Technical information
Special Security Product and Service Offers
15-2 Issue 7 June 2001
The Key and Lock use a sophisticated dynamic challenge/response technique to
assist you in preventing unauthorized access to your administration and
maintenance ports. The Key and Lock authentication process is as follows: The
Lock answers the incoming call destined for the dial-up modem port. It generates
a dynamic challenge, unique to every call, and transmits it to the RPSD installed
at the calling end. The Lock and Key must be initialized with the same secret
encryption key value. This secret encryption key has approximately 70 quadrillion
combinations.
When the RPSD Key receives the challenge, it generates a response using the
secret encryption key. It then transmits the expected response back to the RPSD
Lock. If the RPSD lock successfully authenticates the response, it provides
ringing to the terminating modem and the call completes. The RPSD terminates a
call immediately if any step in the challenge/response authentication process is
not completed successfully.
The RPSD helps to:
protect remote locations that communicate with a central network via
dial-up lines
safeguard companies that remotely administer PBX and voice mail
systems
ensure that critical network routing information and PBX feature
translations are not compromised
control access of dial-up ports by remote maintenance or service personnel
Key and Lock Features
Uses randomly-generated encrypted data to perform Key/Lock
authentication handshake.
Time of Day/Day of Week restrictions can control Key access to Locks.
Each user profile can have up to 14 restrictions set.
History Logs provide audit trails of the last 500 administrative changes,
accesses, and failures.
System Administration provides menu-driven commands with on-line help
and security options for administrative access.
Self-check and built-in diagnostics enable simple and fast problem
diagnosis.
A Power Monitor Circuit allows you to fail or bypass calls to the Lock during
a power failure.
An Alarm Contact Closure interface is provided to generate an alarm when
the Lock loses power.
Lock and Keys work with all data communications protocols.