Specifications

Maintenance Nur für den internen Gebrauch
A31003-H3580-M103-2-76A9, 01-2009
6-32 HiPath 3000/5000 V8 - HG 1500 V8, Administrator Documentation
hg-06.fm
Tra c e s
Secure trace procedure:
The procedure for creating a secure trace is as follows:
1. The service technician detects a problem in the network. The technician discusses the
need for a secure trace with the developer.
2. The customer is informed of this need and must confirm receipt of notification. The cus-
tomer then issues a secure-trace request specifying when monitoring should start and end
(with date and time).
3. The developer generates a key pair consisting of the public key and the private key. This
key pair can only be used for one secure trace. The certificates are used as follows:
The certificate with the private key is strictly confidential and can only be used by au-
thorized developers.
The certificate with the public key is transferred to the service technician. The service
technician then imports the certificate into WBM (see Import X.509 File for Secure
Trace).
4. The service technician informs the customer about the start of trace activities. The custom-
er must notify the relevant users.
5. The service technician provides the gateways for which a secure trace is to be created with
the certificate.
6. The customer activates the Secure Trace function. A secure trace is generated. The acti-
vation and subsequent deactivation activities are logged by the relevant HiPath systems.
7. Once the secure trace has been generated, the customer is informed about the end of
trace activities. The service technician removes the certificate from the system.
8. The secure trace is forwarded to the developer.
9. The developer decrypts the secure trace using the private key. He or she then analyzes the
decrypted recordings.
10. All relevant material and data must be safely destroyed once analysis is complete. The pri-
vate key must also be destroyed to prevent decryption of any illegal copies of the secure
trace.
7
Warning
The recording of calls and connection data constitutes an offence if the relevant
parties are not forewarned.