Instruction manual

DEFINITY® Business Communications System and GuestWorks® Issue 6
Overview
555-231-208
Issue 1
April 2000
System Management Solutions
14-13Other management capabilities
14
Uses a password for security protection for polling and administration
Has alarm relay contacts for wiring to an alarm reporting device
Performs on-line diagnostic tests (ROM, RAM, internal clock)
Provides an on-line, real-time system status report.
Other management capabilities
The following are other management features that enhance your investment in the
system:
Access Security Gateway
Security Violation Notification
Call Restrictions
Reporting Capabilities
System-based Reports.
Access Security Gateway
Access Security Gateway is an authentication interface used to secure the system
administration and maintenance ports and/or logins on the system. Access
Security Gateway employs a challenge/response protocol to confirm the validity of
a user and reduce the opportunity for unauthorized access. Successful
authentication is accomplished when the feature communicates with a compatible
key. The challenge/response negotiation is initiated once an RS-232 session is
established and a valid system login ID has been supplied by a user. The
authentication transaction consists of a challenge, issued by the system and
based on the login ID supplied by the user, followed by receipt of the expected
response, which is supplied by the user.
Implemented using a symmetric key form of cryptography, the core of this scheme
is a secret key, which is information possessed by both the lock and the key.
Interception of either the challenge or response during the course of transmission
will not compromise the security of the system, as the relevance of the
authentication token used to perform the challenge/response is limited to the
current challenge/response exchange. The challenge/response tool is called the
Access Security Gateway Key. This is either a calculator-like device or a program
you can install on your PC.
Security Violation Notification
Security violation notification identifies potential hackers’ attempts to access the
system. It notifies you when the number of invalid login attempts is greater than
the administered threshold. A monitor report displays the last 16 invalid login
attempts. This report is automatically updated every 30 seconds.