RPSD System Administration
The RPSD Lock device prevents unauthorized access to the RMATS channel on your PBX. In administering the RPSD, keep in mind that access via telephone lines is not the only means of breaching the security of your system. A system can be breached, for example, by physically intercepting lines and adding unauthorized equipment. RPSD users may take many actions to enhance overall telecommunications security. These actions include, but are not limited to, providing physical security for RPSD installation sites (locked rooms, cabinets, etc.) and wiring room sites. The RPSD System Activity Log should be monitored for patterns of activity, such as repeated denied call attempts. Contact your computer security group for assistance.
In addition, you should save the seed value for the authentication algorithm in a protected place, in case equipment needs to be replaced at a later date.
Note: The Remote Port Security Device, if properly installed and managed, clearly provides a significant and substantial barrier to unauthorized access to a dial up communication port.
Note that the Remote Port Security Device cannot be assumed to be impregnable, but needs to be viewed as an important addition to the tools and measures used by system managers to prevent unauthorized access to dial up ports.
Time of Day Access
The RPSD Lock device can be administered to prevent access from a specified Key or from all Keys during specified times of the day. You may, as an example, instruct the Lock to block all attempts at access from 18:00 hours (using the 24 hour clock format) until 08:00 hours for user X. You might, for example, use this feature to prevent any administration of the PBX from being performed while a system administrator is not present to oversee the administration.
The default setting is no blockage of access for any Key user at any time.
The administerable parameters are time, date, and user ID. Up to 14 separate time restrictions (periods of no access) maybe set for any one user ID. Time restrictions may also be overlapped.
To specify Time of Day Access, see the Change Restriction, List Restrictions, and User Restrictions commands in the System Administrator Command Set section of this chapter.
RPSD System Administration