You have accessed an older version of a Paradyne product document.

Size: px
Start display at page:

Download "You have accessed an older version of a Paradyne product document."

Transcription

1 You have accessed an older version of a Paradyne product document. Paradyne is no longer a subsidiary of AT&T. Any reference to AT&T Paradyne is amended to read Paradyne Corporation.

2 Paradyne 6700-A2-GB41-10 Issue 2 July 1996 COMSPHERE 6700 Series Network Management System Security Manager Feature Supplement Printed on recycled paper

3 Important Regulatory Information COMSPHERE 6700 Series Network Management System Security Manager Feature Supplement 6700-A2-GB nd Edition (July 1996) Changes and enhancements to the product and to the information herein will be documented and issued as a new release or a limited revision of this manual. A customer opinion form is provided at the front of this publication and your comments are appreciated. If the form has been removed, address comments to AT&T Paradyne Corporation, Technical Publications, th Ave. N., P.O. Box 2826, Largo, Florida, U.S.A AT&T Paradyne may use or distribute any of the information supplied, as appropriate, without incurring any obligation whatsoever. Trademarks All products and services mentioned herein are the trademarks, service marks, registered trademarks or registered service marks of their respective owners. COPYRIGHT 1996 AT&T Paradyne Corporation. All rights reserved. Printed in U.S.A This publication is protected by federal copyright law. No part of this publication may be copied or distributed, transmitted, transcribed, stored in a retrieval system, or translated into any human or computer language in any form or by any means, electronic, mechanical, magnetic, manual or otherwise, or disclosed to third parties without the express written permission of AT&T Paradyne Corporation, th Avenue North, P.O. Box 2826, Largo, Florida AT&T Paradyne Corporation makes no representation or warranties with respect to the contents hereof and specifically disclaims any implied warranties of merchantability or fitness for a particular purpose. Further, AT&T Paradyne Corporation reserves the right to revise this publication and to make changes from time to time in the contents hereof without obligation of AT&T Paradyne Corporation to notify any person of such revision or changes. A

4 Important Regulatory Information Important Safety Instructions 1. Read and follow all warning notices and instructions marked on the product or included in the manual. 2. General purpose cables are provided with this product. Special cables, which may be required by the regulatory inspection authority for the installation site, are the responsibility of the customer. 3. When installed in the final configuration, the product must comply with the applicable Safety Standards and regulatory requirements of the country in which it is installed. If necessary, consult with the appropriate regulatory agencies and inspection authorities to ensure compliance. B

5 Preface Objectives and Reader Assumptions iii How to Use This Manual iii Related Documents iv Ordering Information iv 1 Introduction Overview Software Description Customer-Supplied Equipment Network Configuration Overview Configuring the Network Elements Configuring a Contact List Configuring a Device Group Configuring the Network Alerts Configuring Event Controls for Call Security Configuring System Attributes and Options Setting System Options Defining NMS Users Defining System Colors Configuring Call Security Defining VF Passwords Using Security Control i

6 3 Displays Overview Event Monitor Action Sort Include Control Info Reports Overview Configuration Contact Device Groups VF Security Event Control Priorities Report Event History ii

7 Objectives and Reader Assumptions This supplement describes how to use the COMSPHERE 6700 Series Network Management System (NMS) Security Manager feature. It is assumed that you have a basic understanding of modems and their operation, that you are knowledgeable about data communications, that you are familiar with Windows terminology and conventions, and that you have installed and can operate the COMSPHERE 6700 Series NMS software. How to Use This Manual Chapter 1 provides an overview of the Security Manager feature. Chapter 2 provides information about the changes to configuration with the Security Manager feature. Chapter 3 provides information on changes to Displays with the Security Manager feature. Chapter 4 provides information on changes to Reports with the Security Manager feature. The Glossary provides a description of the terms pertaining to the Security Manager feature. iii

8 Preface Related Documents 3000-A2-GA A2-GB A2-GY31 COMSPHERE 3000 Series Carrier, Installation Manual COMSPHERE 3800 Series Modems, Models 3810, 3811, and 3820, User s Guide COMSPHERE 6700 Series Network Management System, User s Guide Ordering Information To order AT&T Paradyne documentation, please call extension To order AT&T documentation, please call iv

9 1 Overview The Security Manager feature is an enhancement to the COMSPHERE 6700 Series Network Management System (NMS) which supports the call security features of the COMSPHERE 2400 Series and COMSPHERE 3800 Series devices. The 6700 Series NMS is described in the COMSPHERE 6700 Series Network Management System User s Guide. This supplement is designed to be used in conjunction with the user s guide. The changes and additions to the basic NMS software product are described in this supplement in the same logical flow as in the user s guide, e.g., applicable chapter titles are the same in both manuals. For ease of use, repetition of information between manuals has been kept to a minimum. Therefore, it is suggested that you have the user s guide available when referencing this supplement. Software Description The Security Manager feature is designed to be used in conjunction with NMS and the call security features of the 2400 Series and 3800 Series devices. The Security Manager feature provides the following functionality enhancements to the 2400 Series and 3800 Series device call security features: A new 2400/3800 Series device alert, Access Security Alarm. This alert is generated by the device and can appear on any display that shows device alerts. New call failure status codes supported in call statistics. 1-1

10 Introduction Calls monitored for security violations. Additional security for login ID and time of day access verification. Creation and maintenance of a security database within each device. Download of the security database to the devices. Recording to an event history file. The Security Manager is used to perform the following functions to configure a 2400/3800 Series device for security use: Configuring security event priorities and actions. Configuring all Voice Frequency (VF) passwords used by 2400/3800 Series devices. Configuring all login IDs and passwords used by 2400/ 3800 Series devices. Configuring device security groups to link login passwords and VF passwords with selected 2400/ 3800 Series devices. Configuring 2400/3800 Series devices security options, such as prompts. Downloading of login and VF passwords to 2400/ 3800 Series devices. The following dial access procedure is an example of how the Security Manager feature works in conjunction with a 2400/ 3800 Series device: Procedure 1. A remote device is commanded to dial a local 2400/ 3800 Series device. The dial command used contains a VF password, such as ATD W , which causes the remote device to dial and wait for a dial tone. 2. The local 2400/3800 Series device answers the call and responds with a dial tone. 1-2

11 Introduction 3. The remote device receives the dial tone and then dials (the VF password). 4. The local 2400/3800 Series device verifies the VF password using Dual Tone Multi-Frequency (DTMF) tones against its internal password table. If the password is invalid, the device disconnects the line and a disconnect message is sent to the Security Manager. If the password is valid, the local 3800 Series device trains up with the remote device. 5. The VF password used contains a flag indicating whether an additional login/password sequence must be performed. If no additional sequence is required, then the local 2400/3800 Series device allows the remote device to access the Data Terminal Equipment (DTE) connection and send a connect message to the Security Manager. If an additional sequence is required: The local 2400/3800 Series device prompts the remote device (through the remote device s terminal or computer) for User ID, if this function is enabled via a device option. The remote device s user enters a login ID. The local 2400/3800 Series device receives the login ID and then prompts for a login ID password. The local 2400/3800 Series device receives the login ID password and verifies it with its internal password table. Up to five attempts to enter a password can be made, after which the local device will disconnect and send a message to the Security Manager. If the VF and DTE passwords match, you only have one attempt to enter it before the device is disconnected. 6. When the Security Manager receives a connect message containing call security information from the local 2400/3800 Series device, the call security information is added to the event history file and the VF login ID and password reported by the device are 1-3

12 Introduction verified. If any of the following occur, an event is registered with the Security Manager: The login ID is invalid. The password is invalid for the login ID. The login ID is not allowed to access the Security Manager at this time of day. 7. When the local 2400/3800 Series device sends a disconnect message containing call security information to the Security Manager: The call security information is added to the event history file. An internal event is generated to the Security Manager. 8. When the Security Manager generates an internal event: The event control record is checked to determine the event s priority and what action should be taken (e.g., busy out the local device, disconnect the local device, take no action, etc.). Any automatic action taken is logged to the event history file. All applications sensitive to security events will be notified and will update their displays. Customer-Supplied Equipment The following list contains recommended enhancements to your PC environment to adequately support the Security Manager feature: An 80 Mb hard disk drive, minimum. A 120 Mb hard drive is recommended. COMSPHERE 6700 NMS Software, Release or greater is installed. COMSPHERE 3800 Series Firmware, Release A or greater is installed. 1-4

13 2 Overview This chapter describes several additional network elements that you must configure when you have the Security Manager feature. These elements are: Event Control VF Passwords Security Control In addition, there are changes to the following network elements for the Call Security feature: Contact List Device Groups Network Alerts System Attributes and Options When you are ready to set up security for your network, select Config from the Main Menu. A pull-down menu displays four commands used for network configuration: NetWork, Alerts, and System, plus the Call Security command which is available with the Security Manager feature (see Figure 2-1). 2-1

14 Figure 2-1. Configuration Menu Commands Configuring the Network Elements The Security Manager feature provides enhancements to the following network elements described in Chapter 5, Network Configuration, of the COMSPHERE 6700 Series Network Management System User s Guide: Contact List expanded to keep track of security login IDs. Device Group expanded to include device security groups. These enhancements are described in the following paragraphs. Configuring a Contact List To configure a contact list, complete the input form using the following steps: Procedure 1. Select Config from the Main Menu. 2. Choose NetWork from the Config menu. 3. Choose Contact Lists from the NetWork cascading menu. The Contact List Configuration input form (Figure 2-2) displays. 2-2

15 Figure 2-2. Contact List Configuration Input Form 4. Enter the requested data into the fields on the Contact List Configuration input form. 5. Choose Save or one of the other commands from the Action menu (see Table 2-1). 2-3

16 Table 2-1. Action Commands (Contact List) (1 of 2) Action Commands Functions Procedures Save Clear Delete Change Contact Name Set Access Time Default Print Stores the contents of the input form to the network database. Use this command for updating or adding device security groups to the database. Removes the current field entries of the input form without affecting the network database. Removes the security group name from the network database. Changes the contact name throughout the network database. Resets the access time default values to those that are currently displayed. Prints the contact list information currently displayed. If Show Passwords is checked, then the password(s) for the contact name is printed. 1. Complete the input form. 2. Choose Save. 1. Choose Clear. 1. Access an existing security group name on the input form. 2. Choose Delete. 1. Access an existing contact list. 2. Choose Change Contact Name. 3. Enter the new contact name in the dialog box. 4. Choose OK. 1. Access an existing contact name on the input form. 2. Change the access times. 3. Choose Set Access Time Default. 1. Access an existing name on the input form. 2. Choose Print, or 1. Complete the input form. 2. Choose Save. 3. Choose Print. 2-4

17 Table 2-1. Action Commands (Contact List) (2 of 2) Action Commands Print All Show Passwords Functions Prints the contact information currently stored in the database. If Show Passwords is checked, then the password(s) for the contact name is printed. Permits the display and/or printing of passwords associated with the contact name. Procedures 1. Access an existing name on the input form. 2. Choose Print All, or 1. Complete the input form. 2. Choose Save. 3. Choose Print All. Select or deselect Show Passwords. A check mark indicates that the option is enabled. In addition to the Contact Name, Address, Telephone, and Comments fields, the Security Manager feature provides the following additional fields: Login ID An optional field (eight characters) that contains the alphanumeric characters (required if the device option is enabled). The login ID must be unique. Entry of a login ID enables the Login Password and Access Times fields, as well as the Security Group/# Passwords list box. Login Password A required field that contains the password required for you to log in to the Security Manager. These characters are displayed as asterisks (***) unless you have selected Show Passwords from the Action menu. If you wish NMS to generate the login password, choose Generate from the Configuration Contact List menu bar to automatically generate a random, 6-character password. 2-5

18 Access Times A control used to indicate when the user owning the login ID and password entered is permitted to access the 6700 network. The control shows seven days divided into 24-hour periods. Boxes displayed in light gray indicate that the user who has logged in cannot access the network during those times ( off condition) without causing an Invalid Access Time security event. Times appearing in black indicate an on condition, meaning the user is permitted to access the network during those times. The default value for all times is off. To change the valid access times, do one of the following: Click on each box individually (or press the Spacebar) to toggle the condition setting. Select a group of time boxes by dragging the mouse to enclose boxes in a selection rectangle (or use the Arrow keys). The box you start dragging from determines the on/off condition of the other boxes selected. Clicking the mouse on the selected boxes (or pressing the Spacebar) sets their condition to the opposite of the setting for the time box in the upper left corner within the rectangle. Click on a day of the week name (or press the Spacebar) to set the condition for the entire day to the condition selected for the 00 hour. Choose Set Access Time Default from the Action menu to reset the access time default values to those that you have just set on the screen. Security Group/# Passwords This list box displays all security groups with which the contact is associated. Also shown are the number of passwords associated with each security group. To change the security groups listed in this box, select the Security Groups button. The window shown in Figure 2-3 displays. 2-6

19 Figure 2-3. Security Group Selections Window To add a security group to the Selected Groups list box: Procedure 1. Select the group from the All Security Groups list box. 2. Choose the Add button. 3. Choose the OK button to confirm your selection or the Cancel button to cancel the selection. If you chose OK, then this security group is added to the Selected Groups list box and is removed from the All Security Groups list box, and appears on the Contact List input form (Figure 2-2). 4. Choose Save to save your selection. 2-7

20 To remove a security group from the Selected Groups list box: Procedure 1. Select the group from the Selected Groups list box. 2. Choose the Remove button. 3. Choose the OK button to confirm your selection or the Cancel button to cancel the selection. If you chose OK, then this security group is removed from the Selected Groups list box and appears in the All Security Groups list box and on the Contact List input form (Figure 2-2). 4. Choose Save to save your selection. Configuring a Device Group A device group is a user-defined category that identifies a set of devices. The Device Groups command allows you to create, change, delete, or print device group configuration information. The Security Manager feature expands this function to provide the logical link between a group of devices and a list of security passwords. Using the device security group makes it easier to configure more than one device with exactly the same set of passwords and security options. NOTE: A device can be a member of only one security group at any one time. To create or change device group configuration, complete the Device Groups Configuration input form (Figure 2-4) by entering information in the appropriate fields. Use the commands from the Action menu to complete configuration. Use the Download menu to download all passwords and security modes assigned to the group name to the devices. If specific devices are selected, then the download only affects these devices. If no devices are selected, then the download affects the all of the devices in the group. 2-8

21 Figure 2-4. Device Groups Configuration Input Form To configure a device group, complete the input form by using the following steps: Procedure 1. Select Config from the Main Menu. 2. Choose NetWork from the Config menu. 3. Choose Device Groups from the NetWork cascading menu. The Device Groups Configuration input form (Figure 2-4) displays. 4. Enter the information requested into the form. 2-9

22 In addition to the fields listed to configure a device group, use the following procedure to complete the Device Groups Configuration input form when configuring a device security group (refer to the COMSPHERE 6700 Series Network Management System User s Guide for more information about device groups): Procedure 1. If the group listed in the Group Name field is a security group, place a check in this box. This enables the Security Passwords in Group box, the Answer Security Mode list box, the Auto Dialer Security box, and the Reporting Modes list box, as well as the Download menu item. 2. Choose Show Passwords from the Action menu if you want passwords to be displayed and/or printed. 3. View the Security Passwords in Group box to see the list of all VF (shown in italics) and DTE password names associated with the security group. This includes the maximum number of passwords that can be associated with this security group (standalone devices can have a maximum of 20 passwords, carrier devices can have a maximum of 3000 passwords). Two bold entries listed in the same line indicate that the VF and DTE passwords match. To add or remove passwords in this list, choose Passwords. The Select Groups Passwords window displays (Figure 2-5). 4. To add VF and/or DTE passwords to the selected passwords list, select the appropriate VF/DTE passwords and choose Add. To remove passwords from the selected passwords list, select the appropriate VF/DTE passwords and choose Remove. If the VF and DTE passwords match, both entries must be selected. In either case, choosing OK confirms your selection, while choosing Cancel closes the selection dialog box without making any changes. 2-10

23 Figure 2-5. Select Group Passwords Window 5. To control which passwords will be required by the devices in the security group when an incoming call is answered, use the Answer Security Mode drop-down list box. Disabled indicates that inbound security is disabled. DTE Only indicates that the modem requires the call originator to provide a DTE login password. VF and DTE indicates that both VF and DTE passwords are required by the devices in the security group. VF with Matching DTE indicates that a specific VF will always require a specific DTE. The entries cannot be mismatched. When VF with matching DTE is in effect, you must select a VF entry and its matching DTE entry from the All Available Password list boxes and add them to the Selected Passwords list box. Both entries will be displayed on the same line in bold in the Selected Passwords and Security Passwords in Group list boxes. The appropriate device option must be enabled before the device will prompt the user for a login ID. 2-11

24 6. To control access to the dialers for all devices in the security group, use the Auto Dialer Security box. If enabled, the modem requires the call originator to issue a special command to enable the dial command to enable the dial command before this command can be issued. If disabled, dial commands can be issued without restriction. 7. To have failed calls reported to the Security Manager, check the Call Failure box (this is the default). 8. To have successful calls reported to the Security Manager, check the Call Success box (this is the default). 9. Choose Save or one of the other commands from the Action menu (see Table 2-2). 10. Choose Download from the Device Groups menu bar to download all passwords and/or security modes assigned to the security group identified in the Group Name field. To download to selected devices in a security group, select those devices from the Devices in Group box. To download to all devices in the security group, do not select any specific devices. The download is limited to those devices in the security group with the security feature installed. NOTE: A download busies-out all selected devices that are currently idle. All devices that are connected at the time that a download is requested are downloaded without interrupting primary data. The busy-out condition is removed after the download is completed. 2-12

25 Table 2-2. Action Commands (Device Security Groups) (1 of 2) Action Commands Functions Procedures Save Delete Change Print Stores the contents of the input form to the network database. Use this command for updating or adding device security groups to the database. Removes the security group name from the network database. Changes the security group name throughout the network database. Prints the security group information currently displayed. If Show Passwords is checked, then the password(s) for the security group name is printed. 1. Complete the input form. 2. Choose Save. 1. Access an existing security group name on the input form. 2. Choose Delete. 1. Access an existing security group name on the input form. 2. Choose Change. 3. Enter the new security group name in the dialog box. 4. Choose OK. 1. Access an existing name on the input form. 2. Choose Print, or 1. Complete the input form. 2. Choose Save. 3. Choose Print. 2-13

26 Table 2-2. Action Commands (Device Security Groups) (2 of 2) Action Commands Print All Show Passwords Functions Prints the security group information currently stored in the database. If Show Passwords is checked, then the password(s) for the security groups are printed. Permits the display and/or printing of passwords associated with security groups. Procedures 1. Access an existing name on the input form. 2. Choose Print All, or 1. Complete the input form. 2. Choose Save. 3. Choose Print All. Select or deselect Show Passwords. A check mark indicates that the option is enabled. Configuring the Network Alerts To define the device alerts and security events that the network will monitor, select Config from the Main Menu and then Choose Alerts and Events. The Security Manager feature adds the new device alert Access Security to the existing alert controls for device and model. This alert indicates that a user has successfully logged into the Security feature of a device by using its front panel. This alert can only be cleared by the user. In addition, the Event Controls Call Security function is added. Configuring Event Controls for Call Security The event control function enables you to control what actions are initiated by the Security Manager and the priority level assigned to the call security events. Table 2-3 describes each security event and their default values. 2-14

27 Table 2-3. Call Security Event Descriptions (1 of 5) Event Description Event Definition Event Source Event Duration Event Priority Auto Actions VF Login OK A remote user has gained access using a valid node password. Modem Duration No Event None User Login OK A remote user has gained access using a valid security password. Modem Duration No Event None User Login Rejected: 3 Retries Failed User Login Rejected: Password Time Out A remote user has attempted access and did not enter a valid security password in three attempts. A remote user has attempted access but did not enter a security password before the time-out period expired. Modem Duration Minor None Modem Duration Minor None 2-15

28 Table 2-3. Call Security Event Descriptions (2 of 5) Event Description Event Definition Event Source Event Duration Event Priority Auto Actions User Login Aborted: Line Disconnected VF Login Rejected: Password Invalid VF Login Rejected: Password Time Out VF Login Aborted: Line Disconnected A remote user has attempted access but the connection was dropped before the user entered a security password. A remote user has attempted access using an invalid node password. A remote user has attempted access but did not enter a node password before the time-out period expired. A remote user as attempted access but the connection was dropped before the user entered a node password. Modem Duration Major None Modem Duration Major None Modem Duration Minor None Modem Duration Major None 2-16

29 Table 2-3. Call Security Event Descriptions (3 of 5) Event Description Event Definition Event Source Event Duration Event Priority Auto Actions User Login OK: Multiple Password Retries A remote user has gained access using a valid security password, but multiple attempts were required to enter a valid password. Security Manager Duration Major None Login ID and Password Combination Invalid A remote user has gained access using a valid security password, but the valid login ID entered is not valid for the security password entered. Security Manager Duration Critical Disconnect Invalid Login ID, Password Valid for Device A remote user has gained access using a valid security password, but the login ID entered is not valid. Security Manager Duration Critical Disconnect 2-17

30 Table 2-3. Call Security Event Descriptions (4 of 5) Event Description Event Definition Event Source Event Duration Event Priority Auto Actions Invalid Access Time A remote user has gained access using a valid security password, but the access time is not valid. Security Manager Duration Critical Disconnect User Login Hack. Multiple Sequential Password Retries A remote user has gained access using a valid security password, but to do so required entry of multiple passwords each separated by a numeric value of one. Security Manager Until Cleared by Operator Critical Busy Out Device Security Table Invalid The security password table maintained by the device is invalid and must be downloaded. Security Manager Duration Critical None Security Download in Progress The security password table for the device indicated is being downloaded. Security Manager Duration Minor None 2-18

31 Table 2-3. Call Security Event Descriptions (5 of 5) Event Description Event Definition Event Source Event Duration Event Priority Auto Actions Security Download Failed The security password download has failed. The system has tried to perform the download three times prior to this event. Security Manager Until Download Started or Device Deleted Critical Reset & Busy Out Front Panel Modification A user has made changes to the modem security via the front panel. Modem Duration Critical None Make Busy Mode The device is currently busied out. This may have been done by the Security Manager. Device Duration As per Alert Controls None To change the security event default values, use the following procedure: Procedure 1. Select Config from the Main Menu. 2. Choose Alerts and Events from the Config menu. 3. Choose Event Controls Call Security from the Alerts and Events cascading menu. The Event Controls Call Security window displays (Figure 2-6). 2-19

32 4. Select the priority (Critical, Major, Minor, or No Event) for each event. Your selection determines sort order and differentiates the severity of the event by color. 5. Select the automatic action to be taken by the Security Manager. Table 2-4 lists the auto actions available. 6. Choose Save or one of the other commands from the Action menu. Action commands for events are the same as those for alerts. Refer to the COMSPHERE 6700 Series Network Management System User s Guide. Figure 2-6. Event Controls Call Security Window 2-20

33 Table 2-4. Event Control Security Manager Auto Actions Auto Action Busy Out Download Disconnect Ignore None Reset Description The Security Manager commands the reporting device to disconnect the telephone connection, then go into a busy out state. The device is busied out and its security table is downloaded. Only valid for the Device Security Table Invalid event. The Security Manager commands the reporting device to disconnect the telephone connection. The event will be ignored by the NMS. The Security Manager will take no automatic action. The device is busied out and all of its security table assignments are cleared. Configuring System Attributes and Options To configure the system attributes and options,choose Config from the Main Menu and then Choose System. This menu allows you to define the operational criteria for NMS. The Security Manager feature provides the additional operation criterion, Collect Event History. The Collect Event History system option enables you to control the purging of the call event history. Setting System Options The new System Options input form is shown in Figure

34 Figure 2-7. System Options Input Form Select the check box to the left of the Collect Event History field, then make your selection in the number range field: Collect Event History Select the check box if you want NMS to record all security events in an event history file. The event history can then be displayed or printed via the Event History Report. Use the number range field to select the number of days to keep active history records (Default = 30 days). Defining NMS Users User Profile commands allow you to define the NMS users and their system privileges. A user who has the User Profile privilege can assign or change User IDs, passwords, and system privileges for all other users on NMS. The Security Manager provides an additional privilege, Call Security. Users without the User Profile privilege can change only their own User ID, password, and comments. 2-22

35 The new User Profile Configuration input form is shown in Figure 2-8. Figure 2-8. User Profile Configuration Input Form Select the check box next to the Call Security field. Call Security A Security Manager privilege that allows you to change NMS call security parameters and to cause these changes to occur in devices. If the check box is not selected, you are limited to displaying call security information; you cannot change it. Defining System Colors The Security Manager feature adds a new color group for security events. System colors are used to distinguish event priorities. The default colors are listed in Table

36 Table 2-5. Event Priorities System Colors Group Color Group Elements Default Colors Events Configuring Call Security Call Security enables you to define VF Passwords and to control the operation of the NMS security features. Defining VF Passwords You can require that the COMSPHERE 2400 Series and 3800 Series devices receive a valid password before training. This is a VF password which is a series of DTMF signals, generated by either a telephone or by adding a password to the end of a dial command to the calling modem. A device uses this VF password to verify that the remote calling device is permitted access. To create VF passwords, complete the Call Security VF Passwords input form and use the Action commands (Table 2-6). 2-24

37 Table 2-6. Action Commands (VF Passwords) (1 of 2) Action Commands Functions Procedures Save Delete Clear Change VF Password Name Stores the contents of the input form to the network database. Use this command for updating or adding VF password names to the database. Removes the VF Password name and all associations from the network database. Removes the current field entries of the input form without affecting the network database. Changes the VF Password name throughout the network database. 1. Complete the input form. 2. Choose Save. 1. Access an existing VF Password name on the input form. 2. Choose Delete. 1. Choose Clear. 1. Access an existing VF Password name on the input form. 2. Choose Change. 3. Enter the new VF Password name in the dialog box. 4. Choose OK. Print Prints the VF Password name information currently displayed. If Show Passwords is checked, then the password(s) for the VF Password name is printed. 1. Access an existing name on the input form. 2. Choose Print, or 1. Complete the input form. 2. Choose Save. 3. Choose Print. 2-25

38 Table 2-6. Action Commands (VF Passwords) (2 of 2) Action Commands Print All Show Passwords Functions Prints the VF Password information currently displayed. If Show Passwords is checked, then the password(s) for the VF Password name is printed. Permits the display and/or printing of passwords associated with VF Password names. Procedures 1. Access an existing name on the input form. 2. Choose Print All, or 1. Complete the input form. 2. Choose Save. 3. Choose Print All. Select or deselect Show Passwords. A check mark indicates that the option is enabled. To define VF Passwords, perform the following steps: Procedure 1. Select Config from the Main Menu. 2. Choose Call Security from the Config menu. 3. Choose VF Passwords from the Call Security menu. The VF Passwords input form displays (Figure 2-9). 2-26

39 Figure 2-9. VF Passwords Input Form 4. Enter the following information in the fields on the VF Passwords input form by either: Using the selection list button to the right of the field to access existing field entries, or Typing the information in the field, then pressing Tab. For the VF Password field only, you can choose Generate from the VF Passwords menu to automatically generate an 8-digit password. VF Name A label (eight characters maximum) that is unique to the network and used to identify the VF Password. VF Password A password (eight digits maximum) that is unique to the network and used to allow the remote device to gain access to the training sequence of a local device. 2-27

40 Comments An optional field for additional VF Password name information (maximum 40 characters). Access Type An optional field that indicates any additional security that is necessary when the VF Password is used. Select one of the following: VF Only Select this option to require only the VF password from the remote device to gain access to the DTE side of the local device. User Login Select this option to require a valid security login password from the remote device in addition to the VF password to gain access to the DTE side of the local device. The list of security groups associated with the VF password, along with the number of VF and login passwords assigned to each group, displays in the lower portion of the VF Passwords input form (Figure 2-9). 5. To add or remove devices from the list of selected security groups displayed, choose the Security Groups button. The Security Group Selections window displays (Figure 2-10). 6. Select the desired security group, then choose either Add or Remove. Choose OK to change the list of selected security groups displayed on the VF Passwords input form (Figure 2-9). 2-28

41 Figure Security Group Selections Window To add a security group to the Selected Groups list box: Procedure 1. Select the group from the All Security Groups list box. 2. Choose the Add button. 3. Choose the OK button to confirm your selection or the Cancel button to cancel the selection. If you chose OK, then this security group is added to the Selected Groups list box and is removed from the All Security Groups list box, and appears on the Contact List input form (Figure 2-2). 4. Choose Save to save your selection. 2-29

42 To remove a security group from the Selected Groups list box: Procedure 1. Select the group from the Selected Groups list box. 2. Choose the Remove button. 3. Choose the OK button to confirm your selection or the Cancel button to cancel the selection. If you chose OK, then this security group is removed from the Selected Groups list box and appears in the All Security Groups list box and on the Contact List input form (Figure 2-2). 4. Choose Save to save your selection. Using Security Control Security Control allows you to perform the following functions: Reset the security table Display and change security prompt strings Download the security table Display and change the administrative password To use Security Control, perform the following steps: Procedure 1. Select Config from the Main Menu. 2. Choose Call Security from the Config menu. 3. Choose Control from the Call Security menu. The Security Control menu items are visible in the menu bar. The following is a list of the Security Control menu commands with a brief description of each. Command Allows you to execute commands to control the operation of security functions for NMS. 2-30

43 Option Enables you to control the display of passwords and to request the display of a confirmation box. Window Allows for changing the method of displaying windows opened from the Security Control window or closing all the windows opened from the current Security Control window. Print Prints the current Security Control window and all windows opened from it. Command Select Command from the Security Control menu bar and the Command pull-down menu (Figure 2-11) displays. Use Command to control the security functions available through the Security Manager feature. These commands only apply to devices in security groups with the Security feature installed. Figure Command Menu! CAUTION: If the device requires password access, resetting its security password table prevents incoming calls to that device and resets the administrative password to its system default value. 2-31

44 Reset Security Table Choose Reset Security Table from the Command pull-down menu to clear the security password table for one or more devices. The Reset Security Table window (Figure 2-12) displays the names of all the devices selected for the Reset Security Table command (default is global selection list). Choose Devices to select different devices to appear on the list. Choose Execute to reset the security table for each device in the selection list. Figure Reset Security Table Window Security Prompt Strings Choose Security Prompt Strings from the Command pull-down menu to display and/or change prompts and messages related to the login ID and password access for selected devices. The Security Prompt Strings window (Figure 2-13) displays security prompt strings for selected devices. 2-32

45 Figure Security Prompt Strings Window Device List The device names selected to receive the new security prompt strings. ID Prompt Used to query for the user s login ID (32 characters maximum). Password Prompt Used to query for the user s login password (32 characters maximum). Verifying Message The message to be displayed while the device is verifying the login password (32 characters maximum). Access Granted Message The message displayed when the user is granted access to the device s DTE connection (32 characters maximum). 2-33

46 To change the devices selected as displayed in the Device List box, choose Devices, then make your selection from the displayed dialog box. To read the security prompts from the selected device(s) and display these values on the Security Prompt Strings window, select a device from the Device List box and choose Display. To change the security prompts for the selected device(s) to the values displayed on the Security Prompt Strings window, select device(s) from the Device List box and choose Change. NOTE: When entering data into the ID Prompt, Password Prompt, Verifying Message, and Access Granted Message fields, be sure to include any appropriate carriage returns and line feeds. To do this, use a backslash (\) followed by the hexadecimal value for the character (0A for line feed or 0D for carriage return). For example, type 0A\0D Enter Password \0A\0D to have the prompt Enter Password appear on a line by itself. Administrative Password Choose Administrative Password from the Command pull-down menu to display and/or change the password for selected device(s). This is the password the modem requires before permitting a user to access security functions from the modem s front panel. The Administrative Password window (Figure 2-14) displays the names of all the devices selected for the new administrative password (default is global selection list). Choose Devices to select different devices to appear on the list. Choose Display to show the password for the selected device in the 8-digit Password field. Choose Change to update the password for selected device(s) to the one displayed in the Password field. 2-34

47 Figure Administrative Password Window Download Security Table Choose Download Security Table from the Command pull-down menu to download the security table to one or more devices. The Download Security Table window (Figure 2-15) displays the names of all the devices selected for the Download Security Table command (default is global selection list). Choose Devices to select different devices to appear on the list. Choose Execute to download the security table for each device in the selection list. This process consists of a broadcast message to all selected devices and could take as long as several minutes. NOTE: A download busies-out all selected devices that are currently idle. All devices that are connected at the time that a download is requested are downloaded without interrupting primary data. The busy-out condition is removed after the download is completed. 2-35

48 Figure Download Security Table Window Option Select Option from the Security Control menu bar and the Option pull-down menu (Figure 2-16) displays. Use Option to request a confirmation box to verify that requested changes are to be implemented and to control the display of passwords. Figure Option Menu 2-36

49 Confirmation Choose Confirmation from the Option menu to request that a confirmation box be shown before any changes are made to a device. A check mark next to Confirmation indicates that the box is enabled. This is a toggle function. Show Password Choose Show Password from the Option menu to allow the display of passwords. A check mark next to Show Passwords indicates that the display of passwords is allowed. This is a toggle function. Window Choose Window from the Security Control menu bar to change how Security Control windows are displayed or to close all the open Security Control windows. Choosing Window causes a drop-down menu (Figure 2-17) to display listing the commands Tile, Cascade, Arrange Icons, and Close All. The Window commands only affect the windows or icons opened from the same Security Control window. If two or more Security Control windows are open, the Window commands only operate on the windows opened from the current Security Control window. The windows opened from the current Security Control window are listed below the last command. A check mark indicates the active window. To change the active window, select the window name from the list. Figure Window Drop-Down Menu 2-37

50 Tile Choose Tile from the pull-down menu to have the windows arranged in a side-by-side manner. This allows viewing of several windows simultaneously (side-by-side) with the disadvantage that each window is smaller than if they were displayed on top of each other. Figure 2-18 shows three Security Control windows displayed in the tile fashion. Figure Tile Method of Displaying Windows Cascade Choose Cascade from the pull-down menu to have windows arranged in a stacked fashion while allowing the upper and left side of each window to remain in view. This permits viewing of the primary window, in a larger size than Tile, and makes changing from one window to another easier than if they were displayed directly on top of each other. Figure 2-19 shows three Security Control windows displayed in the cascade fashion. 2-38

51 Figure Cascade Method of Displaying Windows Print Arrange Icons Choose Arrange Icons from the pull-down menu to display any icons along the lower portion of the window. Close All Choose Close All from the pull-down menu to close all the windows called from the current Security Control menu. Choose Print from the Security Control menu to print the current Security Control window and all windows opened from it. See the COMSPHERE 6700 Series Network Management System User s Guide for additional information on using printers. 2-39

52 3 Overview This chapter describes the Event Monitor command that is provided by the Security Manager feature. This command is accessed from the Displays menu and is an additional way to monitor the condition of your network. Event Monitor Event Monitor commands allow you to view all the current events related to call security. The displayed events can be sorted by security ID, device name, event time, or event description. From the Event Monitor window, you can control displayed events, display security control or information windows, and limit the events displayed by priority level. Select Event Monitor from the Displays pull-down menu. The Event Monitor window (Figure 3-1) displays with the menus Action, Sort By, Include, Control, Info and a listing of the current events reported by the Security Manager. Each listing uses five fields of information containing the security ID, device name, event time, event description, and automatic action taken. 3-1

53 Displays Figure 3-1. Event Monitor Window Action Select Action from the Event Monitor menu bar to access the Action pull-down menu (Figure 3-2). The Action menu is inactive (gray) unless an event is selected. Use the Action pull-down menu commands to perform the following functions: Reset Security Table Clear Event Disconnect Device Busy Out Device Download Security Table Confirmation Required 3-2

54 Displays Figure 3-2. Action Pull-Down Menu Reset Security Table Choose Reset Security Table from the Action pull-down menu to reset the security table in the selected device, then cause the device to be busied-out. The device s security table is cleared, preventing dial-in access when the device is configured to require password verification. This creates a security event, indicating to the Security Manager that the device requires a security table download. If you do not have security privileges, this menu item is inactive (gray). Clear Event Choose Clear Event from the Action pull-down menu to delete the selected events from the Event Monitor window. If you do not have security privileges, this menu item is inactive (gray). 3-3

55 Displays Disconnect Device Choose Disconnect Device from the Action pull-down menu to command the device to disconnect the telephone connection. The selected event is removed from the Event Monitor window. If you do not have security privileges, this menu item is inactive (gray). Busy Out/Remove Busy Out Device Choose Busy Out Device from the Action pull-down menu to either busy out the device or choose Remove Busy Out to remove this condition. If you do not have security privileges, this menu item is inactive (gray). Download Security Table Choose Download Security Table from the Action pull-down menu to busy out the device, then download a security table. You must select a Device Security Table Invalid event to enable this command. If you do not have security privileges, this menu item is inactive (gray). NOTE: A download busies-out all selected devices that are currently idle. All devices that are connected at the time that a download is requested are downloaded without interrupting primary data. The busy-out condition is removed after the download is completed. Confirmation Required Choose Confirmation Required from the Action pull-down menu to request a that confirmation box display for all Action menu commands. A check mark displays next to this menu item when the confirmation box is enabled. 3-4

exchange Call Center Agent Guide

exchange Call Center Agent Guide exchange Call Center Agent Guide Version 4.6 NBX System Release 6.5 http://www.3com.com Part Number: 900-0419-01 Published April 2009 3Com Corporation, 350 Campus Drive, Marlborough MA 01752-3064 Copyright

More information

COMSPHERE 6700 SERIES NETWORK MANAGEMENT SYSTEM SNMP PROXY AGENT FEATURE

COMSPHERE 6700 SERIES NETWORK MANAGEMENT SYSTEM SNMP PROXY AGENT FEATURE COMSPHERE 6700 SERIES NETWORK MANAGEMENT SYSTEM SNMP PROXY AGENT FEATURE USER S GUIDE Document No. 6700-A2-GB20-20 December 1997 Copyright 1997 Paradyne Corporation. All rights reserved. Printed in U.S.A.

More information

3Com exchange Call Center Agent User Guide

3Com exchange Call Center Agent User Guide 3Com exchange Call Center Agent User Guide Version 4.33 http://www.3com.com Part Number: 900-0147-01 Rev AA Published May 2004 3Com Corporation, 350 Campus Drive, Marlborough MA 01752-3064 Copyright 2004,

More information

OPUSeries Build 19 Revenue Management Operations Manual

OPUSeries Build 19 Revenue Management Operations Manual OPUSeries Build 19 Revenue Management Operations Manual B19_RevMgmt_11122014 Date: Monday, December 1, 2014 Notice of Rights: Copyright 2014 Amano McGann, Inc. All rights reserved. This document contains

More information

MODEL 7520 DSU USER S GUIDE. Document No A2-GB May 1998

MODEL 7520 DSU USER S GUIDE. Document No A2-GB May 1998 MODEL 7520 DSU USER S GUIDE Document No. 7520-A2-GB20-20 May 1998 Copyright 1998 Paradyne Corporation. All rights reserved. Printed in U.S.A. Notice This publication is protected by federal copyright law.

More information

V7350 Unified Messaging Suite User Guide

V7350 Unified Messaging Suite User Guide V7350 Unified Messaging Suite User Guide VCX V7000 IP Telephony Solution System Release 5.0 Part Number 900-0195-01 AA Published August 2004 http://www.3com.com/ 3Com Corporation 350 Campus Drive Marlborough,

More information

RemoteWare OS/2 Client

RemoteWare OS/2 Client RemoteWare OS/2 Client User s Guide Version 4.1 Service Pack 1A RemoteWare OS/2 Client User s Guide Version 4.1 Service Pack 1A This document was prepared to assist licensed users of RemoteWare by XcelleNet,

More information

PaperClip32. Revision 2.0

PaperClip32. Revision 2.0 PaperClip32 Quick Start Guide Revision 2.0 Copyright Information Copyright 2003, PaperClip Software, Inc. The PaperClip32 product name and PaperClip Logo are registered trademarks of PaperClip Software,

More information

VMp Technical Support Phone: Online request:

VMp Technical Support Phone: Online request: Copyright 2011 ViewCast Corporation. All rights reserved. ViewCast, Niagara SCX, ViewCast logo, Osprey, Niagara, SimulStream, Niagara logo, SchedulStream, GoStream, and ViewCast Media Platform (VMp) are

More information

BCM 4.0 Personal Call Manager User Guide. BCM 4.0 Business Communications Manager

BCM 4.0 Personal Call Manager User Guide. BCM 4.0 Business Communications Manager BCM 4.0 Personal Call Manager User Guide BCM 4.0 Business Communications Manager Document Status: Beta Document Version: 02 Part Code: N0027256 Date: January 2006 Copyright Nortel Networks Limited 2006

More information

Nortel Networks Integrated Call Director

Nortel Networks Integrated Call Director Title page Nortel Networks Communication Server 1000 Release 4.0 Nortel Networks Integrated Call Director User Guide Revision history Revision history July 2004 Standard 1.00. This document is issued

More information

Solar Eclipse Scheduler. Release 9.0

Solar Eclipse Scheduler. Release 9.0 Solar Eclipse Scheduler Release 9.0 Disclaimer This document is for informational purposes only and is subject to change without notice. This document and its contents, including the viewpoints, dates

More information

Software 1.0 July AVI-SPL GETTING STARTED GUIDE. AVI-SPL PresenceVMR. MyRPCloud Portal for Administrators

Software 1.0 July AVI-SPL GETTING STARTED GUIDE. AVI-SPL PresenceVMR. MyRPCloud Portal for Administrators GETTING STARTED GUIDE Software 1.0 July 2015 3725-71956-002AVI-SPL AVI-SPL PresenceVMR MyRPCloud Portal for Administrators Copyright 2015, Polycom, Inc. All rights reserved. No part of this document may

More information

First Access Express OPERATOR GUIDE

First Access Express OPERATOR GUIDE First Access Express OPERATOR GUIDE October 2016 Cutting edge simplicity Table of Contents Introduction... 4 PC Requirements... 5 Step 1. Software Installation... 5 Complete Installation Server and Client...

More information

AT&T Conferencing Add-in for Microsoft Outlook

AT&T Conferencing Add-in for Microsoft Outlook AT&T Conferencing Add-in for Microsoft Outlook 2016 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property

More information

TALKBACK INTERCOM SYSTEM V-2926 OPTION BOARD

TALKBACK INTERCOM SYSTEM V-2926 OPTION BOARD Issue 8 TALKBACK INTERCOM SYSTEM V-2926 OPTION BOARD The V-2926 Option Board is an add-on feature for the V-2924A Expandable Zone Talkback Intercom System. The addition of this board provides the following

More information

Programming Manual KX-TVA50 KX-TVA200. Voice Processing System. Model

Programming Manual KX-TVA50 KX-TVA200. Voice Processing System. Model Voice Processing System Programming Manual Model KX-TVA50 KX-TVA200 Thank you for purchasing a Panasonic Voice Processing System. Please read this manual carefully before using this product and save this

More information

equestionnaire User Guide

equestionnaire User Guide Prodika Product Lifecycle Management equestionnaire User Guide Release 5.1 Part Number: TPPR-0045-5.1A Make sure you check for updates to this manual at the Oracle Documentation Web site Copyrights and

More information

Insbridge Enterprise Rating RateManager User Guide

Insbridge Enterprise Rating RateManager User Guide Oracle Insurance Insbridge Enterprise Rating RateManager User Guide Modules Volume 2 Release 4.9 December 2014 Copyright 2005, 2014, Oracle and/or its affiliates. All rights reserved. Oracle Insurance

More information

Programming Manual KX-TVA50 KX-TVA200. Voice Processing System. Model

Programming Manual KX-TVA50 KX-TVA200. Voice Processing System. Model Voice Processing System Programming Manual Model KX-TVA50 KX-TVA200 Thank you for purchasing a Panasonic Voice Processing System. Please read this manual carefully before using this product and save this

More information

Inventory Module & Wireless Device. User Quick Start Guide

Inventory Module & Wireless Device. User Quick Start Guide Inventory Module & Wireless Device User Quick Start Guide Published on: 3/14/2007 Copyright and Disclaimer Copyright 2007 Pace Systems Group, Inc., 1902 2 nd Avenue North, Jacksonville Beach, Florida,

More information

Release for Microsoft Windows

Release for Microsoft Windows [1]Oracle Fail Safe Tutorial Release 4.1.1 for Microsoft Windows E57061-02 April 2015 Oracle Fail Safe Tutorial, Release 4.1.1 for Microsoft Windows E57061-02 Copyright 1999, 2015, Oracle and/or its affiliates.

More information

Avaya Unified Messenger Client User Guide

Avaya Unified Messenger Client User Guide Avaya Unified Messenger Client User Guide Version 5.0 Avaya Inc. 211 Mount Airy Road Basking Ridge, New Jersey 07920 www.avaya.com Your comments are welcome. They can assist us in improving our documentation.

More information

E-FORM GETTING STARTED GUIDE THE COMPLETE ELECTRONIC TAX FORM DVD

E-FORM GETTING STARTED GUIDE THE COMPLETE ELECTRONIC TAX FORM DVD E-FORM GETTING STARTED GUIDE THE COMPLETE ELECTRONIC TAX FORM DVD Updated November 2014 Copyright 2014-2015 Thomson Reuters. All Rights Reserved. Thomson Reuters disclaims any and all liability arising

More information

RealTime Merchant SM (RTM) Marriott User s Guide

RealTime Merchant SM (RTM) Marriott User s Guide RealTime Merchant SM (RTM) Marriott Copyright Information 2006/07 Global Card Services, Inc. All rights reserved. Reproduction, adaptation, or translation without prior written permission from Global Card

More information

Programming Manual KX-TVA50 KX-TVA200. Voice Processing System. Model No.

Programming Manual KX-TVA50 KX-TVA200. Voice Processing System. Model No. Programming Manual Voice Processing System KX-TVA50 KX-TVA200 Model No. Thank you for purchasing a Panasonic Voice Processing System. Please read this manual carefully before using this product and save

More information

DMR Conventional Radio. SIP Phone Application Notes

DMR Conventional Radio. SIP Phone Application Notes DMR Conventional Radio SIP Phone Application Notes Copyright Information Hytera is the trademark or registered trademark of Hytera Communications Corporation Limited (the Company) in PRC and/or other countries

More information

RCT Express. Administrator Training Manual. Version 4.3

RCT Express. Administrator Training Manual. Version 4.3 RCT Express Administrator Training Manual Version 4.3 Copyright 2016 CoreLogic. All rights reserved. ii Contents Introduction 1 System Requirements... 1 Tools 2 Administration 3 Manage Agencies... 3 Manage

More information

Avaya MultiService Software Update Manager User Guide

Avaya MultiService Software Update Manager User Guide Avaya MultiService Software Update Manager User Guide April 2002 Avaya MultiService Software Update Manager 3.2 User Guide Copyright Avaya Inc. 2002 ALL RIGHTS RESERVED The products, specifications, and

More information

FOCUS ON: DATABASE MANAGEMENT

FOCUS ON: DATABASE MANAGEMENT EXCEL 2002 (XP) FOCUS ON: DATABASE MANAGEMENT December 16, 2005 ABOUT GLOBAL KNOWLEDGE, INC. Global Knowledge, Inc., the world s largest independent provider of integrated IT education solutions, is dedicated

More information

Integrated Conference Bridge Professional

Integrated Conference Bridge Professional Title page Communication Server 1000 Integrated Conference Bridge Professional iii Nortel Communication Server 1000 Nortel Integrated Conference Bridge Professional Revision history June 2007 Standard

More information

Fixed Income Clearing Corporation

Fixed Income Clearing Corporation MBS RTTM Web Front End Remote Access Coordinator User Guide Date: 09/26/2011 Version #: 4.0 Distributed by: Distribution: FICC Remote Access Coordinators for MBS Web Front End Fixed Income TABLE OF CONTENTS

More information

Using Spectralink 84-Series Phones with Microsoft Lync Server 2010

Using Spectralink 84-Series Phones with Microsoft Lync Server 2010 Using Spectralink 84-Series Phones with Microsoft Lync Server 2010 This technical bulletin explains concepts and requirements for interoperating Spectralink 84- Series handsets with Microsoft Lync Server

More information

963 User Guide. Issue 1/D 1/4/04 Part No: TC200635

963 User Guide. Issue 1/D 1/4/04 Part No: TC200635 963 User Guide Issue 1/D 1/4/04 Part No: TC200635 Trend Control Systems Limited PO Box 34 Horsham Sussex RH12 2YF Tel: +44 (0) 1403 211888 www.trend-controls.com CONTENTS Copyright: Trend Control Systems

More information

KMnet Viewer. User Guide

KMnet Viewer. User Guide KMnet Viewer User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change for improvement without notice. We cannot be

More information

Oracle Utilities Smart Grid Gateway Adapter Development Kit

Oracle Utilities Smart Grid Gateway Adapter Development Kit Oracle Utilities Smart Grid Gateway Adapter Development Kit User's Guide Release 2.1.0 Service Pack 2 E41628-02 April 2014 Oracle Utilities Smart Grid Gateway Adapter Development Kit User's Guide Release

More information

User Manual Version

User Manual Version User Manual Version 8.14.0 This publication contains proprietary information of the Card Scanning Solution Company, provided for customer use only. No other use is authorized without the express written

More information

PlanetPress Search User Guide.

PlanetPress Search User Guide. PlanetPress Search User Guide www.objectiflune.com 2010 Objectif Lune Inc - 2 - Copyright Information Copyright Information Copyright 1994-2011 Objectif Lune Inc. All Rights Reserved. No part of this publication

More information

Call Center Management Information System CC MIS Getting Started Guide (Supervisor Interface)

Call Center Management Information System CC MIS Getting Started Guide (Supervisor Interface) 297-2671-175 Call Center Management Information System CC MIS Getting Started Guide (Supervisor Interface) Release 6.0 Standard 1.0 June 2005 Call Center Management Information System CC MIS Getting Started

More information

AT&T Voice DNA Receptionist User Guide

AT&T Voice DNA Receptionist User Guide AT&T Voice DNA Receptionist User Guide Page 2 of 28 Table of Contents About Receptionist... 3 Start Receptionist... 4 Use Receptionist the First Time... 4 Use Receptionist After the First Time... 7 The

More information

SCM Express Application Manual

SCM Express Application Manual SCM Express Application Manual Purpose INTRODUCTION This document describes the application operation guide of the SCM. Document Content and Organization This manual consists of the following parts and

More information

vbound User Guide vbound User Guide Version Revised: 10/10/2017

vbound User Guide vbound User Guide Version Revised: 10/10/2017 vbound User Guide Version 4.1.1 Revised: 10/10/2017 Copyright 2014-2017 FFL Solutions Inc. Page 1 of 87 Table of Contents Using vbound...5 Starting vbound... 5 Bound Book List... 6 vbound Ribbon Menu...

More information

INTRODUCTION 1.1 ABOUT THIS GUIDE What is Mission Control. Business Online POP Mail Who this Guide is For What s in This Guide

INTRODUCTION 1.1 ABOUT THIS GUIDE What is Mission Control. Business Online POP Mail Who this Guide is For What s in This Guide 1.1 About this Guide 01 INTRODUCTION Business Online POP Mail Business Online POP Mailboxes must not be selected unless the Business Online Extra or Standalone offer has been activated against the domain

More information

Oracle Utilities Mobile Workforce Management

Oracle Utilities Mobile Workforce Management Oracle Utilities Mobile Workforce Management Mobile Application User s Guide Release 2.1.0 Service Pack 5 E26618-06 October 2013 , Release 2.1.0 Service Pack 5 E26618-06 Copyright 2000, 2012, 2013 Oracle

More information

Oracle Fail Safe. Release for Microsoft Windows E

Oracle Fail Safe. Release for Microsoft Windows E Oracle Fail Safe Tutorial Release 3.4.2 for Microsoft Windows E14009-01 October 2009 Oracle Fail Safe Tutorial, Release 3.4.2 for Microsoft Windows E14009-01 Copyright 1999, 2009, Oracle and/or its affiliates.

More information

Multi-NVR Manager. Quick Start Configuration Usage

Multi-NVR Manager. Quick Start Configuration Usage Multi-NVR Manager Quick Start Configuration Usage 2014. All rights are reserved. No portion of this document may be reproduced without permission. All trademarks and brand names mentioned in this publication

More information

HikCentral Control Client. User Manual

HikCentral Control Client. User Manual HikCentral Control Client User Manual Legal Information User Manual 2018 Hangzhou Hikvision Digital Technology Co., Ltd. About this Manual This Manual is subject to domestic and international copyright

More information

Avaya Software Update Manager User Guide

Avaya Software Update Manager User Guide Avaya Software Update Manager User Guide 14-300168 Issue 3 February 2006 2006 Avaya Inc. All Rights Reserved. Notice While reasonable efforts were made to ensure that the information in this document was

More information

Novell Identity Manager

Novell Identity Manager Role Mapping Administrator User Guide AUTHORIZED DOCUMENTATION Novell Identity Manager 1.0 August 28, 2009 www.novell.com Novell Identity Manager Role Mapping Administrator 1.0 User GuideNovell Identity

More information

Deploying Lookout with IBM MaaS360

Deploying Lookout with IBM MaaS360 Lookout Mobile Endpoint Security Deploying Lookout with IBM MaaS360 February 2018 2 Copyright and disclaimer Copyright 2018, Lookout, Inc. and/or its affiliates. All rights reserved. Lookout, Inc., Lookout,

More information

Impact Attendant for Windows PC Attendant Console User s Guide For The DXP, DXP Plus and FX Series Digital Communications Systems

Impact Attendant for Windows PC Attendant Console User s Guide For The DXP, DXP Plus and FX Series Digital Communications Systems Impact Attendant for Windows Impact Attendant for Windows PC Attendant Console User s Guide For The DXP, DXP Plus and FX Series Digital Communications Systems Comdial strives to design the features in

More information

ACCESS SYSTEM Test System 2000 Release Notes

ACCESS SYSTEM Test System 2000 Release Notes ACCESS SYSTEM 2000 Test System 2000 Release Notes Part Number 883-502215-001-A November 1994 Important Notice VERILINK CORPORATION DISTRIBUTES THIS REFERENCE AS IS WITHOUT WARRANTY OF ANY KIND, EITHER

More information

Schema Inspector Utility User's Guide VERSION Copyright 2015 Jade Software Corporation Limited. All rights reserved.

Schema Inspector Utility User's Guide VERSION Copyright 2015 Jade Software Corporation Limited. All rights reserved. VERSION 7.0.12 Copyright 2015 Jade Software Corporation Limited. All rights reserved. Jade Software Corporation Limited cannot accept any financial or other responsibilities that may be the result of your

More information

Aeonix Contact Center

Aeonix Contact Center Aeonix Contact Center Agent User Guide Version 3.0 Document Edition 3.0 The information contained in this document is proprietary and is subject to all relevant copyright, patent and other laws protecting

More information

First Data Global Gateway SM Virtual Terminal User Manual

First Data Global Gateway SM Virtual Terminal User Manual First Data Global Gateway SM Virtual Terminal User Manual Version 1.0 2015 First Data Corporation. All Rights Reserved. All trademarks, service marks, and trade names referenced in this material are the

More information

Tivoli Management Solution for Microsoft SQL. Event Monitoring. Version 1.1

Tivoli Management Solution for Microsoft SQL. Event Monitoring. Version 1.1 Tivoli Management Solution for Microsoft SQL Event Monitoring Version 1.1 Tivoli Management Solution for Microsoft SQL Event Monitoring Version 1.1 Tivoli Management Solution for Microsoft SQL Copyright

More information

Swyx Skin Editor - User Documentation

Swyx Skin Editor - User Documentation Swyx Skin Editor - User Documentation Swyx Skin Editor - The Editor for creating individual skins As of: December 2009 2000-2009 Swyx. All rights reserved. Legal Information Whilst Swyx attempt to convey

More information

Oracle Communications Session Delivery Manager

Oracle Communications Session Delivery Manager Oracle Communications Session Delivery Manager Administration Guide Release 7.3 Formerly Net-Net Central December 2013 Copyright 2013, 2012 Oracle and/or its affiliates. All rights reserved. This software

More information

Full User Manual and Quick Start Guide

Full User Manual and Quick Start Guide Full User Manual and Quick Start Guide 2 W hile every precaution has been taken in the preparation of this manual, we assume no responsibility for errors or omissions. Neither, is any liability assumed

More information

E-Report. User Manual

E-Report. User Manual E-Report User Manual 2011 All rights reserved. No parts of this work may be reproduced in any form or by any means graphic, electronic, or mechanical, including photocopying, recording, taping, or information

More information

Oracle Utilities Smart Grid Gateway Adapter for Itron OpenWay

Oracle Utilities Smart Grid Gateway Adapter for Itron OpenWay Oracle Utilities Smart Grid Gateway Adapter for Itron OpenWay User's Guide Release 2.1.0 Service Pack 2 E41627-02 April 2014 Oracle Utilities Smart Grid Gateway Adapter for Itron OpenWay User's Guide Release

More information

Payment Solutions MyCardRules. MyCardRules Mobile App. User Guide. Release 3.1

Payment Solutions MyCardRules. MyCardRules Mobile App. User Guide. Release 3.1 Payment Solutions November 27, 2017 Installing MyCardRules... 2 Registering a Card and Creating an Account on MyCardRules... 2 Logging In to MyCardRules... 2 Registering a Card... 3 Creating an Account...

More information

Scopia Management. User Guide. Version 8.2. For Solution

Scopia Management. User Guide. Version 8.2. For Solution Scopia Management User Guide Version 8.2 For Solution 8.2 8.2 2000-2013 RADVISION Ltd. All intellectual property rights in this publication are owned by RADVISION Ltd and are protected by United States

More information

Virtual Communications Express Admin Guide: Call Recording

Virtual Communications Express Admin Guide: Call Recording Feature Overview The Call Recording service provides a fully hosted solution to record, store, organize, and access recordings of calls. The service can be used to help address regulatory compliance obligations,

More information

Corrigo WorkTrack Client. Windows Mobile. User s Guide

Corrigo WorkTrack Client. Windows Mobile. User s Guide Corrigo WorkTrack Client for Windows Mobile User s Guide Corrigo WorkTrack Mobile Client for Windows Mobile -- User s Guide Contents This documentation and related computer software program (hereinafter

More information

Configuration Guide for Microsoft Internet Connection Sharing

Configuration Guide for Microsoft Internet Connection Sharing Configuration Guide for Microsoft Internet Connection Sharing HUB INTERNET HOST CLIENTS Copyright 2002 Hughes Network Systems, Inc., a wholly owned subsidiary of Hughes Electronics Corporation. All rights

More information

Oracle Utilities Smart Grid Gateway Adapter for Echelon

Oracle Utilities Smart Grid Gateway Adapter for Echelon Oracle Utilities Smart Grid Gateway Adapter for Echelon User's Guide Release 2.0.0 Service Pack 9 E23539-04 May 2013 Oracle Utilities Smart Grid Gateway Adapter for Echelon User's Guide Release 2.0.0 Service

More information

Oracle Communications Network Charging and Control. Number Portability Service Pack User's Guide Release

Oracle Communications Network Charging and Control. Number Portability Service Pack User's Guide Release Oracle Communications Network Charging and Control Number Portability Service Pack User's Guide Release 12.0.0 December 2017 Copyright Copyright 2017, Oracle and/or its affiliates. All rights reserved.

More information

Quick & Simple Imaging. User Guide

Quick & Simple Imaging. User Guide Quick & Simple Imaging User Guide The Quick & Simple Imaging software package provides the user with a quick and simple way to search and find their documents, then view, print, add notes, or even e- mail

More information

Installation Guide. Tivoli Decision Support 2.0

Installation Guide. Tivoli Decision Support 2.0 Installation Guide Tivoli Decision Support 2.0 Tivoli Decision Support 2.0 Installation Guide (August, 1998) Copyright 1998 by Tivoli Systems, an IBM Company, including this documentation and all software.

More information

Online Submission Tool: Packet Management

Online Submission Tool: Packet Management Online Submission Tool: Packet Management OLS: Packet Management December 2012 Disclaimer The materials in this reference guide are for demonstration purposes only. The forms are subject to change at any

More information

EMC ApplicationXtender Web Access

EMC ApplicationXtender Web Access EMC ApplicationXtender Web Access Version 8.1 User Guide EMC Corporation Corporate Headquarters Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Legal Notice Copyright 1994 2016 EMC Corporation. All

More information

User's Manual. Access Control System. Version April 2001

User's Manual. Access Control System. Version April 2001 Win Access 2000 Version 3.00 User's Manual Version 3.00 April 2001 Access Control System The manufacture has taken due care in preparing this documentation. Due to lead time required for printing, some

More information

SteelCentral Insights for SteelConnect Users Guide

SteelCentral Insights for SteelConnect Users Guide SteelCentral Insights for SteelConnect Users Guide Version 1.1.x November 2017 2017 Riverbed Technology, Inc. All rights reserved. Riverbed and any Riverbed product or service name or logo used herein

More information

Document Signing Certificate Getting Started Guide

Document Signing Certificate Getting Started Guide Certificate Services Document Signing Certificate Getting Started Guide Using the SafeNet Authentication Client: 8.3 Document issue: 1.0 Date of issue: March 2017 For software release 12.1 Document Signing

More information

FaxTalk FaxCenter Pro Version 9.0 Because your faxes are important! Copyright Thought Communications, Inc. All rights reserved worldwide. Th

FaxTalk FaxCenter Pro Version 9.0 Because your faxes are important! Copyright Thought Communications, Inc. All rights reserved worldwide. Th FaxTalk FaxCenter Pro Because your faxes are important! Version 9.0 Send. Receive. Manage. FaxTalk FaxCenter Pro Version 9.0 Because your faxes are important! Copyright 1992-2015 Thought Communications,

More information

SIMATIC HMI. Software RemoteOperate V2. Preface. Overview 1. Range of functions of the RemoteOperate software. Hardware and software requirements

SIMATIC HMI. Software RemoteOperate V2. Preface. Overview 1. Range of functions of the RemoteOperate software. Hardware and software requirements Preface SIMATIC HMI Software SIMATIC HMI Software Programming Manual Overview 1 Range of functions of the RemoteOperate software 2 Hardware and software requirements 3 Installing RemoteOperate 4 Server

More information

Registering a Card and Creating an Account on

Registering a Card and Creating an Account on Installing MyCardRules The MyCardRules App is available for both iphones and Android phones. To install MyCardRules: 1. Search for the app in the App Store or on Google Play. 2. Follow the instructions

More information

Carbonite Server Backup Portal 8.5. Administration Guide

Carbonite Server Backup Portal 8.5. Administration Guide Carbonite Server Backup Portal 8.5 Administration Guide 2018 Carbonite, Inc. All rights reserved. Carbonite makes no representations or warranties with respect to the contents hereof and specifically disclaims

More information

PROMISE ARRAY MANAGEMENT ( PAM) FOR FastTrak S150 TX2plus, S150 TX4 and TX4000. User Manual. Version 1.3

PROMISE ARRAY MANAGEMENT ( PAM) FOR FastTrak S150 TX2plus, S150 TX4 and TX4000. User Manual. Version 1.3 PROMISE ARRAY MANAGEMENT ( PAM) FOR FastTrak S150 TX2plus, S150 TX4 and TX4000 User Manual Version 1.3 Promise Array Management Copyright 2003 Promise Technology, Inc. All Rights Reserved. Copyright by

More information

ASIC-200 Version 5.0. integrated industrial control software. HMI Guide

ASIC-200 Version 5.0. integrated industrial control software. HMI Guide ASIC-200 Version 5.0 integrated industrial control software HMI Guide Revision Description Date C Name change, correct where applicable with document 4/07 HMI Guide: 139168(C) Published by: Pro-face 750

More information

Oracle Insurance QuickView Service Ordering User Guide. Version 8.0

Oracle Insurance QuickView Service Ordering User Guide. Version 8.0 Oracle Insurance QuickView Service Ordering User Guide Version 8.0 February 2009 Oracle Insurance QuickView Service Ordering User Guide Version 8.0 Part # E14966-01 Library # E14885-01 E14886-01 February

More information

BUSINESS GROUP ADMINISTRATOR. Spectrum Business Voice. Business Group Administrator. Quick Start Guide SpectrumBusiness.

BUSINESS GROUP ADMINISTRATOR. Spectrum Business Voice. Business Group Administrator. Quick Start Guide SpectrumBusiness. Spectrum Business Voice Business Group Administrator 1 Quick Start Guide CONTENTS Overview 3 Account Creation 3 Accessing the Business Group Administrator Portal 4 Portal Overview 5 Lines 6 Auto Attendant

More information

Startel Soft Switch Configuration

Startel Soft Switch Configuration Startel Soft Switch Configuration User s Guide While every attempt is made to ensure both accuracy and completeness of information included in this document, errors can occur, and updates or improvements

More information

CSSN Scanshell.Net USER GUIDE

CSSN Scanshell.Net USER GUIDE CSSN Scanshell.Net USER GUIDE Version 1.0.3, 2005 This publication contains proprietary information of the Card Scanning Solutions Company, provided for customer use only. No other uses are authorized

More information

ShoreTel User s Guide for Nokia

ShoreTel User s Guide for Nokia ShoreTel User s Guide for Nokia Release 7.1 July 2013 Legal Notices Document and Software Copyrights Copyright 1998-2013 by ShoreTel Inc., Sunnyvale, California, USA. All rights reserved. Printed in the

More information

Allworx User s Guide. (Release 7.3)

Allworx User s Guide. (Release 7.3) Allworx User s Guide (Release 7.3) No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy, recording,

More information

VIP-102B IP Solutions Setup Tool Reference Manual

VIP-102B IP Solutions Setup Tool Reference Manual VIP-102B IP Solutions Setup Tool Reference Manual Version 6.3.0.0 For latest updates to this manual please check our website at: http://www.valcom.com/vipsetuptool/default.htm then click on Reference Manual

More information

EMC Ionix Network Configuration Manager Version 4.1.1

EMC Ionix Network Configuration Manager Version 4.1.1 EMC Ionix Network Configuration Manager Version 4.1.1 RSA Token Service Installation Guide 300-013-088 REVA01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com

More information

MITEL. Mobile Extension. Mobile Client Handset User Guide Release 1.7

MITEL. Mobile Extension. Mobile Client Handset User Guide Release 1.7 MITEL Mobile Extension Mobile Client Handset User Guide Release 1.7 NOTICE The information contained in this document is believed to be accurate in all respects but is not warranted by Mitel Networks Corporation

More information

Vendor Registration and Training

Vendor Registration and Training Vendor Registration and Training Bid Express Registration Guide Bid Express Vendor Guide February 2015 Prepared By Address: 5700 SW 34th Street, Suite 1235, Gainesville, Florida 32608-5371 Web: www.infotechfl.com

More information

RAS (Remote Administration System)

RAS (Remote Administration System) RAS (Remote Administration System) Digital Video Recorder Software User Guide Document 900.0314 Rev 2.00 RAS User Guide Revisions Issue Date Revisions 1.00 08/04 New document. 1.01 04/05 Update template,

More information

AD Summation. Administration Guide. WebBlaze

AD Summation. Administration Guide. WebBlaze AD Summation Administration Guide WebBlaze Version 3.1 Published: September 2010 COPYRIGHT INFORMATION 2009 AccessData, LLC. All rights reserved. The information contained in this document represents the

More information

Polycom RealPresence Access Director System, Virtual Edition

Polycom RealPresence Access Director System, Virtual Edition Getting Started Guide Version 4.0 July 2014 3725-78702-002D Polycom RealPresence Access Director System, Virtual Edition Copyright 2014, Polycom, Inc. All rights reserved. No part of this document may

More information

Jenzabar EX 4.5. Getting Started Guide for Administrators and Users

Jenzabar EX 4.5. Getting Started Guide for Administrators and Users Getting Started Guide for Administrators and Users October 24, 2012 2012, Jenzabar, Inc. 101 Huntington Avenue Suite 2205 Boston, MA 02199 1.877.535.0222 www.jenzabar.net This document is confidential

More information

mymmx tc Android User Guide

mymmx tc Android User Guide mymmx tc Android User Guide Copyright nwise AB 2016 All rights reserved. Disclaimer No part of this document may be reproduced in any form without the written permission of the copyright owner. The contents

More information

User Manual Customer Interaction Express 3.3 TaskFlow Editor

User Manual Customer Interaction Express 3.3 TaskFlow Editor User Manual Customer Interaction Express 3.3 TaskFlow Editor Edition: 1.0 07/22/2015 COMPAS ID: 116794 2015 Avaya Inc. All Rights Reserved. Notice While reasonable efforts were made to ensure that the

More information

CentreWare DP User Guide

CentreWare DP User Guide CentreWare DP User Guide "Your Autopilot to Productive Printer Management" Version 4.0. CENTREWARE DP USER GUIDE 998, 999 by Xerox Corporation. All rights reserved. Copyright protection claimed includes

More information

Residential Voice SUBSCRIBER GUIDE

Residential Voice SUBSCRIBER GUIDE Residential Voice SUBSCRIBER GUIDE RESIDENTIAL VOICE SUBSCRIBER GUIDE TABLE OF CONTENTS Table of Contents Getting Started... 6 Requirements... 6 First Login... 6 Features Management... 0 Basic Features...

More information

1 Siebel Attachments Solution Overview

1 Siebel Attachments Solution Overview Oracle Fusion Middleware User's Guide for Oracle Enterprise Content Management Solutions for Oracle Siebel 11g Release 1 (11.1.1) E17067-01 May 2010 This document provides information on options available

More information