
------------------------------

From: farber@nynexst.com (Martin Farber)
Subject: Re: ISDN on DEC Alpha Computers
Date: 19 Dec 1994 13:40:11 GMT
Organization: Nynex Science & Technology, Inc.
Reply-To: farber@nynexst.com


In article 6@eecs.nwu.edu, dalef@bu.edu (Dale Farmer) writes:

> Today I was building a DEC Alpha workstation for a customer and
> noticed on the back a little jack labeled ISDN, and packaged with it
> was a cheapie Plantronics headset that plugs into the headset jack
> right next to the ISDN jack.  Haven't had a chance to look at the
> relevent portion of the manual yet, but it seems to have ISDN built
> right into the motherboard of the thing.  Methinks DEC may be
> getting a little optomistic about how widespread ISDN availability 
is,
> or is there some deadline coming up that I haven't heard about?

Sun Sparcs already have ISDN ports, but no parallel ports -- bright 
huh?


Sincerely,

Martin Farber           
Independent Oracle Consultant   "A Jack of all trades and a slave to 
one."
NYNEX Science & Technology
500 Westchester Ave, Rm 1B-23
White Plains, NY  10604
  -----------------
email: farber@nynexst.com
Voice: 914/644-2656
FAX: 914/644-2216

------------------------------

From: minerva.robadome.com!sheldonk@pmail.com (Sheldon Kociol)
Subject: Re: They Hacked Me! !@#$%^%^$
Date: 19 Dec 1994 22:08:44 GMT
Organization: ROLM - A Siemens Company
Reply-To: minerva.robadome.com!sheldonk@pmail.com


The ROLM CBX (9005.2.79 bind and up) has a system parameter
PM_XFR_TO_CO. This parameter set to no will not let a external callers
(ie. DID) transfer out of Phonemail to an external type of trunk
(regardless of COS). You need to check the trunk types which the
hackers are calling out on (possible CDR will tell you the trunk).
Trunks configured as ties are internal even if physically they are
external.  This parameter is global, thus if there is a need to
transfer exteranl, configuration is much more complicated and risky.
Depending on the release of Phonemail, there are simple control to one
access code to the more current releases of Phonemail which has
restrict tables (I am a CBX person, not a Phonemail person). This is
redundant to the CBX control.  I would suggest that you escallate to
the branch (you might have already done this). This problem needs
escallation to the security manager. They will be able to review your
configuration to let you know any possible holes in security.  You are
very lucky that AT&T was on the ball.

------------------------------

From: holland@perot.mtsu.edu (Mr. James Holland)
Subject: Re: They Hacked Me! !@#$%^%^$
Date: 19 Dec 1994 22:23:33 GMT
Organization: Middle Tennessee State University, Murfreesboro, 
Tennessee


In <telecom14.451.7@eecs.nwu.edu> castaldi@heroes.rowan.edu writes:

> I don't believe it - they hacked me?

> I have a ROLM 9751 and phonemail.  I have all of the DID classes of
> service low, transfer tables and all of the other standard stuff.  
My
> question is, EXACTLY how do you go through phonemail to get an 
outside
> line.  I tried every conceivable combination of transfers in and out
> several times and I could never get through?  If I know hew they are
> doing it I could plug it.

> Luckily, they spend most of their time trying to get through and
> little time on my T-1.  The callers were using stolen calling cards
> from NYC payphones to call an extension in my switch that since 
there
> was no answer went into phonemail.  (Thanks AT&T for the clue -- 
they
> called me to tell me this after about ten hours of activity) I can't
> figure this out?  Any 'hackers' out there?

Probably not, but just maybe ... on phonemail, make sure you don't
have something as simple as extension 9 setup with the ability to
transfer to it. I hit that as an extension on a customer's phonemail
system once and was greeted with a dialtone (theirs!) ... that's the
story I'm gonna stick with at least! :-)


James Holland   holland@knuth.mtsu.edu

------------------------------

End of TELECOM Digest V14 #457
******************************

          



@FROM   :telecom@delta.eecs.nwu.edu                                   
(Continued from last message)
pairs.  I'm not sure why we're not getting one cable with several
pairs in it (that's what the phone contractor recommended): perhaps
they cost more than two seperate cables?

>> The fiber costs $.45 per foot and the copper costs ~$1.10/foot.  
The
>> distance is 3000 ft.

> What's the installation cost?

I think the total materials and rental fees are $20,000.  We're
installing it with in-house construction people: We're a seasonal
business and have to keep people employed during off-season so the
labor is basically free (otherwise it would probably be another
$10,000).  Also there are going to be 9 manholes along the trench, so
installing more cables later may not be that big of a deal.  I was
amazed at how easily we got permits for digging the trench on the
public road-side.  I think we're friendly with the local town here.

The cost is actually pretty low.  For $20,000 we also could have
gotten a microwave link, but with only a single T1, and we'd have to
get a license.  Spread-spectrum was the cheapest for the computer
network, but it doesn't help with the phone.

We already rent 8 or so "local loops" for about $15 each per month.
To upgrade to 45, rental would be $8000 a year.  I think it would be
cheaper to rent T1s, but then we need expensive multiplexing equipment
as well.

The phone system itself is supposed to cost around $50,000.  I think
that covers about 150 phones and a radio link (we're a greenhouse
business: many of the employees carry radios with them so they don't
have to walk to a phone whenever there's a call).

>> I plan on using these little $100 boxes which convert ethernet to
>> fiber and use some extra PCs w/linux as bridges.

Does anyone know about the boxes I'm mentioning here?  I want to know
if they act like bridges: so that the ethernet length limit can be
exceeded.  I would like to avoid buying expensive hubs if possible
(having a PC act as hub is what I'm planning on now, but if these
boxes do it anyway, all the better).

>> I would like to know if there are boxes which take both ethernet 
and
>> T1 (or whatever signal a pdx is likely to have) and multiplex them
>> together onto the fiber so that the copper cable is not needed.

> For PBX extensions, the economics of putting in mux/demux says 
copper
> is cheaper, until you get into the line capacity that justifies a
> remote switching equipment and trunking.

Yeah, that's what I gather.  I think with all that copper we can get
away with a single PBX- although I don't know how digital/multi-line
phones are going to work.

> At that point you'll be glad to have a copper pair to run a POTS
> line over for your modem.

Yeah, also it's good to have copper for any other simple signalling
application that might come along.

> We originally ran T-1 between two buildings to serve remote 
extensions.  
> When we 'buried' cable to support a fiber network link, we found 
that
> the costs more than justified putting in 600pairs and ripping out 
the
> t-1s'. The biggest cost was digging the trench :-), and ours wasn't 
as
> long as yours will be.

My biggest problem with copper is that I'm worried that it will only
exasperate our already serious lightning problem even further.  We
usually lose an expensive 30 HP pump motor and several thousand
dollars worth of PBX pieces about once every two years.


jhallen@world.std.com (192.74.137.5)  Joseph H. Allen 

------------------------------

From: farber@nynexst.com (Martin Farber)
Subject: Re: ISDN on DEC Alpha Computers
Date: 19 Dec 1994 13:40:11 GMT
Organization: Nynex Science & Technology, Inc.
Reply-To: farber@nynexst.com


In article 6@eecs.nwu.edu, dalef@bu.edu (Dale Farmer) writes:

> Today I was building a DEC Alpha workstation for a customer and
> noticed on the back a little jack labeled ISDN, and packaged with it
> was a cheapie Plantronics headset that plugs into the headset jack
> right next to the ISDN jack.  Haven't had a chance to look at the
> relevent portion of the manual yet, but it seems to have ISDN built
> right into the motherboard of the thing.  Methinks DEC may be
> getting a little optomistic about how widespread ISDN availability 
is,
> or is there some deadline coming up that I haven't heard about?

Sun Sparcs already have ISDN ports, but no parallel ports -- bright 
huh?


Sincerely,

Martin Farber           
Independent Oracle Consultant   "A Jack of all trades and a slave to 
one."
NYNEX Science & Technology
500 Westchester Ave, Rm 1B-23
White Plains, NY  10604
  -----------------
email: farber@nynexst.com
Voice: 914/644-2656
FAX: 914/644-2216

------------------------------

From: minerva.robadome.com!sheldonk@pmail.com (Sheldon Kociol)
Subject: Re: They Hacked Me! !@#$%^%^$
Date: 19 Dec 1994 22:08:44 GMT
Organization: ROLM - A Siemens Company
Reply-To: minerva.robadome.com!sheldonk@pmail.com


The ROLM CBX (9005.2.79 bind and up) has a system parameter
PM_XFR_TO_CO. This parameter set to no will not let a external callers
(ie. DID) transfer out of Phonemail to an external type of trunk
(regardless of COS). You need to check the trunk types which the
hackers are calling out on (possible CDR will tell you the trunk).
Trunks configured as ties are internal even if physically they are
external.  This parameter is global, thus if there is a need to
transfer exteranl, configuration is much more complicated and risky.
Depending on the release of Phonemail, there are simple control to one
access code to the more current releases of Phonemail which has
restrict tables (I am a CBX person, not a Phonemail person). This is
redundant to the CBX control.  I would suggest that you escallate to
the branch (you might have already done this). This problem needs
escallation to the security manager. They will be able to review your
configuration to let you know any possible holes in security.  You are
very lucky that AT&T was on the ball.

------------------------------

From: holland@perot.mtsu.edu (Mr. James Holland)
Subject: Re: They Hacked Me! !@#$%^%^$
Date: 19 Dec 1994 22:23:33 GMT
Organization: Middle Tennessee State University, Murfreesboro, 
Tennessee


In <telecom14.451.7@eecs.nwu.edu> castaldi@heroes.rowan.edu writes:

> I don't believe it - they hacked me?

> I have a ROLM 9751 and phonemail.  I have all of the DID classes of
> service low, transfer tables and all of the other standard stuff.  
My
> question is, EXACTLY how do you go through phonemail to get an 
outside
> line.  I tried every conceivable combination of transfers in and out
> several times and I could never get through?  If I know hew they are
> doing it I could plug it.

> Luckily, they spend most of their time trying to get through and
> little time on my T-1.  The callers were using stolen calling cards
> from NYC payphones to call an extension in my switch that since 
there
> was no answer went into phonemail.  (Thanks AT&T for the clue -- 
they
> called me to tell me this after about ten hours of activity) I can't
> figure this out?  Any 'hackers' out there?

Probably not, but just maybe ... on phonemail, make sure you don't
have something as simple as extension 9 setup with the ability to
transfer to it. I hit that as an extension on a customer's phonemail
system once and was greeted with a dialtone (theirs!) ... that's the
story I'm gonna stick with at least! :-)


James Holland   holland@knuth.mtsu.edu

------------------------------

End of TELECOM Digest V14 #457
******************************

          
