-5

Reports 3. Select the report period start date using the From Date scrolling date range field. 4. Select the report period start time using the From Time scrolling time range field. 5. Select the report period end date using the To Date scrolling date range field. 6. Select the report period end time using the To Time scrolling time range field. Refer to the Date Field and Time Field sections of Appendix A in the COMSPHERE 6700 Series Network Management System User s Guide for additional information. 7. Select the report destination, either the display or the printer. 8. Choose Execute. 9. Choose Print if you are currently displaying a report and you want to print it. The following shows an Event History Report. The fields for an Event History Report are as follows: Date The date that the event occurred. Time The time that the event occurred. User ID Either the login ID or the VF name (indicated by an asterisk). Device The name of the device. Event Description Information about the security event. Action The automatic action taken. 4-6 February 1998 6700-A2-GB41-30

Glossary Administrative Password Download DTE Password DTMF Security Group Security Prompts Strings VF VF Password The password required by the device(s) with the security feature before access is permitted to front panel functions. A process that transfers device firmware and software from a locally-attached PC to a device, or allows the duplication of firmware and software from a local device to a remote device. The password required by the device(s) with the security feature before access is permitted to the DTE interface. Dual-Tone Multi-Frequency. A signaling method using two voice frequencies to designate the tones used for touch-tone dialing, as distinguished from pulse dialing. A group of devices that contains VF and/or DTE passwords. The prompts and messages that display when using the login ID and Password access features of the modem. Voice Frequency. The part of the audio frequency range used to transmit voice sound (usually 300 Hz to 3400 Hz). This band is used by the modem for its modulated signal. A series of DTMF signals that the receiving device used to verify that the remote calling device is permitted access. GL-1

Index A Access Security Alarm, 1-1 action commands, 2-3, 2-9 auto dialer, 2-8 B busy out device, 3-3 C call security, 1-3, 2-1, 2-15, 2-16 call security event descriptions, 2-11 call statistics, 1-1 cascade, 2-25 clear event, 3-2 configuring call security, 2-16 contact list, 2-2 device group, 2-6 event controls for call security, 2-11 network alerts, 2-10 elements, 2-2 system attributes and options, 2-14 confirmation required, 3-3 contact list, 2-1, 2-2 action commands, 2-3 control, 3-5 D device groups, 2-1, 2-2, 2-6 device security group, action commands, 2-9 disconnect device, 3-3 download security table, 2-23, 3-3 DTMF, 1-2 E equipment, customer-supplied, 1-3 event control, 2-1 history, file, 1-1 event control, security, 2-13 event history, 2-14 event monitor, 3-1 I include, 3-5 info, 3-5 internal event, 1-3 L login ID, 1-1, 1-3, 2-2, 2-4 password, 1-2, 2-4 N network alerts, 2-1 O option, 2-24 P password administrative, 2-22 login, 1-2, 2-4 security group, 2-5 VF, 1-2, 2-1, 2-16 print, 2-26 IN-1

Index R remove busy out device, 3-3 report configuration, 4-1 contacts, 4-1 device groups, 4-2 event control priorities, 4-5 VF security, 4-3 reset security table, 2-20, 3-2 S security control, 2-1 group password, 2-5 prompt strings, 2-21 security control, 2-19 commands administrative password, 2-22 download security table, 2-23 reset security table, 2-20 security prompt strings, 2-21 setting system options, 2-14 software description, 1-1 sort, 3-4 system attributes and options, 2-1 colors, defining, 2-15 T tile, 2-25 U user ID, 1-2 login, 2-17 profile, 2-14 V VF password, 1-2, 2-1 defining, 2-16 W window, 2-24 IN-2 February 1998 6700-A2-GB41-30