BELL LABS INNOVATIONS Lucent Technologies Access Security Gateway Guard User Manual

Table of Contents

Advertisement

Quick Links

Access Security Gateway
Guard and
Access Security Gateway
Guard Plus
User's Guide
585-212-011
Comcode 108366030
Issue 1
March 1999

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Lucent Technologies Access Security Gateway Guard and is the answer not in the manual?

Questions and answers

Summary of Contents for BELL LABS INNOVATIONS Lucent Technologies Access Security Gateway Guard

  • Page 1 Access Security Gateway Guard and Access Security Gateway Guard Plus User’s Guide 585-212-011 Comcode 108366030 Issue 1 March 1999...
  • Page 2 Copyright © 1999 Lucent Technologies 585-212-011 All Rights Reserved Comcode 108366030 Printed in U.S.A. Issue 1 March 1999 Notice While reasonable efforts were made to ensure that the information in this document was complete and accurate at the time of printing, Lucent Technologies can assume no responsibility for any errors or liability for any direct or consequential damages resulting from use of the information.
  • Page 3: Table Of Contents

    Table of Contents 1. About This Guide .......................1 2. ASG Guard/ASG Guard Plus Overview ..............3 What This Chapter Contains....................3 Terms..........................3 Notation Used in this Guide ....................3 ASG Guard/ASG Guard Plus Physical Overview ..............3 2.4.1 ASG Guard Configuration..................4 2.4.2 ASG Guard Plus Configuration..................4 2.4.3 ASG Guard Front Panel ....................4 2.4.4...
  • Page 4 3.3.4 Power up the ASG Guard/ASG Guard Plus ............22 3.3.5 Verify PSTN Access ....................23 4. Basic Configuration ......................25 What This Chapter Contains....................25 Add the First User Profile....................25 4.2.1 Password/Callback Authentication Method .............28 4.2.2 ASG Key Authentication Method ................30 Specify Network Parameters ...................32 Configure the AUX Port ....................33 Initiate Security on the AUX Port ..................35 Configure a Host Port ......................36...
  • Page 5 List Users – LU Command....................60 Delete a User Profile – XU Command................62 Display a User Record – DU Command.................63 Changing User Information – CU Command..............64 6.10 Set Customer Key – SCK Command ................67 6.11 List Lucent Users – LLU Command.................68 6.12 Block/Unblock Lucent User –...
  • Page 6 8. The Action and Event Tables ..................89 What this Chapter Contains.....................89 Overview ..........................89 Working with Action Tables .....................89 Structure of an Action Table ....................90 8.4.1 Alarm Matching Criteria ...................91 8.4.2 Multiple Actions on a Single Alarm ................92 Planning the Action Table....................92 Action Table Commands ....................95 8.6.1 Adding an item to the Action Table –...
  • Page 7 9.5.5 Save Configuration Data on RAM Disk File - DUMPF Command......120 9.5.6 Put Customer User Table on Remote Device – CDUMP Command ....120 9.5.7 Put Customer User Table on RAM Disk File – CDUMPF Command....120 9.5.8 Load a Configuration File – CONFIG Command...........120 9.5.9 Load a Customer User Table –...
  • Page 8 11.4.4 Using ASG Key......................138 11.4.5 Using Pager Authentication Method ..............140 11.5 Session Control Functions and Commands ..............141 11.5.1 Join Lucent Host – JSL Command................141 11.5.2 Join Host Session – JS Command................141 11.5.3 View Session – VS Command................142 11.5.4 Connect to Lucent Host – CONL Command ............142 11.5.5 Connect to Host –...
  • Page 9 12.10 Telnet Port Parameters....................159 12.10.1 Setting Telnet Port Parameters – ST Command...........159 12.10.2 Display Telnet Port Parameters – DT Command ..........161 12.11 Initiate a PPP Link – PPP Command ................162 12.11.1 Designate a Port as a PPP Port ................162 12.11.2 Initiate a PPP Connection On-Demand..............162 12.11.2.1 ASG Guard/ASG Guard Plus Setup ..............163 12.11.2.2 Setup for PPP Client using "Dial-Up Networking"...
  • Page 10 14.3.11 .DISKCRIT Internal Event..................181 14.3.12 .DISKFULL Internal Event ..................181 14.3.13 .DTRHIGH, .DTRLOW, .DTRHIGH.n, and .DTRLOW.n Internal Events ....181 14.3.14 .HOURLY Internal Event ..................182 14.3.15 .INTBATLOW Internal Event .................182 14.3.16 .INTBATOK Internal Event ..................182 14.3.17 .LOGFULL Internal Event ..................183 14.3.18 .MAXRETRY Internal Event ..................183 14.3.19 .MDMINITERR Internal Event ................183 14.3.20 .MEMLOW Internal Event..................183 14.3.21 .MONTHLY Internal Event..................184...
  • Page 11 14.4.15 RESRELAY Action Routine ...................198 14.4.16 SCHEDULE Action Routine...................199 14.4.17 SETHP Action Routine ..................200 14.4.18 SETRELAY Action Routine ...................201 14.4.19 SNMPTRAP......................202 Appendix A. ASG Key User’s Guide ................203 Appendix B. Port Default Settings ................207 Appendix C. Configuration Files ..................211 Appendix D. Troubleshooting ..................223 Appendix E.
  • Page 12 Page intentionally left blank.
  • Page 13: About This Guide

    1. About This Guide This manual describes the ASG Guard and the ASG Guard Plus. The following is an overview of each chapter. Chapter 1 About This Guide Briefly describes the contents of each chapter. Chapter 2 ASG Guard/ASG Guard Plus Contains an overview of the ASG Overview Guard/ASG Guard Plus operation.
  • Page 14 About This Guide Chapter 11 User Connectivity Explains how to dial into the ASG Guard/ASG Guard Plus and authenticate. Also includes information about joining sessions that are in progress and secure port management. Chapter 12 Network Functions Includes instructions on how to set up the network parameters, such as the IP and Ethernet addresses.
  • Page 15: Asg Guard/Asg Guard Plus Overview

    2. ASG Guard/ASG Guard Plus Overview 2.1 What This Chapter Contains • Figures and descriptions of the front panel connectors for the ASG Guard and ASG Guard Plus • Figures of the rear panel connectors for the ASG Guard and ASG Guard Plus •...
  • Page 16: Asg Guard Configuration

    ASG Guard Overview 2.4.1 ASG Guard Configuration The ASG Guard has the following components: • four Host Ports (Asynchronous DCE Ports – DB9) • two 33.3 Mhz Internal PCMCIA Modems • one 10Base-T Ethernet Port • five Contact Closure Inputs •...
  • Page 17: Asg Guard Rear Panel

    ASG Guard Overview The function of each connector is explained below. Aux Port connector You may administer the ASG Guard via a PC or terminal connected to the front Aux connector. Key switch The key switch is used to turn the ASG Guard on and off. The key can be removed in either the on or off position.
  • Page 18: Asg Guard Plus Rear Panel

    ASG Guard Overview The function of each connector is explained below. Aux Port connector You may administer the ASG Guard Plus via a PC or terminal connected to either the front- or back-panel Aux connector. The SIT (System Initialization Tag) contains information, unique to your ASG Guard Plus, that can be transferred to the ASG Guard Plus by inserting the SIT connector.
  • Page 19: Asg Guard/Asg Guard Plus Functional Overview

    ASG Guard Overview 2.5 ASG Guard/ASG Guard Plus Functional Overview The ASG Guard/ASG Guard Plus provides the following basic functions: • secure access to host device • site connectivity • alarm processing • data buffering Area Function Secure Access As a front end to host devices, the ASG Guard/ASG Guard Plus provides secured access.
  • Page 20: Security Management

    ASG Guard Overview 2.6 Security Management The ASG Guard/ASG Guard Plus maintains a database of authorized users (that is, User Database). Only users listed in the database and who successfully authenticate are allowed access. Authentication methods include password-oriented methods (Password, Callback, and Variable Callback) and token methods (ASG Key and Pager).
  • Page 21: Alarm Management

    ASG Guard Overview 2.7 Alarm Management Alarms and events originate from a number of sources: Data received on a serial port, Timer events, Real-world measurements, as well as other activities internal to the ASG Guard/ASG Guard Plus. When the ASG Guard/ASG Guard Plus processes an alarm or event, it checks the Action Table to determine if it is listed.
  • Page 22: Logs

    ASG Guard Overview 2.8 Logs The ASG Guard/ASG Guard Plus maintains logs containing details of alarms, accesses, host port activity, and system information. These logs are useful for site management, security management, and troubleshooting. All logs are maintained even if the unit is turned off. Each log type is described below.
  • Page 23 ASG Guard Overview Common features included on all menus are title, access level of the user, the commands and the mnemonic for each command. All other ASG Guard/ASG Guard Plus menus are listed, with the letter code that displays them. To display a different menu, enter the command letter assigned to that menu at the ">"...
  • Page 24: Editing Modes

    ASG Guard Overview 2.10 Editing Modes The ASG Guard/ASG Guard Plus supports editing in both the TTY and VT-100 modes. VT-100 mode displays all required information and then allows you to move up and down in a screen to edit lines. In TTY mode, the lines are displayed one line at a time. TTY mode is the default mode. 2.10.1 TTY Mode Information is displayed one line at a time for editing.
  • Page 25: Using The Editing Keys

    ASG Guard Overview 2.11 Using the Editing Keys Most SYSOP Commands display a series of prompts to allow entry of parameters specific to that command. Default or previously entered information is displayed and can be edited using the techniques described here. Table 2-1 shows the editing keys that can be used whenever a field is presented for modification.
  • Page 26: Entering Commands

    ASG Guard Overview 2.12 Entering Commands Commands are organized into command group menus. Each menu lists the commands and the corresponding command mnemonics. If you already know the command you wish to use, you may enter the command mnemonic at the system prompt (>). If you are uncertain of the command, you may display the menu by entering the letter assigned to that menu.
  • Page 27: Entering/Selecting Parameters

    ASG Guard Overview 2.12.1 Entering/Selecting Parameters Parameters are entered or changed by either typing them in or by selecting them from a list of options. The method depends on the command. For example, to enter a new user name in the User Name field (type U, then the ENTER key) of the Add User (type AU, then press the ENTER key) screen, type the user name: CHRIS (or Chris) and then press the ENTER key.
  • Page 28 ASG Guard Overview Page intentionally left blank.
  • Page 29: Physical Connections And Installation

    3. Physical Connections and Installation 3.1 What This Chapter Contains • A description of the LED meanings for the ASG Guard and ASG Guard Plus • The cables and equipment required to install the ASG Guard/ASG Guard Plus • The information you must know if you want to install the ASG Guard/ASG Guard Plus on a network •...
  • Page 30 Physical Connections GROUP FUNCTION Host 1 The upper LED (RX) indicates the unit is in the process of receiving data. Š Š Host 2 Š Š Host 3 The lower LED (DTR) indicates that a device is connected to the port.
  • Page 31: Connecting A Dce Device To A Host Port

    Physical Connections 3.2.2 Connecting a DCE device to a Host Port All ASG Guard/ASG Guard Plus host ports are configured as Data Communications Equipment (DCE) ports. To connect a data communications device (DCE) to an ASG Guard/ASG Guard Plus host port, you must use a "null host" cable. Figure 3-1.
  • Page 32: Installation Of The Asg Guard/Asg Guard Plus

    Physical Connections 3.3 Installation of the ASG Guard/ASG Guard Plus 3.3.1 Cables and Equipment Required The following cables and equipment are required for installing the ASG Guard/ASG Guard Plus: • A local terminal or a PC running a terminal emulation program. It will be used to initialize the ASG Guard/ASG Guard Plus and to administer the Aux port (RS-232 9-pin connection).
  • Page 33 Physical Connections 2. Connect the PC or terminal to the Aux port using a standard 9-pin RS-232C serial cable. It will be used to configure the ASG Guard/ASG Guard Plus and may be disconnected after the ASG Guard/ASG Guard Plus is installed. a.
  • Page 34: Power Up The Asg Guard/Asg Guard Plus

    Physical Connections Figure 3-3. Cable Connections of a Typical System 3.3.4 Power up the ASG Guard/ASG Guard Plus To power up the ASG Guard/ASG Guard Plus, turn the key clockwise to the horizontal position. The red Power LED lights immediately, and the System and Ports LEDs light to indicate the power-up sequence.
  • Page 35: Verify Pstn Access

    Physical Connections The screen with your communication package will show the AUX port information at start-up. It should look similar to the following screen. - - - - - - - - - - - - - - - - - - - ASG Guard v3.7 (F/W 3.7) - - Copyright 1998,MicroFrame Inc.- - All Rights Reserved...
  • Page 36 Physical Connections Page intentionally left blank.
  • Page 37: Basic Configuration

    4. Basic Configuration 4.1 What This Chapter Contains • How to Add a User Profile • Description of Network Parameters • How to Configure the AUX and Host Ports • Securing the AUX Port • Reinitializing the ASG Guard/ASG Guard Plus The ASG Guard/ASG Guard Plus contains a database of authorized users (that is, the User Database).
  • Page 38 Basic Configuration site123>AU CHRIS --- Add User --- User Name CHRIS Access Class Host One Block Access Sessions Allowed (blank=unlimited) User Expiration Date Primary Authentication Method ASG Key Secondary Authentication Method None Auto Execute Command Comments (1): (2): (3): Screen 4-1. Add User Screen Field Function User Name...
  • Page 39 Basic Configuration User Expiration Press the ENTER key to NOT have the user’s access Date privileges expire at a certain date. If the user privileges are to expire on a specific date, enter the date in the specified month/day/year format and press the ENTER key, which the user will no longer have access to the ASG Guard/ASG Guard Plus.
  • Page 40: Password/Callback Authentication Method

    Basic Configuration ASG Key requires a hand-held device known as a token. During login, the ASG Guard/ASG Guard Plus will send a “challenge” number, which the user enters into the ASG Key unit. The unit then generates a “response” number, which the user sends back to the ASG Guard/ASG Guard Plus.
  • Page 41 Basic Configuration After you type the password and press the ENTER key, you will then be prompted to verify your password. Retype the password exactly as you entered it the first time, and then press the ENTER key. --Password/Callback Details-- Enter Password ********** Verify Password...
  • Page 42: Asg Key Authentication Method

    Basic Configuration 4.2.2 ASG Key Authentication Method If ASG Key was selected as the primary authentication method, the ASG Guard/ASG Guard Plus will display the following information after the comments field. -- ASG Key Details -- Encryption Key Source Randomly Generated Screen 4-4.
  • Page 43 Basic Configuration Field Function Fixed The Fixed selection allows you to enter either 14 hex or 20 octal numbers for your source. The ASG Guard/ASG Guard Plus prompts you for the required information. Hex values include the digits 0 to 9 and the letters A to F. Octal values are digits from 0 to 7.
  • Page 44: Specify Network Parameters

    Basic Configuration 4.3 Specify Network Parameters If the ASG Guard/ASG Guard Plus is part of a network, it is necessary to set both the Ethernet and IP addresses that are appropriate for your system. To display the Set Network Parameters screen, type SNP at the system prompt.
  • Page 45: Configure The Aux Port

    Basic Configuration 4.4 Configure the AUX Port The next step in setting up the ASG Guard/ASG Guard Plus is to configure the AUX and host ports of the ASG Guard/ASG Guard Plus. When specifying the parameters of these communications ports, remember that they are independent of each other and should be set according to their specific use.
  • Page 46 Basic Configuration Baud Rate Speed at which the ASG Guard/ASG Guard Plus transmits data to and receives data from the AUX Port. Press the SPACE BAR until the desired choice is displayed. Press the ENTER key when the desired speed appears. 300 bps 9600 bps 1200 bps...
  • Page 47: Initiate Security On The Aux Port

    Basic Configuration Sysop Idle Timer Maximum number of minutes of inactivity during a Sysop session (that is, between the user and the ASG Guard/ASG Guard Plus) before the session is terminated. Options are None, 1 min, 5 min, 10 min and 20 min. Press the SPACE BAR until the desired choice is displayed.
  • Page 48: Configure A Host Port

    Basic Configuration 4.6 Configure a Host Port A host port connects the ASG Guard/ASG Guard Plus to a host device, for example, PBX, router, hub, voice mail, etc. The settings for each host port can be set independently and should be identical to the host device settings.
  • Page 49 Basic Configuration Field Function Initially No appears on the screen. Press the Restore Factory Defaults SPACE BAR to toggle to Yes. Select Yes to restore the settings with which the ASG Guard/ASG Guard Plus was shipped. Select No to keep the current settings. Default settings are listed in the appendix at the end of this manual.
  • Page 50 Basic Configuration Flow Control Type of flow control applied to the Host Port. Choices are RTS/CTS (hardware), XON/XOFF (software), None. Press the SPACE BAR until the desired choice is displayed. The remaining parameters on this screen specify 1.) whether data received by a host port is saved to the ASG Guard/ASG Guard Plus RAMdisk or is discarded, and 2.) the modem used for alarm delivery.
  • Page 51 Basic Configuration The following prompts are based on previous responses to the Alarm Filter field: Modem Used for Alarm This prompt has three options: First Available, Delivery Modem 1, and Modem 2. First Available option will use either Modem 1 or Modem 2, whichever one is available.
  • Page 52: Re-Initialize The Asg Guard/Asg Guard Plus Via The Aux Port

    Basic Configuration 4.7 Re-Initialize the ASG Guard/ASG Guard Plus via the AUX Port WARNING!: This procedure will erase all modifications to the unit including all user files, action routines, logs, and all other settings. Prior to performing this procedure, we recommend that you back up your unit.
  • Page 53: Modem Port Setup

    5. Modem Port Setup 5.1 What This Chapter Contains • Overview • How to display and set modem parameters • Explanation of each parameter 5.2 Overview The parameters of each modem port specify the configuration of the port. Modem port parameters must be set correctly in order for you to successfully dial into the ASG Guard/ASG Guard Plus from a remote location and for the ASG Guard/ASG Guard Plus to dial out.
  • Page 54 Modem Port Setup ASGGUARD1>DM --- Display Modem Port Params --- Modem Number Baud Rate Settings: Modem Control Strings 19200 User Session CONNECT n Char. Length / Parity 8 / None Terminal Emulation Sysop Idle Timer None Host Session Idle Timer None Host Session Disconnect on Ctrl+A Modem Control Strings ( Use ’|’...
  • Page 55: Set Modem Port Parameters - Sm Command

    Modem Port Setup 5.3.2 Set Modem Port Parameters – SM Command The SM command enables you to display and change the parameters for each modem port. Parameters include baud rate settings, parity, and terminal emulation. Type SM at the system prompt to display modem port parameters. Modem Number Baud Rate Settings: Modem Control Strings...
  • Page 56 Modem Port Setup Press the SPACE BAR until the desired choice is displayed. When the speed you want appears in the field, press the ENTER key to select that speed and advance to the next parameter. Available baud rates are 300,1200, 2500, 4800, 9600, 19200, 38400 and 57600.
  • Page 57 Modem Port Setup Terminal Emulation Specify the type of terminal that your computer is emulating when your computer is connected to the Modem Port via a remote modem. Press the SPACE BAR to toggle between TTY and VT100. If your computer is emulating a DEC VT-100 terminal, select VT100.
  • Page 58 Modem Port Setup Hangup Defines the sequence for hanging up the line ~+++~AT|~ATS0=0 H0| where ~+++~ escape sequence ATS0=0 disables auto answer ATH forces modem on-hook hang up Dial Strings Modem The command string used to initiate a dial-out sequence with the modem. This is typically used as part of a Callback authentication process or to deliver an alarm.
  • Page 59: Verify The Settings

    Modem Port Setup 5.4 Verify the Settings To ensure that the settings are correct, do the following: 1. Dial into the ASG Guard/ASG Guard Plus to verify that you can access it. Log on as a Master user. If you cannot dial in, check the modem port settings. 2.
  • Page 60 Modem Port Setup Page intentionally left blank.
  • Page 61: Modifying The User Database

    6. Modifying the User Database 6.1 What This Chapter Contains • Overview • User Maintenance Functions Menu • How to Add, Delete and Change Information in the User Database • Description of Access Level and Authentication Methods 6.2 Overview The ASG Guard/ASG Guard Plus maintains a database of authorized users. Each user who accesses the ASG Guard/ASG Guard Plus or a host(s) through a dial-up port or network connection must have been added to the database.
  • Page 62: Display The User Maintenance Functions Menu

    Modifying the User Database 6.3 Display the User Maintenance Functions Menu The User Maintenance Functions Menu displays all commands associated with adding, deleting and changing information in the Customer User Table. To display the User Maintenance Functions Menu, type U at the system prompt and press the ENTER key.
  • Page 63: Command Summary

    Modifying the User Database 6.4 Command Summary The Customer User Table contains the records for authorized customer users of the ASG Guard/ASG Guard Plus system. Table 6-1 lists the commands to administer the Customer User Table. The table includes a brief description of each command and lists the access level that a user must have to successfully issue the command.
  • Page 64: Add A User - Au Command

    Modifying the User Database 6.5 Add a User – AU Command The AU command allows you to add a user to the ASG Guard/ASG Guard Plus system (that is, add a user to the Customer User Table). To access the system, a password or authentication token is required.
  • Page 65 Modifying the User Database Field Function Enter a user name. User names may be up to 15 alphanumeric User Name characters in length, including spaces. NOTE: The ASG Guard/ASG Guard Plus converts alphabetical characters to upper case. Access Class To select the Access Class, press the SPACE BAR until the desired choice is displayed from the following selections: Host “n”- Allows user access to the host port associated with the host “n”...
  • Page 66: Asg Key Authentication Method

    Modifying the User Database Field Function Primary Authentication Press the SPACE BAR until the desired choice is displayed from Method the following selections: ASG Key, Pager and Password/Callback. NOTES: Depending on which method of authentication you select, you are prompted for further information after you complete the main portion of this screen.
  • Page 67: Encryption Key Source

    Modifying the User Database 6.5.1.1 Encryption Key Source Press the SPACE BAR until the desired choice is displayed from the Encryption Key Source selections for the ASG Key authentication method. Each selection is described in subsequent paragraphs. When the appropriate source is displayed, press the ENTER key to select it. After the ENTER key is pressed, the system will confirm that the user has been added to the database.
  • Page 68: Encryption Key Source: Device Id/User Code

    Modifying the User Database 6.5.1.3 Encryption Key Source: Device ID/User Code The ASG Guard/ASG Guard Plus uses the Device ID and the User Code to generate the seed information for the ASG Key authentication method. The ASG Guard/ASG Guard Plus prompts you for the information.
  • Page 69: Password/Callback Authentication Method

    Modifying the User Database 6.5.2 Password/Callback Authentication Method If Password/Callback was selected as the primary authentication method, the ASG Guard/ASG Guard Plus will display the following information. . • Password/Callback Details— Enter Password ********** Verify Password ********** Access Option Regular Callback Screen 6-7.
  • Page 70: Access Option: Passthru

    Modifying the User Database NOTE: Enter the phone number as the system needs to dial it. For example, if you have to dial 9 to get an outside line, or if the number is in a different area code and you need to dial a 1 first, enter those numbers as well.
  • Page 71 Modifying the User Database The user must dial back into the ASG Guard/ASG Guard Plus. After entering the User ID, the user is prompted to the enter password sent by the ASG Guard/ASG Guard Plus. After entering the password correctly, the user is allowed access. --- Connected to Site: Ser#6400434 --- ASG Guard - User Authentication ---...
  • Page 72: List Users - Lu Command

    Modifying the User Database 6.6 List Users – LU Command Type LU at the system prompt, and press the ENTER key to display the list of users in the Customer User Table. These users are authorized to initiate a Sysop or Host session with the ASG Guard/ASG Guard Plus.
  • Page 73 Modifying the User Database Field Function User Name List of all users in the Customer User Table authorized to access the ASG Guard/ASG Guard Plus, or other device connected to the ASG Guard/ASG Guard Plus. Acc. Class The Access Class defined for that user. Access classes are listed below: Host n (number of host ports depends on the ASG Guard or ASG Guard Plus...
  • Page 74: Delete A User Profile - Xu Command

    Modifying the User Database 6.7 Delete a User Profile – XU Command The Delete User command deletes all records associated with that user from the Customer User Table of the ASG Guard/ASG Guard Plus User Database. After a user profile has been deleted, the user cannot access the ASG Guard/ASG Guard Plus.
  • Page 75: Display A User Record - Du Command

    Modifying the User Database 6.8 Display a User Record – DU Command The Display User Record command displays the entire record for the user selected. The Display User Record command accepts the user name as a parameter on the command line. If the command is entered without a user name, the system will prompt you to enter one.
  • Page 76: Changing User Information - Cu Command

    Modifying the User Database 6.9 Changing User Information – CU Command The Change User (CU) command allows you to change the information of a user in the Customer User Table. Type CU and the user name, and then press the ENTER key to display the current information for that user, line-by-line.
  • Page 77 Modifying the User Database Field Function User Name Enter the user name as it appears in the List User display. You may also type the user name as part of the command. For example: >CU or >CU TOM Access Class To change the Access Class, press the SPACE BAR until the desired choice is displayed from the following selections: Host n (Number of host ports will vary depending on the...
  • Page 78 Modifying the User Database Auto Execute Command (Optional) Enter a command to automatically execute after that user has been authenticated by the system. The user must log on as a Sysop 1 or higher. For example, if you enter LH - the log history will be displayed in reverse order after the user authenticates.
  • Page 79: Set Customer Key - Sck Command

    Modifying the User Database 6.10 Set Customer Key – SCK Command The Set Customer Key command provides a facility to set an Encryption Key (Key). This Key is used to encrypt secret user information such as passwords and Keys. The Key is used to encrypt this data when stored inside the ASG Guard and when the Customer User Table is exported via the Cdump/Cdumpf command.
  • Page 80: List Lucent Users - Llu Command

    Modifying the User Database 6.11 List Lucent Users – LLU Command The List Lucent Users command provides a list of the Lucent Users loaded in the ASG Guard. This table output will display the Lucent User I.D., Access Class, Block Status, Expiration Date, # of Sessions before the user Expires &...
  • Page 81: Block/Unblock Lucent Administration - Bla Command

    Modifying the User Database 6.14 Block/Unblock Lucent Administration – BLA Command The Block/Unblock Lucent Administration command provides or removes rights to a Lucent Master to administer the Customer Users. This command, when in the Unblock mode, gives the Lucent Master user access to the Add User, Delete User, and Change User command. This command is only available to the Cmaster user.
  • Page 82 Modifying the User Database Page intentionally left blank.
  • Page 83: File Buffering

    7. File Buffering 7.1 What This Chapter Contains • Overview • RAMdisk organization • File naming conventions • RAMdisk protection parameters • Saving and transferring data received by a host port • Setting up automatic and manual buffering • List of RAMdisk events 7.2 Overview Each host port of the ASG Guard/ASG Guard Plus receives data from the resource to which it is connected.
  • Page 84: File Management Menu

    File Buffering 7.3 File Management Menu The File Management Menu is organized into two sections: Disk/File Maintenance Functions and Buffer Functions. The Disk/File Maintenance Functions section lists the commands by which the user may edit or manipulate files from the ASG Guard/ASG Guard Plus RAMdisk. The Buffer Functions section lists commands for collecting data into files and for sending to the administration PC.
  • Page 85: Ram Disk Organization

    File Buffering 7.4 RAM Disk Organization The space available on the RAM disk is 32 MB. Approximately 2 MB is used by the operating system, and the remainder is available for storage. You may create and remove subdirectories, and copy, move, rename and delete files. The directories listed below are automatically created by the system: 1.
  • Page 86 File Buffering Files collected via host port data by the ASG Guard/ASG Guard Plus are stored in the directory of that host port and are assigned sequential names in order to provide the user a means of identifying when and where the data in the file was gathered. The ASG Guard/ASG Guard Plus uses following naming convention: Hnyymmdd.hhq Where:...
  • Page 87: Set The Ram Disk Protection Parameters

    File Buffering 7.5 Set the RAM disk Protection Parameters You should verify that the RAM disk protection parameters are appropriate for your application. The RAM disk protection feature prevents the disk from running out of room, which could result in the loss of data.
  • Page 88 File Buffering Field Function Keep SENT Files for how many days? Enter the number of days that files in the /SENTFILES directory should be kept. Files that have been sent to the administration PC are automatically moved to this directory. Files that have been closed for the specified number of days old will be deleted at midnight.
  • Page 89: Buffering Data Received By A Host Port

    File Buffering 7.6 Buffering Data Received by a Host Port The ASG Guard/ASG Guard Plus provides both automatic and manual control of data buffering from the host ports. If automatic buffering is selected, a buffer file for the specified port will be opened and data collected until either a specified time or file size is reached.
  • Page 90 File Buffering Field Function Enable Automatic Buffering Initially No appears on the screen. Press the SPACE BAR to toggle to Yes. Select Yes for automatic buffering. Select No to disable it. Compress closed buffer files? Initially No appears on the screen. Press the SPACE BAR to toggle to Yes.
  • Page 91: Manual Buffering

    File Buffering 7.6.2 Manual Buffering Buffers can be opened, closed and switched manually by the Administrator. To do this, use the buffer commands listed in the File Management Menu. Command Function OPBUF Open buffer Opens a buffer for a port. You will be prompted for the port number.
  • Page 92: Sending Buffer Files To The Administration Pc

    File Buffering 7.6.4 Sending Buffer Files to the Administration PC A file stored on the ASG Guard/ASG Guard Plus RAM disk can be sent to the administration PC or another device. Typically, the files transferred are closed buffer files from a specified host port and are sent to the administration PC for long term storage, review, or importation into another software package.
  • Page 93: Using Ftp To Send Files To Another Device

    File Buffering 3. After the transfer has been completed, the message "Transfer complete" will be displayed and the file(s) moved to the \SENTFILES directory of the RAMdisk. SEBUF transmits all closed buffer files from the selected host port directory. SEBUF can also transmit files via FTP if the FTP parameters have been set up and FTP has been specified.
  • Page 94 File Buffering NOTE: User name and password are case-sensitive. Field Function Initially No appears on the screen. Press the Restore Factory Defaults SPACE BAR to toggle to Yes. Select Yes to restore original factory settings, or Select No to keep the current values. NOTE: There are two FTP parameters, which have factory default settings.
  • Page 95: Sending The File(S) Via Ftp

    File Buffering 7.6.6.2 Sending the File(s) via FTP Files may be sent using FTP from the ASG Guard/ASG Guard Plus to another device by issuing the SEND or SEBUF command. However, you must set the FTP parameters prior to using these commands.
  • Page 96: Receiving Files

    File Buffering 7.7 Receiving Files The ASG Guard/ASG Guard Plus can receive files into the current directory from an active port. Either XMODEM, ASCII, or FTP may be specified as the protocol. The RCV Command to receive files from the active port into an existing directory on the ASG Guard/ASG Guard Plus.
  • Page 97: Managing Files

    File Buffering 7.8 Managing Files Most of the commands used to manage files and directories on the RAM disk are the same as those used in DOS. Specifically: • CD - Change Directory • MD - Make Directory • RD - Remove Directory •...
  • Page 98: File Command Summary

    File Buffering 7.9 File Command Summary Command Function Displays the files in the current directory. Directories are indicated by <DIR> adjacent to the name, along with their creation date and time. Makes a new directory under the current directory. MD <newdirectoryname> Example: MD newdir Creates a new directory named newdir under the current directory.
  • Page 99 File Buffering Command Function MOVE <source directory>/<filename> <destination directory>\<filename> Examples: MOVE \sentfiles\H4961212.2A \newdir\H4961212.2A To move a file from the current directory to a new directory MOVE H4961212.2A \newdir\H4961212.2A Command to receive files from the active port into the current directory on the ASG Guard/ASG Guard Plus using XMODEM, ASCII, or FTP transfer.
  • Page 100: Ram Drive Events

    File Buffering 7.10 RAM Drive Events The ASG Guard/ASG Guard Plus, in response to certain RAM drive conditions, will generate events which are part of the standard software/firmware. These standard events are as follows: .BUFREADY A buffer file has been closed and is ready to be sent. .DISKCRIT The RAM drive has reached the critical level assigned in the Set Disk Parameters screen.
  • Page 101: The Action And Event Tables

    8. The Action and Event Tables 8.1 What this Chapter Contains • Definition and Purpose of an Action Table • Definition of Alarms and Events • How to Create an Action Table • Action Table Worksheet • List of Internal Events and Action Routines 8.2 Overview The ASG Guard/ASG Guard Plus can monitor and report alarm conditions sent by a PBX or other device connected to a host port of the ASG Guard/ASG Guard Plus.
  • Page 102: Structure Of An Action Table

    Action and Event Tables 8.4 Structure of an Action Table The Action Table consists of a list of alarms, the requested action (Action Routine), parameters associated with the action, and comments. A typical Action Table is shown below. Site123>LA --- List Action Items --- Alarm: Routine: Parameters: Comments:...
  • Page 103: Alarm Matching Criteria

    Action and Event Tables Parameters Action routines typically have parameters associated with them. A parameter may be a phone number, a pager number, or other information used by the Action Routine. Comments The comment may give more information about the alarm. With some Action Routines, when the ASG Guard/ASG Guard Plus processes an alarm, the comment is sent along with it.
  • Page 104: Multiple Actions On A Single Alarm

    Action and Event Tables 8.4.2 Multiple Actions on a Single Alarm In some instances you may want more than one action to occur when a single alarm is detected. For instance, a hacking attempt may be reported to two different people. In that case, the DOLIST command is used.
  • Page 105 Action and Event Tables SCHEDULE routine has the parameter "15 PHONHOME". That means that the ASG Guard/ASG Guard Plus will schedule a PHONHOME action 15 minutes after the alarm occurs. The reasoning behind this example is that a maintenance center, for instance, will probably want to be alerted to an unsuccessful system reload to check its status.
  • Page 106 Action and Event Tables ACTION TABLE WORKSHEET Alarm, Message, or Internal Event Action Routine Routine Parameters...
  • Page 107: Action Table Commands

    Action and Event Tables 8.6 Action Table Commands The Action and Alarm Functions Menu contains commands for maintaining the Action Table as well as the Event Table. Type A at the system prompt and press the ENTER key to display the Action and Alarm Functions Menu.
  • Page 108 Action and Event Tables Field Function Alarm Enter the alarm issued by the protected device or an ASG Guard/ASG Guard Plus internal event (internal events are listed at the end of this chapter) and press the ENTER key. Action Routine Enter the name of the Action Routine.
  • Page 109: List Action Items - La Command

    Action and Event Tables The system confirms that you have added an action item by displaying a confirming a log entry and displaying the system prompt. 8.6.2 List Action Items – LA Command The List Action Items command displays the Action Table, which contains the following information: •...
  • Page 110: Change Action Item - Ca Command

    Action and Event Tables 8.6.3 Change Action Item – CA Command The Change Action Item command allows you to modify an existing action item. Type CA at the system prompt and press the ENTER key to display the Change Action Item screen. Site123>CA --- Change Action Item --- Alarm:...
  • Page 111: Delete Action Item - Xa Command

    Action and Event Tables Field Function Parameters Type the parameter, or parameters, that you want to associate with this Action Routine. Press the ENTER key to advance the cursor to the next field. Schedule Date The day on which you want the Action Routine to activate, where: today = The Action Routine is scheduled to occur today at the time specified (pressing the ENTER key selects this date).
  • Page 112 Action and Event Tables SITE1231>XA --- Delete Action Item --- Alarm: Routine: Parameters: Comments: 1) .DAILY PHONHOME 2 health check 2) .DTA005 SCHEDULE AM PHONHOME DTI YELLOW ALARM 3) .DTA007 CANCEL .DTA005 YELLOW ALARM CLEARED Select # -> 1 (Ctrl-A to quit) .DAILY PHONHOME 2 health check...
  • Page 113: Alarm/Event Functions Commands

    Action and Event Tables 8.7 Alarm/Event Functions Commands The Alarm/Event Functions allow you to change or delete pending alarms and events. After an alarm is issued, it is placed in the event table for processing. You can list the pending actions contained in the Event Table.
  • Page 114 Action and Event Tables Type GE followed by the event that you want the ASG Guard/ASG Guard Plus to generate. For example, type GE .AUTHFAIL. to generate the event .AUTHFAIL. You can also generate a "long" event - for example, GE DTA005 1 0020 0031 7. Ser#98100221>GE .AUTHFAIL --- Generate Alarm/Event --- 02/26/99 10:23:45 9573 [AUX] Event/:.AUTHFAIL...
  • Page 115: Delete Alarm/Event - Xe Command

    Action and Event Tables 8.7.3 Delete Alarm/Event – XE Command The Delete Alarm/Event command allows you to remove a pending action from the Event Table. An access class of Sysop 2 or higher is required. Type XE at the system prompt and press the ENTER key to display the Delete Alarm/Event screen.
  • Page 116: Internal Alarms And Events

    Action and Event Tables 8.8 Internal Alarms and Events In addition to the alarms generated by the Host or PBX system, the ASG Guard/ASG Guard Plus supports several internal events. Chapter 14 contains a complete description of each internal event and standard Action Routines and required parameters. Table 8-1.
  • Page 117 Action and Event Tables Event Description .INTBATOK Event occurs when the internal battery status has been changed from Low to OK. For the .INTBATOK event to be generated, the voltage must go from <11 volts to above 11.5 volts. .LOGFULL Created by LOGCHECK.
  • Page 118 Action and Event Tables Event Description .TEMPOK Event occurs when temperature changes from a high or low condition to an OK condition. .WEEKLY Event occurs once a week, each Sunday at midnight.
  • Page 119: Action Routines

    Action and Event Tables 8.9 Action Routines The ASG Guard/ASG Guard Plus is pre-programmed with a number of Action Routines that can be used when alarms or internal events occur. These Action Routines are summarized in Table 8-2 and described fully in Chapter 14. Table 8-2.
  • Page 120 Action and Event Tables Page intentionally left blank.
  • Page 121: System Functions

    9. System Functions 9.1 What This Chapter Contains • Overview • Site Information Parameters • Scheduling Parameters • Modem Action Routine Parameters • Software Upgrade Information 9.2 Overview The System Functions Menu provides commands for setting and displaying system and environmental manager functions.
  • Page 122 System Functions The System Parameters Functions menu has three functional groups: System Parameters Functions, Environmental Control Functions and Device Management Functions. System Parameters Functions The commands in this functional group enable you to set and display system parameters including the host processing flag and the date and time of the ASG Guard/ASG Guard Plus. Environmental Control Functions The commands in this function group enable you to set and display sensor and contact inputs and alarms.
  • Page 123: System Parameter Functions

    System Functions 9.4 System Parameter Functions The commands in this functional group enable you to set and display system parameters including the host processing flag and the date and time of the ASG Guard/ASG Guard Plus. 9.4.1 Set System Parameters – SSP Command The Set System Parameters (SSP) command enables you to set site information, scheduling parameters and default telephone numbers.
  • Page 124 System Functions Field Function Site Name Descriptive name of the ASG Guard/ASG Guard Plus (USN = Unit Ser. Number) location. When information is sent to another device, the site name is included automatically. Additionally, the site name is shown at the prompt. The site name may have a maximum of 30 alphanumeric characters.
  • Page 125: Scheduling Parameters

    System Functions 9.4.1.2 Scheduling Parameters After entering SSP, type 2 to set the Scheduling Parameters and press the ENTER key. In this section, the start of the overnight or P.M. period, the time of the A.M. report, and the number of times the ASG Guard/ASG Guard Plus will try to execute a rescheduled event, such as paging, are set.
  • Page 126: Modem Action Routine Parameters

    System Functions 9.4.1.3 Modem Action Routine Parameters Type 3 to set the modem Action Routine parameters and press the ENTER key. >ssp --- Set System Parameters --- 1 = Site Information 2 = Scheduling Params 3 = Modem Action Routine Params Select Group -->3 -- Modem Action Routine Parameters -- Home Phone Number 1 (Default)
  • Page 127: Display System Parameters - Dsp Command

    System Functions Default Action Routine Modem The modem that is used by Action Routines unless a different modem is specified. Press the SPACE BAR until the appropriate choice is displayed. 9.4.2 Display System Parameters – DSP Command The Display System Parameters (DSP) and Set System Parameters (SSP) commands enable you to view or set site information, scheduling parameters and default telephone numbers.
  • Page 128: Set Host Processor Flag - Shp Command

    System Functions To change any of these settings, type SSP at the system prompt. The following screen appears. Site123>SSP --- Set System Parameters --- 1 = Site Information 2 = Scheduling Params 3 = Modem Action Routine Params Select Group -->1 Screen 9-7.
  • Page 129: Set Date And Time - Sdt Command

    System Functions 9.4.4 Set Date and Time – SDT Command The Set Date and Time command (SDT) allows the user to set the date format to one of ten options and to set the actual date and time. Type SDT at the system prompt and you will see (one line at a time): Site123>...
  • Page 130: Device Management Functions

    System Functions 9.5 Device Management Functions The commands in this function group enable you to upgrade the ASG Guard/ASG Guard Plus software, reboot the ASG Guard/ASG Guard Plus, and back up and restore configuration data and the Customer User Table. 9.5.1 Check the Software Version –...
  • Page 131: Upgrade The Software - Upg Command

    System Functions • Site Name: The site name which can be changed using the SSP command. • Unit Serial Number: The unit serial number. • System Date/Time: Current date and time. 9.5.2 Upgrade the Software – UPG Command The Secure ASG Guard/ASG Guard Plus software (Option 1), CCL interpreter (Option 2), and flash memory (E-PROM, Option 3) of the ASG Guard/ASG Guard Plus can be upgraded by copying the files to the appropriate area and using the UPG command.
  • Page 132: View Or Save Configuration Data On Remote Device - Dump Command

    System Functions 9.5.4 View or Save Configuration Data on Remote Device - DUMP Command The DUMP command allows the user to either view or save the ASG Guard/ASG Guard Plus configuration. The entire configuration or any portions thereof can be viewed or saved in a file on an administrative personal computer.
  • Page 133: Environmental Manager

    Environmental Manager 10.1 What This Chapter Contains • Overview • Environmental Manager Menu • How to Monitor Conditions by Using the Environmental Manager • Defining Threshold Limits 10.2 Overview The Environmental Manager uses analog sensors to monitor conditions such as temperature, humidity, and battery voltage.
  • Page 134: Environmental Manager Functions And Commands

    Environmental Manager 10.4 Environmental Manager Functions and Commands Environmental functions are included in the system menu. To display the menu, type S at the system prompt and press the ENTER key. The System menu has three functional groups: System Parameters Functions, Environmental Control Functions, and Device Management Functions.
  • Page 135: Set Relays - Srly Command

    Environmental Manager 10.4.5 Set Relays – SRLY Command The command for setting relays, SRLY, applies to the ASG Guard. The ASG Guard has two solid state relays: one latching (selection 1) relay and one non-latching (selection 2) relay. Latching relays are open by default. Once activated, they close and then remain closed until the RRLY command is issued.
  • Page 136: The Environmental Manager

    Environmental Manager 10.5 The Environmental Manager As mentioned in the previous section, the interface for the ASG Guard Plus Environmental Manager is a 50-pin Amphenol connector located on the back panel. See Figure 10-1 and Table 10-1. The ASG Guard uses the Euroblock connections for accessing the relay outputs and contact closure inputs, as well as RJ45 connections for the two temperature probes and the 0-5 volt analog input.
  • Page 137 Environmental Manager Table 10-1. Pin out of the ASG Guard Plus Environmental Manager PIN NUMBER Telco Color Code* Function WH/BLUE Sensor #1 BLUE/WH Ground WH/ORN PLUS 5 V ORN/WH GROUND WH/GRN SENSOR #2 GRN/WH GROUND WH/BRN PLUS 5 V BRN/WH GROUND WH/SLT SENSOR #3...
  • Page 138: The Environmental Interface Of The Asg Guard

    Environmental Manager PIN NUMBER Telco Color Code* Function BLUE/YL CONTACT CLOSURE #4 YL/ORN CONTACT CLOSURE #5 ORN/YL CONTACT CLOSURE #5 GRN/YL CONTACT CLOSURE #6 YL/GRN CONTACT CLOSURE #6 BRN/YL CONTACT CLOSURE #7 YL/BRN CONTACT CLOSURE #7 SLT/YL CONTACT CLOSURE #8 YL/SLT CONTACT CLOSURE #8 21, 22, 23, 24, 25...
  • Page 139 Environmental Manager Figure 10-2. Back panel of the ASG Guard Table 10-2. Pin out of the ASG Guard 10 Pin Euroblock (Contact Closures) PIN NUMBER Function CONTACT CLOSURE #1 GROUND CONTACT CLOSURE #2 GROUND CONTACT CLOSURE #3 GROUND CONTACT CLOSURE #4 GROUND CONTACT CLOSURE #5 GROUND...
  • Page 140: Relays On The Asg Guard

    Environmental Manager 10.6 Relays on the ASG Guard For the ASG Guard, the No. 1 relay is latching and No.2 is non-latching. 10.7 Defining Threshold Limits – SSA Command In order for the ASG Guard Plus to monitor inputs and issue alarms, you must enable the alarms and set threshold limits.
  • Page 141 Environmental Manager Field Function Restore Factory Defaults? Initially No appears on the screen. Press the SPACE BAR to toggle to Yes. Select Yes to restore factory defaults. Select No to keep the current changes. --Internal Battery-- Alarms Enabled Initially No appears on the screen. Press the SPACE BAR to toggle to Yes.
  • Page 142: Analog Sensors

    Environmental Manager (S3) Alarm Enabled Initially No appears on the screen. Press the SPACE BAR to toggle to Yes. Select Yes to enable the alarm. Select No disable it. . . Normal Range (nn.n-nn.n V ) Enter the upper and lower limits of voltages.
  • Page 143: Contact Closure Inputs

    Environmental Manager 10.9 Contact Closure Inputs The contact closures can be used to control external devices. If a contact closure changes state, an alarm is issued. Each ASG Guard Plus includes eight contact closures. The ASG Guard has 5 contact closure inputs. 10.10 Displaying Analog Sensor Inputs –...
  • Page 144: Displaying The Status Of Contact Inputs

    Environmental Manager 10.11 Displaying the Status of Contact Inputs The state of each contact closure can be displayed. For the ASG Guard Plus base unit, type DCC and press the ENTER key to display the state of each contact closure. Note that the states of eight closures are displayed at a time.
  • Page 145: User Connectivity

    User Connectivity 11.1 What This Chapter Contains • How to initiate a dial-up session • How to authenticate using Password/Callback, ASG Key, and Pager • How to access the ASG Guard/ASG Guard Plus or a host system using auto-baud and auto- parity •...
  • Page 146: Initiate A Dial-Up Session

    User Connectivity Auto-Parity For the ASG Guard/ASG Guard Plus internal modem to determine the parity of your modem, enter characters that have opposite parity. (Half the characters on your keyboard are even and half are odd parity). Entering P and O first is recommended. If these do not result in the terminal displaying the ASG Guard/ASG Guard Plus "greeting"...
  • Page 147: Regular Callback

    User Connectivity 3. Type your password at the system prompt and then press the ENTER key. The password is case sensitive. NOTE: As you type your password, the ASG Guard Plus displays asterisks (*) for security purposes. If the password is correct, you will either be connected to the ASG Guard/ASG Guard Plus or to a host port, depending on your Access Class: •...
  • Page 148 User Connectivity 4. After handshaking has been completed, the ASG Guard/ASG Guard Plus will again request your password. Enter your password at the system prompt. If your password is correct, you will either be connected to the ASG Guard/ASG Guard Plus or to the host port, depending on your Access Class: •...
  • Page 149: Using Variable Callback

    User Connectivity 11.4.3 Using Variable Callback When you use the Variable Callback authentication method, the ASG Guard/ASG Guard Plus will call you back at whatever number you enter. This authentication method is not as secure as Fixed Callback. To dial in to the ASG Guard/ASG Guard Plus using the Password/Callback Variable Callback authentication method: 1.
  • Page 150: Using Asg Key

    User Connectivity --- ASG Guard - User Authentication --- Please Enter User ID ->JOHN --- Password/Callback Authentication --- Enter Password ->****** Phone Number to be Called Back at ->2015551212 --- Please Await Callback --- NO CARRIER RING CARRIER 2400 PROTOCOL: ALT COMPRESSION: CLASS 5 CONNECT 9600 --- ASG Guard - Returning Call ---...
  • Page 151 User Connectivity --- ASG Guard - User Authentication --- Please Enter User ID ->TOM --- ASG Key Authentication --- Challenge =853-2446 Response -> Screen 11-4. ASG Key Authentication Screen 3. Turn on your ASG Key by pressing the ON/C button. A zero ( 0 ) appears in the display window.
  • Page 152: Using Pager Authentication Method

    User Connectivity Enter the response displayed in the ASG Key window into your terminal and press the ENTER key. You are permitted three attempts at entering your User ID and three attempts at entering your response. If the third response is incorrect, the connection is dropped. If you know that you should have access, and that you entered the response correctly, check that the ASG Key initialization was done correctly (see Section 4.1.3).
  • Page 153: Session Control Functions And Commands

    User Connectivity 11.5 Session Control Functions and Commands The ASG Guard/ASG Guard Plus allows a user to participate in or view a host session from a terminal connected to the ASG Guard/ASG Guard Plus. These commands are particularly useful when troubleshooting configuration problems. At the prompt, type P to display the port and session control options, then press the ENTER key.
  • Page 154: View Session - Vs Command

    User Connectivity 11.5.3 View Session – VS Command The VS command enables a sysop or CMaster level user to view, but not join in, a host session in progress. After you type VS, you will be prompted for the number of the host port. At the prompt, enter the host port number.
  • Page 155: Terminal Mode - Vt Command

    User Connectivity 11.5.7 Terminal Mode – VT Command The VT100 command is used to turn on and off VT100 terminal mode. While VT100 is on, all editing commands are displayed on the screen, with all associated prompts. The user may move the cursor to the line to be edited and perform operations there. With VT100 off, the commands are presented in a single prompt format (that is, TTY mode).
  • Page 156: Display Port Signals - Dps Command

    User Connectivity 11.6.2 Display Port Signals – DPS Command The DPS command displays the current status of the control signal for each of the ports. Type DPS at the system prompt and press the ENTER key. If the command is executed with ’VT ON’, the command will loop until a key is pressed.
  • Page 157 User Connectivity The screen will look similar to: Site123>RES H7 --- Reset Port --- 01/04/96 05:40:27 1223 [AUX] Reset Port: H7 - O.K. 01/04/96 05:40:29 78D0 [H] Host 7 Idle Site123> Screen 11-11. Reset Port Screen...
  • Page 158 User Connectivity Page intentionally left blank.
  • Page 159: Network Functions

    12. Network Functions 12.1 What This Chapter Contains • Overview of network capabilities • Setting network parameters • SNMP overview • Establishing a PPP link • Initiating a Telnet session • Setting up FTP • Determining network status 12.2 Overview of Supported Network Functions The ASG Guard/ASG Guard Plus may be connected to your TCP/IP network through either an Ethernet connection or a Point-to-Point Protocol (PPP) link.
  • Page 160: Overview Of Telnet Support By Asg Guard/Asg Guard Plus

    Network Functions NOTE: For specific information on how to establish a PPP link using your TCP/IP communications package, refer to its manual. 12.3 Overview of Telnet Support by ASG Guard/ASG Guard Plus The ASG Guard supports the Telnet protocol. The following Telnet communication is provided: 1.
  • Page 161: Asg Guard/Asg Guard Plus Mib

    Network Functions When both the SNMP Agent and SNMP Management system have the same MIB structure, data can be easily transferred and used. SNMP data packets, each containing an object identifier and information associated with that object, are passed between the device and management system to populate the appropriate fields in the receiver’s MIB.
  • Page 162: Delivery Of Snmp Traps

    Network Functions 12.4.3 Delivery of SNMP Traps The ASG Guard/ASG Guard Plus can send SNMP traps via two mechanisms. If the network manager is on the same LAN or WAN as the ASG Guard/ASG Guard Plus, the trap can be sent with the SNMPTRAP Action Routine.
  • Page 163: Overview Of Ppp Support By Asg Guard/Asg Guard Plus

    Network Functions 12.6 Overview of PPP Support by ASG Guard/ASG Guard Plus PPP is Point-to-Point Protocol, which provides a dial-up connection the ability to emulate a TCP/IP network connection. Using this protocol, a dial-up session can be used to send SNMP alarms or Telnet to a Host Port on the ASG Guard/ASG Guard Plus.
  • Page 164: Set Network Parameters - Snp Command

    Network Functions 12.7.1 Set Network Parameters – SNP Command To set network parameters, type SNP at the system prompt and press the ENTER key. The SNP command is used to set three groups of network parameters: • Group 1 – Network Initialization Parameters •...
  • Page 165 Network Functions Field Function THE IP ADDRESS MUST BE SET BEFORE THE NETWORK MODULE OF THE ASG GUARD/ASG GUARD PLUS IS STARTED. Once the Network has been started, changes to this parameter will take effect only after the ASG Guard/ASG Guard Plus is rebooted. PPP Address (nnn.nnn.nnn.nnn) Enter the PPP address of the ASG Guard/ASG Guard Plus.
  • Page 166: Snmp Manager Parameters

    Network Functions 12.7.1.2 SNMP Manager Parameters The following is a description of how to set the SNMP Manager parameters. Type SNP 2 at the ASG Guard/ASG Guard Plus command prompt. Site123>SNP 2 --- Set Network Params --- Restore Factory Defaults? -- SNMP Manager Parameters -- PPP link needed for trap? Trap format...
  • Page 167: Ftp Parameters

    Network Functions Field Function SNMP Community Name Enter the SNMP community name (up to 20 characters can be used as a name). --IP Addresses for SNMP Manager-- A maximum of five IP addresses can be entered as Manager 1 SNMP Managers to accept SNMP traps. If the IP address is not on the ASG Guard/ASG Guard Plus’s Manager 2 network segment, make sure the default gateway is...
  • Page 168 Network Functions Field Function FTP service type There are two Server Types: NONE and CLIENT ONLY. Use the CLIENT ONLY setting to allow FTP file transfers. Server 1 (default) – IP address (nnn.nnn.nnn.nnn) Enter the IP address of the server. The files transmitted by FTP are sent to this address automatically unless specified otherwise.
  • Page 169: Display Network Parameters - Dnp Command

    Network Functions 12.7.2 Display Network Parameters – DNP Command The DNP command displays network initialization parameters previously set. Type DNP at the system prompt and press the ENTER key. Parameter settings will scroll down the screen as follows: Site123> --- Display Network Params --- -- Network Initialization Parameters -- Start Network on Power-up ? IP Address (nnn.nnn.nnn.nnn)
  • Page 170: Network Startup And Status

    Network Functions 12.8 Network Startup and Status Commands are provided to start the network interface of the ASG Guard/ASG Guard Plus as well as to display the network status. 12.8.1 Startup Network – STARTNET Command The STARTNET command allows the user a one step method for connecting the ASG Guard/ASG Guard Plus to a systems network.
  • Page 171: Querying Remote Nodes - Ping Command

    Network Functions Restore Factory Defaults ? -- Network Initialization Parameters -- Start Network on Power-up ? Ethernet Address (hhhhhhhhhhhh) 08 01 02 00 01 1F IP Address (nnn.nnn.nnn.nnn) 192.9.200.2 PPP Address (nnn.nnn.nnn.nnn) 192.9.200.3 Subnet Mask (nnn.nnn.nnn.nnn) 255.255.255.0 Default Gateway (nnn.nnn.nnn.nnn) Network-Loss Alarm Delay Time Screen 12-5.
  • Page 172 Network Functions Field Function Restore Factory Defaults? Initially No appears on the screen. Press the SPACE BAR to toggle to Yes. Select Yes to reload the values set at the factory. Termination Emulation Select either TTY or VT100 (if supported by your terminal).
  • Page 173: Display Telnet Port Parameters - Dt Command

    Network Functions 12.10.2 Display Telnet Port Parameters – DT Command The DT command displays parameter settings for the Telnet ports. Type DT at the system prompt and press the ENTER key. Telnet parameter fields will be displayed. Site123>DT --- Display Telnet Port Params --- Restore Factory Defaults? Terminal Emulation Sysop Idle Timer...
  • Page 174: Initiate A Ppp Link - Ppp Command

    Network Functions 12.11 Initiate a PPP Link – PPP Command The PPP link can be initiated in the ASG Guard/ASG Guard Plus in one of two ways. The user can either designate a specific port as a dedicated PPP port, or you may initiate a PPP connection on-demand.
  • Page 175: Asg Guard/Asg Guard Plus Setup

    Network Functions 12.11.2.1 ASG Guard/ASG Guard Plus Setup Before an ASG Guard/ASG Guard Plus can support a PPP connection, it must be configured for network operation. To do this, use the Set Network Parameters command and select Option 1 (SNP 1). The following set of options will be presented. IP Address - This is the IP address of the TCP/IP network to which the ASG Guard Plus is attached via the 10BaseT connection.
  • Page 176: Setup For Ppp Client Using "Dial-Up Networking" - Remote Connection

    Network Functions 6. Press the OK button. The original "Make New Connection" screen will appear. Press the "Next>" button. 7. Set up the phone number (and country code, if applicable). When the data is entered, press the "Next>" button. You are now ready to establish a remote connection. 12.11.2.3 Setup for PPP Client using "Dial-Up Networking"...
  • Page 177: Initiating A Telnet Session

    Network Functions 12.12 Initiating a Telnet Session The ASG Guard Plus supports Telnet sessions over its 10base T connection. 12.12.1 Initiating a Telnet Session: Direct Connect The following outlines the steps to take to initiate a direct connect Telnet session using a PC (Windows 95/98 or Windows NT client) on an Ethernet connection to the network: 1.
  • Page 178: Telnet Session Via Ppp Through A Asg Guard/Asg Guard Plus

    Network Functions 12.12.2 Telnet Session via PPP through a ASG Guard/ASG Guard Plus It is possible to use the ASG Guard Plus as a security server into a TCP/IP network. In this scenario, the remote users dial into the ASG Guard/ASG Guard Plus, establish a PPP link, then Telnet to a another device on the network.
  • Page 179: Log Functions

    Log Functions 13.1 What This Chapter Contains • Overview • Description of each log maintained by the ASG Guard/ASG Guard Plus • How to display and clear logs 13.2 Overview The ASG Guard Plus product line contains information about the specific history of the product. In total, there are four areas where this information is stored: Access History Log - Contains information about attempts to access the ASG Guard/ASG Guard Plus.
  • Page 180: The Log Functions Menu

    Log Functions 13.3 The Log Functions Menu The Log Functions Menu provides commands that display records of activity on the ASG Guard/ASG Guard Plus. To display the Log Functions menu, type L at the prompt and press the ENTER key. The commands to display each log type are listed. Site123>l - - - LOG FUNCTIONS ( CMaster ) - - - --- Log Functions ---...
  • Page 181 Log Functions Each entry in the access history log contains the date, time, MAC, User ID, duration, and session type. Command Function Date The month/day/year of the log event. Time The time of day, in hours:minutes at which the event occurred. User ID The User ID of the person who accessed the ASG Guard/ASG Guard Plus.
  • Page 182: Log History - Lh Command

    Log Functions Ser#98100221>ah --- Access History --- Date Time User ID Duration Session Type 11/21/98 10:08 7EA3 AUX_Default 06:43 AUX->Sysop 11/21/98 10:25 F129 GREGG 00:18 TELNET->Sysop 11/21/98 10:25 1CE8 HENRY 01:49 TELNET->Sysop 11/21/98 10:24 4901 AUX_Default 11:24 AUX->Sysop 11/21/98 10:52 1986 AUX_Default 00:10...
  • Page 183 Log Functions LH all Lists the entire Log History, without page breaks, starting with the oldest record. LH -all Lists the entire Log History, without page breaks, starting with the most recent record. LH , matchstring Enter the character string of the Port ID for which the ASG Guard/ASG Guard Plus will search the Log History.
  • Page 184: Failure History - Fh Command

    Log Functions 13.3.3 Failure History – FH Command Type FH and press the ENTER key to display a log of failed attempts to access the ASG Guard/ASG Guard Plus. NOTE: Be sure to type a space between the command and option in the command line. Use a comma to separate options.
  • Page 185 Log Functions Port The port type that the caller attempted to access. Port types are AUX, Host and Modem. Reason The reason that the access attempt failed. Reasons include: Invalid User ID Blocked/Expired ASG Key Invalid Response ASG Key Error Password Invalid Callback Error Time Out...
  • Page 186: Display Error Log - Der Command

    Log Functions 13.3.4 Display Error Log – DER Command Type DER to display the Error Log screen and press the ENTER key. NOTE: Be sure to type a space between the command and the option in the command line. Use a comma between options.
  • Page 187: Clear Log History - Clh Command

    Log Functions 13.3.5 Clear Log History – CLH Command The Clear Log History command clears the system log that contains a record of activity of the ASG Guard/ASG Guard Plus and devices connected to it. Type CLH at the system prompt and press the ENTER key to display the Clear Log History screen.
  • Page 188 Log Functions Page intentionally left blank.
  • Page 189: Events And Action Routines

    14. Events and Action Routines 14.1 What This Chapter Contains • Overview • Description of Events • Description of Action Routines 14.2 Overview The ASG Guard/ASG Guard Plus can be programmed to respond to a particular event or trigger. There are two types of events: Internal and External. An internal event is generated by the ASG Guard/ASG Guard Plus automatically in response to a particular condition, such as a failed authentication attempt or a low battery.
  • Page 190: Bat48High Internal Event

    Events and Action Routines Table 14-1. Authentication Failure Codes Code Description Code Description 0010 Invalid User ID 0050 Invalid password #1 0011 Blocked user 0053 Call Back unsuccessful 0012 Wrong time 0054 Invalid password #2 0032 Invalid ASG Key response 14.3.2 .BAT48HIGH Internal Event The .BAT48HIGH event occurs when the 48V battery being monitored crosses over from an OK threshold to a high voltage threshold.
  • Page 191: Bat48Ok Internal Event

    Events and Action Routines 14.3.4 .BAT48OK Internal Event The .BAT48OK event occurs when the battery being monitored crosses over from a low voltage or high voltage threshold to an OK threshold. These thresholds are set using the Set Sensor Alarms (SSA) command (see Section 10.7). Alarm/Event Action Routine Parameters...
  • Page 192: Cclerror Internal Event

    Events and Action Routines 14.3.8 .CCLERROR Internal Event The .CCLERROR event occurs automatically if the ASG Guard/ASG Guard Plus detects an error in its internal program, or in a user-written Action Routine. Upon generation of a .CCLERROR event, an entry is made in the Error Log. This can be extracted later using the Display Error Log (DER) command (see Section 13.3).
  • Page 193: Diskcrit Internal Event

    Events and Action Routines 14.3.11 .DISKCRIT Internal Event The RAMDISK has reached a critical level assigned in the Set Disk Parameters (SDP) menu. (See Section 7.10.) Alarm/Event Action Routine Parameters Comments .DISKCRIT DOLIST .DISKCRIT-1 PHONHOME .DISKCRIT-2 SCHEDULE 30 PHONHOME In the example above, the .DISKCRIT alarm results in the a call to the default phone number specified in the system parameters.
  • Page 194: Hourly Internal Event

    Events and Action Routines This example schedules a PHONHOME to report the alarm two minutes after DTR is lost (transitions from high to low). If DTR is re-established (DTR goes high), the .DTRHIGH alarm occurs and cancels the action PHONHOME Action Routine. Since no port number is specified, this event will occur when DTR is lost on any port.
  • Page 195: Logfull Internal Event

    Events and Action Routines 14.3.17 .LOGFULL Internal Event This event is a result of the LOGCHECK Action Routine when it detects that the LOG has passed a specified capacity threshold. In order for the .LOGFULL event to occur, the LOGCHECK routine must be associated with some regularly occurring event (such as .DAILY or .HOURLY).
  • Page 196: Monthly Internal Event

    Events and Action Routines In this example, the ASG Guard/ASG Guard Plus will call the default number specified in the System Parameters screen when the remaining space on the ASG Guard/ASG Guard Plus variable area is 4 KB or less. NOTE: .MEMLOW does not detect low memory on the RAMDISK.
  • Page 197: Powerok Internal Event

    Events and Action Routines 14.3.24 .POWEROK Internal Event The .POWEROK event is generated when the external power connection of the ASG Guard/ASG Guard Plus has changed from low to OK. This event can be generated when the power cable to the ASG Guard/ASG Guard Plus has been reconnected.
  • Page 198: Rtslow.n And .Rtshigh.n Internal Events

    Events and Action Routines 14.3.27 .RTSLOW.n and .RTSHIGH.n Internal Events The .RTSHIGH event is generated when the RS-232 RTS signal has changed from low to high. The .RTSLOW event occurs from the RS-232 RTS signal has changed from high to low. The .n indicates the port number.
  • Page 199: Temphigh

    Events and Action Routines 14.3.29 .TEMPHIGH The .TEMPHIGH event occurs when the temperature being monitored crosses over from an OK threshold to a high temperature threshold. These thresholds are set by using the Set Sensor Alarms (SSA) command (see Section 10.7). Example: Alarm/Event Action Routine...
  • Page 200: Weekly Internal Event

    Events and Action Routines Since the .TEMPOK can be rectified from either a high or low state, this one DOLIST will cover both situations. 14.3.32 .WEEKLY Internal Event This event occurs automatically every week on Sunday evening at midnight. Examples: Alarm/Event Action Routine Parameters...
  • Page 201: Action Routines

    Events and Action Routines 14.4 ACTION ROUTINES 14.4.1 AUXCC Action Routine This Action Routine determines which AUX contact closure was closed when assigned to the event .RTSHIGH. It will generate .AUXCC1 if CTS is looped to RTS and .AUXCC2 if DSR is looped to RTS.
  • Page 202: Clkahead And Clkback Action Routines

    Events and Action Routines This example will cancel the action associated with the event .DTRLOW. Alarm/Event Action Routine Parameters Comments DTA007 CANCEL DTA005, , ^2 This example will cancel the action associated with event DTA005 if the second parameter in the DTA007 message is equal to the second parameter in the message associated with this action.
  • Page 203: Dolist Action Routine

    Events and Action Routines 14.4.5 DOLIST Action Routine The DOLIST Action Routine causes a list of actions to be performed. The ASG Guard/ASG Guard Plus scans the Action Table looking for event mnemonics that match or partially match parameter one. Format: DOLIST Name of list Parameters:...
  • Page 204: Logcheck Action Routine

    Events and Action Routines 14.4.7 LOGCHECK Action Routine The LOGCHECK Action Routine checks to see if the log buffer has reached a specified threshold. If the log has exceeded this threshold then the event .LOGFULL is generated. Format: LOGCHECK Parameters: Percent full threshold (Default is 80) Examples: Alarm/Event...
  • Page 205: Page Action Routine

    Events and Action Routines 14.4.9 PAGE Action Routine The PAGE Action Routine calls a numeric pager (beeper) and delivers a numeric message. Format: PAGE PAGER PHONE NUMBER, Message Resource Required: Modem Parameters: phone number, message • Pager Phone Number - Phone number of pager (optional) •...
  • Page 206: Phiris Action Routine

    Events and Action Routines Examples: Alarm/Event Action Routine Parameters Comments .AUTHFAIL PAGE This example calls a pager at the default number, when an authorization failure occurs, and delivers the default message to the pager. Alarm/Event Action Routine Parameters Comments .BAT48LOW PAGE 5551324,9990001 This example calls a pager at the number 555-1324 and delivers the message "9990001"...
  • Page 207: Phonhome Action Routine

    Events and Action Routines Alarm/Event Action Routine Parameters Comments DTA005 PHIRIS xxxxxxxxx C\digit trunk This example telephones IRIS at phone number xxx-xxx-xxxx (where x is a valid digit) when the event external event DTA005 occurs. The PHIRIS Action Routine requires a comment entry starting with either C\ or M\ which represents the criticality of the alarm.
  • Page 208: Phppp Action Routine

    Events and Action Routines 14.4.12 PHPPP Action Routine The PHPPP Action Routine initiates a demand-dial PPP link. Format: PHPPP Resource required: Modem phone number Parameters: 1 - Phone number to dial (1, 2, or 3 are home numbers). Example: Alarm/Event Action Routine Parameters Comments...
  • Page 209: Reminit Action Routine

    Events and Action Routines Alarm/Event Action Routine Parameters Comments DTI030 PHSYSOP This example phones the Sysop at Phone Home Number 3 and places the terminal in a Level 1 Sysop session when the DTI030 external event occurs. 14.4.14 REMINIT Action Routine The REMINIT Action Routine performs the Remote Initialization function.
  • Page 210: Resrelay Action Routine

    Events and Action Routines 14.4.15 RESRELAY Action Routine This Action Routine is used to reset the specified relay, thereby turning off the external device attached to the N/O contact and/or turning on the device attached to the N/C contact. When this Action Routine occurs, the common terminal is switched from the normally open contact (N/O) on the relay(s) specified to the normally closed (N/C) contact.
  • Page 211: Schedule Action Routine

    Events and Action Routines 14.4.16 SCHEDULE Action Routine The SCHEDULE Action Routine schedules another Action Routine to be performed now, or at some later date or time. Format: SCHEDULE Resource Required: None Parameters: Date or Time: • Date or "AM" (optional) - Either a date in the format mm/dd/yy, or a number of days from today.
  • Page 212: Sethp Action Routine

    Events and Action Routines Alarm/Event Action Routine Parameters Comments CED063 SCHEDULE 2 0 PHYSYSOP 2,3 This example schedules a PHONHOME for this time two days from now using Phone Home Number 2, and then establishes a Level 3 Sysop session. Alarm/Event Action Routine Parameters...
  • Page 213: Setrelay Action Routine

    Events and Action Routines 14.4.18 SETRELAY Action Routine This Action Routine is used to set the specified relay, thereby turning on the external device attached to the N/O contact and/or turning off the device attached to the N/C contact. When this Action Routine occurs, the common terminal is switched from the normally closed contact (N/C) on the relay(s) specified to the normally open (N/O) contact, Format: SETRELAY RELAY NUMBER...
  • Page 214: Snmptrap

    Events and Action Routines 14.4.19 SNMPTRAP Sends an SNMP trap to remote managers through the Ethernet or PPP link. Parameters: 1 - Sets trap level (1-10) This parameter is the enterprise specific trap ID and depends on the trap format (Nortel or Standard). Example: Alarm/Event Action Routine...
  • Page 215: Appendix A. Asg Key User's Guide

    A. ASG Key User’s Guide A.1 Overview The Access Security Gateway (ASG) Key is a hand-held hardware device that enables you to log ® into a Lucent Technologies’ system (such as DEFINITY Enterprise Communications Server and ® INTUITY system) that is protected by the Access Security Gateway family of security products. Even though you have a valid login for the Lucent system, you will be unable to access the system without using the ASG Key.
  • Page 216 ASG Key User’s Guide A.2 Security Alert The ASG Key must be kept secure at all times. You must take all safeguards against losing the ASG Key. You are fully responsible and accountable for the: • Whereabouts of your ASG Key •...
  • Page 217 ASG Key User’s Guide 6. Enter the first eight digits of the secret key and press the ON button. The ASG Key displays DATA 3. 7. Enter the second eight digits of the secret key and press the ON button. The ASG Key displays DATA 4.
  • Page 218 ASG Key User’s Guide 6. Enter your new PIN and press the ON button. (If you do not want to change the PIN, press the Menu button to exit the Change PIN procedure.) The ASG Key displays CONFIRM. 7. Re-enter the new PIN and press the ON button. The ASG Key displays COMPLETE.
  • Page 219: Appendix B. Port Default Settings

    B. Port Default Settings B.1 Modem Port Parameters Modem Number Baud Rate Settings: Modem Control Strings 19200 User Session CONNECT n Char. Length / Parity 8 / None Terminal Emulation Sysop Idle Timer None Host Session Idle Timer None Host Session Disconnect on Ctrl+A Modem Control Strings ( Use ’|’...
  • Page 220 Port Default Settings B.2 AUX Port Parameters Baud Rate 9600 Char. Length / Parity 8 / None Terminal Emulation Default Access Class CMaster Output While Port Idle Log Data Sysop Idle Timer None Host Session Idle Timer None Host Session Disconnect on Ctrl+A B.3 Host Port Parameters Host Port Number Restore Factory Defaults ?
  • Page 221 Port Default Settings B.4 Network Initialization Parameters Select Group -->1 Restore Factory Defaults? -- Network Initialization Parameters -- Start Network on Power-up? IP Address (nnn.nnn.nnn.nnn) 192.9.200.2 PPP Address (nnn.nnn.nnn.nnn) 192.9.200.3 Subnet Mask (nnn.nnn.nnn.nnn) 255.255.255.0 Default Gateway (nnn.nnn.nnn.nnn) Enable RIP? Network-Loss Alarm Delay Time B.5 SNMP Manager Parameters PPP link needed for trap? Trap format...
  • Page 222 Port Default Settings B.6 FTP Parameters -- FTP Parameters -- PPP link needed for ftp? Ftp service type None -- Server 1 (default) -- IP address (nnn.nnn.nnn.nnn) User name Password Upload Directory -- Server 2 -- User name Password Upload Directory...
  • Page 223: Appendix C. Configuration Files

    C. Configuration Files C.1 Overview Each ASG Guard/ASG Guard Plus has a configuration file that specifies the parameters of the ASG Guard/ASG Guard Plus and determines how the unit operates. A configuration file includes the Action Table; User Action Routines; System Parameters; Parameters of the Aux, Modem, and Host Ports;...
  • Page 224 Configuration Files C.2 CONFIG Procedure With a Remote Configuration File C.2.1 Overview A configuration file may be sent to the ASG Guard/ASG Guard Plus from a PC or to a PC from the ASG Guard/ASG Guard Plus. The CONFIG command is used to import the file (that is, load the configuration data), and the DUMP and DUMPF commands are used to create a configuration file.
  • Page 225 Configuration Files C.3 CONFIG Procedure With a Configuration File on the Local RAM Disk C.3.1 Overview A configuration file may be sent to the ASG Guard/ASG Guard Plus from a PC or to a PC from the ASG Guard/ASG Guard Plus. The CONFIG command is used to import the file (that is, load the configuration data), and the DUMP and DUMPF commands are used to create a configuration file.
  • Page 226 Configuration Files C.4 DUMP Procedures C.4.1 Overview The DUMP command allows the user to view or back up the configuration of an ASG Guard/ ASG Guard Plus with a direct connection via the AUX port, over phone lines, or via the network port. This section describes a procedure for viewing the configuration on a terminal and a procedure for creating a configuration file on a PC.
  • Page 227 Configuration Files C.4.4 DUMP Procedure for Saving the Configuration to a File on a PC 1. Log onto the ASG Guard or ASG Guard Plus as a CMaster User. 2. Type in the command DUMP and press the ENTER key. At this point the banner --- Dump Config Details --- will appear, and a list of system tables and system parameters will be displayed.
  • Page 228 Configuration Files C.5 DUMPF Procedure C.5.1 Overview The DUMPF command is similar to the DUMP command in that it creates a configuration file. However, the DUMPF command copies the configuration to a local file on the RAM disk of an ASG Guard or ASG Guard Plus.
  • Page 229 Configuration Files C.6 Set Customer Key – SCK Command C.6.1 Overview The Set Customer Key (SCK) command provides a facility to change the Customer Key. The Customer Key is used to encrypt secret user information such as passwords. The Customer Key is used to encrypt this data when stored inside the ASG Guard/ASG Guard Plus and when the Customer User Table is exported via the DUMP/DUMPF command.
  • Page 230 Configuration Files C.7 Procedures for Importing and Exporting Customer User Tables C.7.1 Overview This section describes the commands that allow for securely importing and exporting the Customer User Table. The CDUMP, CDUMPF and CCONFIG commands parallel the commands described earlier in this appendix. These commands, however, are used to ‘dump’ and ‘config’ (respectively) Customer User Table information.
  • Page 231 Configuration Files Site123>CDUMP --- Dump Customer Users --- Press ENTER when ready to receive Configuration Dump (CTRL+A to Abort) ; Customer User Table USERTAB |TOM%3%%N%C%0%% S4%0%03/08/99%17:23%T2%21% AC%C21EF0734BC1CA4C%P%% |S2K%4%%N%C%0%% S2727%1109%02/26/99%09:26%M0%0% AC%7FD88960E43B678A%P%% //// 03/19/99 09:32:44 CE18 [AUX] CDUMP Starting 03/19/99 09:33:01 7D1B [AUX] CDUMP Completed by User: AUX_Default ASGTEST>...
  • Page 232 Configuration Files C.7.3 CDUMPF Procedure C.7.3.1 Overview The CDUMPF command allows the user to copy the Customer User Table to the RAM disk of an ASG Guard/ASG Guard Plus. C.7.3.2 Materials • PC connected to the ASG Guard/ASG Guard Plus via network, Aux, or Modem port. •...
  • Page 233 Configuration Files C.7.4 CCONFIG Procedure With a Remote Customer User Table C.7.4.1 Overview A Customer User Table file may be sent to the ASG Guard/ASG Guard Plus from a PC or from a PC to the ASG Guard/ASG Guard Plus. The CCONFIG command is used to import the Customer User Table file (that is, load the Customer User Table data).
  • Page 234 Configuration Files C.7.5 CCONFIG Procedure With a Customer User Table on the Local RAM Disk C.7.5.1 Overview A Customer User Table file may be sent to the ASG Guard/ASG Guard Plus from a PC or from a PC to the ASG Guard/ASG Guard Plus. The CCONFIG command is used to import the Customer User Table file (that is, load the Customer User Table data).
  • Page 235: Appendix D. Troubleshooting

    D. Troubleshooting D.1 Troubleshooting the Installation If you have a problem installing the ASG Guard/ASG Guard Plus or it does not seem to be functioning properly, check the table below to see if the symptoms are listed. Symptom Cause Possible Solution No lights or power light Battery dead Connect AC power or 48 V power...
  • Page 236 Troubleshooting Page intentionally left blank.
  • Page 237: Appendix E. Internal Battery Replacement

    E. Internal Battery Replacement E.1 Introduction This guide is intended to instruct a trained technician in the process of removal and re-installation of the internal battery within the Access Security Gateway (ASG) Guard and Access Security Gateway (ASG) Guard Plus devices. E.2 General Safety Warnings Before replacing the internal battery, it is highly recommended that you back up to an administrative personal computer any files stored on the RAM disk.
  • Page 238 Internal Battery Replacement E.3 Pre-Installation The following tools will be required to properly change the internal battery in the Access Security “ Gateway (ASG) Guard and Access Security Gateway (ASG) Guard Plus devices “ • Phillips head screwdriver “ • 3/16”...
  • Page 239 Internal Battery Replacement E.4.2 Installation Procedures 1. The internal battery is located behind the small bolted plate on the lower right side of the front panel of the Access Security Gateway (ASG) Guard Plus device. Carefully unfasten the two screws from the plate and set aside. The screws are captive so after loosening them, the screws, springs and plate can be removed as one piece.
  • Page 240 Internal Battery Replacement 3. After the battery has been completely removed from housing, disconnect the red wire from (+) positive terminal and black wire from (-) negative terminal. Do not pull on the wires but slightly tug on the plastic tabs connected to the metal terminals, using a side-to-side rocking motion.
  • Page 241 Internal Battery Replacement 5. Slide the new battery into the internal bracket. (Battery will fit only one way, with the red wire towards the back and the tabs towards the center of the unit.) Tuck wires carefully into internal bracket, so they do not snag on the bracket and disconnect tabs from the battery. Figure E-6.
  • Page 242 Internal Battery Replacement NOTE: If the Access Security Gateway (ASG) Guard Plus does not Power-up (no lights appear on panel), then retry the above steps. The wire and tab connections may have become disconnected while sliding the battery into the casing. If the Access Security Gateway (ASG) Guard Plus does Power-up (the red PWR FAIL light will be ON, indicating that the internal battery is operable), then replace the bolted panel, and reconnect all power supplies (16V AC, 48V DC, AC adapter).
  • Page 243 Internal Battery Replacement E.5.2.1 Removal of the Outer Housing 1. Unfasten all the outside housing screws (2 from the top, 2 from each side, 3 from the bottom, and two 3/16” Hex screws on the front panel next to the AUX port). 2.
  • Page 244 Internal Battery Replacement 4. Reach in and gently lift up the 3 black retaining hooks and pull the white connector, this will disconnect the 3-prong connector key switch. Then remove the top housing completely and place on a flat surface. Figure E-11.
  • Page 245 Internal Battery Replacement E.5.2.2 Hardware Interaction 1. Carefully cut the plastic zip tie that constrains the black modem wires in front of the battery bracket. For access to the bracket screws, re-position the black modem wires to opposite sides of the bracket. Gently lift up the 2 black retaining hooks and pull the white connector to disconnect 2-prong connector next to the battery.
  • Page 246 Internal Battery Replacement 2. Detach the red wire from (+) positive terminal and black wire from (-) negative terminal on the ends of the battery. It is important that you do not pull on the wires but gently tug on the plastic tabs connected to metal terminals.
  • Page 247 Internal Battery Replacement Battery bracket removed Figure E-15. Remove Battery from ASG Guard Battery removal complete Figure E-16. Battery Removal Complete for ASG Guard...
  • Page 248 Internal Battery Replacement 4. Connect plastic tabs on the red wire to (+) positive terminal and black wire to (-) negative terminal on the replacement battery. Place battery in base of casing; metal terminals should be flattened and wires should be to the left of battery. Terminal tab connections New battery properly installed within base...
  • Page 249 Internal Battery Replacement 6. Gently reconnect the white connector to the 3-prong connector for the key switch. (The white connector’s angular protrusion (crest) will clip under the black retaining hooks). Figure E-19. Connect 3-Prong Connector for ASG Guard VERY IMPORTANT! White connector MUST have angular protrusion (crest) on top, before connecting to prong.
  • Page 250 Internal Battery Replacement 8. Turn key switch to OFF position and remove from keyhole. Replace battery bracket on top of battery. Fasten the two 5/16“nuts to each end of the battery bracket. Place the black modem wires in channel located on the right side of the battery. Wrap around in front of the casing and secure with a new zip tie.
  • Page 251 Internal Battery Replacement E.6 Help/Troubleshooting E.6.1 Access Security Gateway (ASG) Guard Plus device 1. Unbolt front panel plate, pull the white tab up and out to release internal battery and make sure plastic tabs on the red wire are fitted to (+) positive terminal and black wire to (-) negative terminal.
  • Page 252 Internal Battery Replacement Page intentionally left blank.
  • Page 253: Appendix F. Glossary Of Command References

    F. Glossary of Command References F.1 Action and Alarm Functions Command Description Access Levels Add action item CMaster, Sysop 2 Change action item CMaster, Sysop 2 Generate event CMaster, Sysop 2 List action items All Sysop levels List events All Sysop levels Schedule action item CMaster, Sysop 2 Delete action item...
  • Page 254 Glossary of Command References F.3 User Functions Command Description Access Levels Add users CMaster Block/unblock Lucent administration CMaster Block/unblock Lucent users CMaster Change users CMaster Display Lucent users CMaster, Sysop 2 Display users CMaster, Sysop 2 List Lucent users CMaster, Sysop 2 List users CMaster, Sysop 2 Set an encryption key...
  • Page 255 Glossary of Command References F.5 File Functions Command Description Access Levels Change directory CMaster, Sysop 2 COMP Compress a file CMaster, Sysop 2 COPY Copy a file CMaster, Sysop 2 Display disk parameters CMaster, Sysop 2 Delete a file CMaster, Sysop 2 List files in directory CMaster, Sysop 2 Make a directory...
  • Page 256 Glossary of Command References F.7 Session Control Functions Command Description Access Levels Connect to port All Sysop levels CONL Connect to Lucent device All Sysop levels Disconnect from unit All Sysop levels Join host session All Sysop levels Join host session with Lucent device All Sysop levels View session All Sysop levels...
  • Page 257 Glossary of Command References F.9 Device Management Functions Command Description Access Levels BOOT Restart system CMaster, Sysop 2 CDUMP View or save the User Table CMaster information to a file on the host PC CDUMPF Save the User Table information to a CMaster file on the RAM disk CCONFIG...
  • Page 258 Glossary of Command References Page intentionally left blank.
  • Page 259: Index

    Index .AUTHFAIL Internal Event, 177 AA command, 95 .BAT48HIGH Internal Event, 178 Access Classes, 8, 53 .BAT48LOW Internal Event, 178 Access History command (AH), 168 .BAT48OK Internal Event, 179 Action Routines, 107 .BUFREADY Internal Event, 179 AUXCC, 189 .C#CLOSED Internal Event, 179 CANCEL, 189 .C#OPEN Internal Event, 179 CLKAHEAD, 190...
  • Page 260 Index ASG Guard Authentication add user profile, 25 ASG Key, 30, 54, 138 configuration, 4 pager, 58 configure, 120 Pager, 140 configure AUX port, 33 Password/Callback, 28, 57, 134 configure Host port, 36 Regular Callback, 135 connect DCE device, 19 Variable Callback, 137 Environmental Manager interface, 126 Auto-Baud, 133...
  • Page 261 Index Commands, 241 Display Status of Contact Inputs AA command, 95 command (DCC), 132 Access History command (AH), 168 Display System Parameters command (DSP), 115 action table commands, 95 Display Telnet Port Parameters Add Action Item command (AA), 95 command (DT), 161 Add User command (AU), 52 Display User Record command (DU), 63 add users (AU), 25...
  • Page 262 Index Restart command (BOOT), 119 RRLY command, 123 SA command, 33 Data buffering SAI command, 98 overview, 7 Schedule Action Item command (SAI), 98 Date and Time SCK command, 67 set, 117 SDP command, 75 DCC command, 122, 132 SDT command, 117 DCE Device SEBUF command, 80, 83 connecting, 19...
  • Page 263 Index Editing Keys, 13 Host Port Editing Modes buffer naming, 73 editing keys, 13 buffering data automatically, 77 overview, 12 buffering data manually, 79 TTY mode, 12 configure, 36 VT-100 mode, 12 display buffer status, 79 Encryption Key Source, 30 parameters, 208 device ID/user code, 56 send buffer file to administration PC, 80...
  • Page 264 Index Network Startup, 158 Network Status, 158 Join Host Session command (JS), 141 NOACTION Action Routine, 192 Join Lucent Host command (JSL), 141 JS command, 141 JSL command, 141 PAGE Action Routine, 193 Pager Authentication, 58, 140 Parameters LA command, 97 entering, 15 selecting, 15 LE command, 101...
  • Page 265 Index Set Host command (SH), 77 Set Host Processor Flag command (SHP), 116 Set Modem Port Parameters command (SM), 43 Set Network Parameters command (SNP), 152 RAM disk Set Relays command (SRLY), 123 events generated, 88 Set Sensor Alarms command (SSA), 122 files, 85 Set System Parameters command (SSP), 111 organization, 73...
  • Page 266 Index Utility Programs CSUM.EXE, 88 UPG command, 119 overview, 88 Upgrade ZPAD.EXE, 88 ASG Guard Plus software, 119 ASG Guard software, 119 Upgrade the Software command (UPG), 119 User Variable Callback Authentication, 137 connectivity, 133 Variable Callback Password/Callback User Connectivity Authentication, 58 authentication, 134 VER command, 118...

Table of Contents