background image

List of Tables

Table 1-1

PDA Controls and Ports Used in the KVL Operation........................................................................ 1-3

Table 1-2

Security Adapter Ports and Interfaces ............................................................................................ 1-5

Table 1-3

Sounds Played by the KVL 4000 .................................................................................................. 1-7

Table 12-1

KVL User Entry Errors ............................................................................................................ 12-1

Table 12-2

KVL Operational Errors ........................................................................................................... 12-2

Table 12-3

KVL 4000 Disaster Recovery .................................................................................................... 12-6

Table 12-4

North America Parts Organization Telephone Numbers ................................................................ 12-15

Table A-1

Physical Characteristics ............................................................................................................. A-1

Table A-2

Encryption .............................................................................................................................. A-1

Table A-3

Supported Algorithms ............................................................................................................... A-1

Table A-4

Electromagnetic Compatibility.................................................................................................... A-2

Table A-5

Regulatory Compliance and Approvals......................................................................................... A-2

Table B-1

KVL 4000 Model ..................................................................................................................... B-1

Table B-2

MC55 Kit ............................................................................................................................... B-1

Table B-3

Security Adapter Super Tanapa ................................................................................................... B-1

Table B-4

Front Housing Assembly – Orderable Parts ................................................................................... B-1

Table B-5

Interface Cables ....................................................................................................................... B-2

Table B-6

Optional Accessories ................................................................................................................ B-2

Table D-1

Acronyms ............................................................................................................................... D-1

xv

Summary of Contents for KVL 4000

Page 1: ...ASTRO 25 INTEGRATED VOICE AND DATA KVL 4000 KEY VARIABLE LOADER ASTRO 25 USER GUIDE January 2013 6871018P37 6871018P37 F 2013 Motorola Solutions Inc All rights reserved ...

Page 2: ......

Page 3: ...e of a product Disclaimer Please note that certain features facilities and capabilities described in this document may not be applicable to or licensed for use on a particular system or may be dependent upon the characteristics of a particular mobile subscriber unit or configuration of certain parameters Please refer to your Motorola contact for further information Trademarks MOTOROLA MOTO MOTOROL...

Page 4: ......

Page 5: ...ion operating mode November 2010 6871018P37 C Updated as follows Changed Motorola Inc to Motorola Solutions Inc Changed document layout July 2011 6871018P37 D Updated added the following sections MOTOROLA SOLUTIONS INC END USER LICENSE AGREEMENT PUBLICLY AVAILABLE SOFTWARE LIST KVL SOFTWARE INSTALLATION WIZARD PUBLICLY AVAILABLE SOFTWARE LIST PDA Personal Digital Assistant Applying Enhanced Securi...

Page 6: ...18P37 E Added updated the following sections Applying Enhanced Security Settings Through the KVL Software Installation Wizard Applying Transparent Security Settings Through the KVL Software Installation Wizard Connecting the KVL to a Radio or Another Target Device Connecting the KVL to the USB Modem for the KMF Communication Connecting the KVL to the CRYPTR micro Launching the KVL Application Exit...

Page 7: ...re Installation Wizard Applying Transparent Security Settings Through the KVL Software Installation Wizard Connecting the KVL to the USB Modem for the KMF Communication Connecting the KVL to the Network for the KMF Communication Exiting the KVL Application Configuring VPN Settings Configuring VPN Settings KVL Directly Connected to the Firewall Configuring VPN Settings KVL Connected to the Firewall...

Page 8: ......

Page 9: ...1 19 1 4 4 4 Connecting the KVL to the CRYPTR micro 1 21 1 4 5 Charging the KVL 4000 1 21 1 4 6 Launching the KVL Application 1 23 1 4 7 Exiting the KVL Application 1 25 1 4 8 Configuring VPN Settings 1 26 1 4 8 1 Configuring VPN Settings KVL Directly Connected to the Firewall 1 27 1 4 8 2 Configuring VPN Settings KVL Connected to the Firewall Through a Network 1 35 1 4 9 Establishing the VPN Conn...

Page 10: ...get Device 5 6 5 1 4 Removing All Key Groups from a Target Device 5 8 5 1 5 Removing All Keys and All Key Groups from a Target Device 5 10 5 2 Viewing Keys in Target Devices 5 12 6 KVL 4000 Sharing Keys Between KVLs 6 1 6 1 Sharing a Single Key 6 1 6 2 Sharing a Key Group and Associated Keys 6 3 6 3 Sharing All Keys and All Groups 6 4 7 Using KVL 4000 in OTAR Systems 7 1 7 1 Setting Up the KVL for...

Page 11: ...al OTAR Group 9 8 10 Managing Log Records 10 1 10 1 Organization of Log Records 10 1 10 2 Accessing Log Records 10 1 10 3 Clearing Log Records 10 2 10 4 Exporting Log Records to a PC 10 4 11 KVL 4000 Converting Encryption Keys 11 1 11 1 When to Convert Keys 11 1 11 2 Key Converting Restrictions and Guidelines 11 1 11 3 Converting a Key from ASN to ASTRO 25 11 1 11 4 Converting a Key from ASTRO 25 ...

Page 12: ......

Page 13: ... Profile IPSec Configuration Window 1 31 Figure 1 29 Assistant for New Profile Pre shared Key 1 32 Figure 1 30 Assistant for New Profile IPSec Configuration IP Addresses Window 1 33 Figure 1 31 Assistant for New Profile Firewall Settings Window 1 34 Figure 1 32 NCP Entry Configuration Manager WM Window 1 35 Figure 1 33 Profile Settings Window 1 36 Figure 1 34 Assistant for New Profile Pre shared K...

Page 14: ... Keys Example 5 8 Figure 5 8 Configure a Radio Screen Removing All Groups 5 9 Figure 5 9 Remove Keys Groups Screen Removing All Groups Example 5 10 Figure 5 10 Configure a Radio Screen Removing All Keys and Groups 5 11 Figure 5 11 Remove All Screen 5 12 Figure 5 12 Configure a Radio Screen Viewing Keys 5 13 Figure 6 1 Load Keys Groups Screen Sharing a Key Example 6 2 Figure 6 2 Load Keys Groups Sc...

Page 15: ...Document History Figure 12 14 Assembling Back Housing to Front Housing 12 13 Figure 12 15 Tightening Back Housing 12 14 Figure 12 16 Pressing Dust Covers 12 14 xiii ...

Page 16: ......

Page 17: ...le 12 4 North America Parts Organization Telephone Numbers 12 15 Table A 1 Physical Characteristics A 1 Table A 2 Encryption A 1 Table A 3 Supported Algorithms A 1 Table A 4 Electromagnetic Compatibility A 2 Table A 5 Regulatory Compliance and Approvals A 2 Table B 1 KVL 4000 Model B 1 Table B 2 MC55 Kit B 1 Table B 3 Security Adapter Super Tanapa B 1 Table B 4 Front Housing Assembly Orderable Par...

Page 18: ......

Page 19: ...List of Processes 7 1 Setting Up the KVL for KMF Operations 7 1 8 1 Performing KVL Operations Through a Remote Control Head 8 1 xvii ...

Page 20: ......

Page 21: ...8 1 Configuring VPN Settings KVL Directly Connected to the Firewall 1 27 2 1 1 Setting the KVL Log Off Time 2 1 2 1 2 Setting the KVL Screen Color Scheme 2 1 2 1 3 Turning Sharing On Off 2 3 2 1 4 1 1 Setting Up the Operator Password 2 4 2 1 4 1 2 Setting Up the Administrator Password 2 5 2 1 4 2 1 Changing the Operator Password Operator Access Level 2 6 2 1 4 2 2 Changing the Operator Password Ad...

Page 22: ...ring a Key Group and Associated Keys 6 3 6 3 Sharing All Keys and All Groups 6 4 7 1 1 Entering the UKEK 7 2 7 1 2 Selecting Main or Backup KMF 7 3 7 1 3 Entering Main and Backup KMF Phone Numbers 7 4 7 1 4 Entering Main and Backup KMF Ports 7 6 7 1 5 Entering Main and Backup KMF IP Addresses 7 7 7 1 6 Entering the KMF RSI 7 8 7 1 7 Entering the MNP for OTAR 7 9 7 1 8 Entering the KVL RSI for OTAR...

Page 23: ...l OTAR Group 9 2 9 4 Deleting an Existing Tactical OTAR Group 9 4 9 5 Viewing the Members of a Tactical OTAR Group 9 4 9 6 Adding a Member to a Tactical OTAR Group 9 5 9 7 Removing a Member from a Tactical OTAR Group 9 6 9 8 Editing the TEK of a Tactical OTAR Group 9 7 9 9 Updating a Tactical OTAR Group 9 8 10 2 Accessing Log Records 10 1 10 3 Clearing Log Records 10 2 10 4 Exporting Log Records t...

Page 24: ......

Page 25: ...is active This manual describes the ASTRO 25 operating mode What Is Covered in this Manual This manual consists of the following chapters Chapter 1 KVL 4000 Introduction Chapter 2 KVL 4000 Performing Initial Programming Chapter 3 KVL 4000 Managing Encryption Keys Chapter 4 KVL 4000 Loading Encryption Keys into Target Devices Chapter 5 KVL 4000 Managing Keys in Target Devices Chapter 6 KVL 4000 Sha...

Page 26: ...he MC55 EDA MC55 Quick Start Guide 72 127603 Describes how to get the MC55 EDA up and running KVL 4000 Quick Start Guide Provides basic information on the KVL 4000 KVL 4000 Key Variable Loader Advanced SECURENET User Guide 6871018P35 Provides step by step instructions for using the Key Variable Loader KVL to create and store encryption keys and then load them into other Motorola secure equipment s...

Page 27: ...ola grants you a personal non exclusive non assignable nontransferable license to use the Products subject to the Conditions of Use set forth in Section 2 and the terms and conditions of this Agreement Any terms or conditions appearing on the face or reverse side of any purchase order purchase order acknowledgment or other order document that are different from or in addition to the terms of this ...

Page 28: ...s designed to defeat any copy protection device should the Products be equipped with such a protection device If the Products are provided on multiple types of media such as diskette CD ROM downloadable internet then you will only use the medium which best meets your specific needs and will not loan rent lease or transfer the other media contained in the package without Motorola s written consent ...

Page 29: ...ritten consent You may not transfer the Software in violation of any laws regulations export controls or economic sanctions imposed by the U S Government 9 Upgrades and Updates If the Products are licensed to you as an upgrade or update to a product previously licensed to you you must destroy the Products previously licensed to you including any copies within 30 days of your receipt of the update ...

Page 30: ...LE IN ANY WAY FOR INCIDENTAL CONSEQUENTIAL INDIRECT SPECIAL OR PUNITIVE DAMAGES OF ANY NATURE INCLUDING WITHOUT LIMITATION LOST BUSINESS PROFITS OR LIABILITY OR INJURY TO THIRD PERSONS WHETHER FORESEEABLE OR NOT REGARDLESS OF WHETHER MOTOROLA HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES THE LIMITATIONS IN THIS PARAGRAPH WILL APPLY NOTWITHSTANDING ANY FAILURE OF ESSENTIAL PURPOSE OF ANY LIMI...

Page 31: ... Assignment This Agreement may not be assigned by you without Motorola s prior written consent 19 Survival of Provisions The parties agree that where the context of any provision indicates an intent that it survives the term of this Agreement then it will survive 20 Entire Agreement This Agreement contains the parties entire agreement regarding your use of the Products and may be amended only in w...

Page 32: ......

Page 33: ...Software in the list below is limited to the Publicly Available Software included by Motorola Solutions The Publicly Available Software included by Commercial Third Party Software or Products that is used in the Motorola Solutions Product are disclosed in the Commercial Third Party Licenses or via the respective Commercial Third Party Publicly Available Software Legal Notices For instructions on h...

Page 34: ... to whom the Software is furnished to do so subject to the following conditions The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software THE SOFTWARE IS PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND EXPRESS OR IMPLIED INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT...

Page 35: ...WEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Credits See License PUBLICLY AVAILABLE SOFTWARE LIST PDA Name NLOG Version 2 0 Descrip tion NLog is a logging platform for NET with rich log routing and management capabilities...

Page 36: ...vice Framework is only provided in Binary form from the Software Authors Source Code can be obtained via commercially licensing the Software License OpenNETCF Shared Source License NOTICE This license governs use of the accompanying software Software and your use of the Software constitutes acceptance of this license Subject to the restrictions below you may use the Software for any commercial or ...

Page 37: ... of the SOFTWARE your license to the SOFTWARE ends automatically H The patent rights if any granted in this license only apply to the SOFTWARE not to any derivative works you make I The SOFTWARE is subject to U S export jurisdiction at the time it is licensed to you and it may be subject to additional export or import laws in other places You agree to comply with all such laws and regulations that...

Page 38: ...cumentation and or other materials provided with the distribution 3 Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTI...

Page 39: ...ons of source code must retain the above copyright notice this list of conditions and the following disclaimer 2 Redistributions in binary form must reproduce the above copyright notice this list of conditions and the following disclaimer in the documentation and or other materials provided with the distribution 3 Neither the name of the University nor the names of its contributors may be used to ...

Page 40: ...KVL 4000 Key Variable Loader ASTRO 25 User Guide PUBLICLY AVAILABLE SOFTWARE COMMON LICENSES No Common Licenses included xxxviii ...

Page 41: ... signed by an officer of MOTOROLA Unless made in a separate agreement between MOTOROLA and the original end user purchaser MOTOROLA does not warrant the installation maintenance or service of the Product MOTOROLA cannot be responsible in any way for any ancillary equipment not furnished by MOTOROLA which is attached to or used in connection with the Product or for operation of the Product with any...

Page 42: ...fects or damage from improper testing operation maintenance installation alteration modification or adjustment not provided or authorized in writing by MOTOROLA 4 Breakage or damage to antennas unless caused directly by defects in material workmanship 5 A Product subjected to unauthorized Product modifications disassembles or repairs including without limitation the addition to the Product of non ...

Page 43: ...respect to infringement of patents by the Product or any parts thereof Laws in the United States and other countries preserve for MOTOROLA certain exclusive rights for copyrighted MOTOROLA software such as the exclusive rights to reproduce in copies and distribute copies of such MOTOROLA software MOTOROLA software may be used in only the Product in which the software was originally embodied and su...

Page 44: ......

Page 45: ...rformance specifications 1 2 Overview of the KVL 4000 The KVL 4000 Key Variable Loader is a portable handheld rugged device whose most basic function is to transfer encryption keys to a target device Encryption keys can be entered manually by the KVL user auto generated by the KVL obtained from or shared with another KVL or downloaded from a Key Management Facility KMF Keys can be transferred to s...

Page 46: ...al Digital Assistant The Personal Digital Assistant PDA is the host component of the KVL 4000 responsible for controlling all operations of the device It is a Motorola rugged handheld computer operating Windows Mobile 6 5 The PDA model used as part of the KVL 4000 is MC55A0 1 2 6871018P37 F January 2013 ...

Page 47: ...s on the screen 3 Volume Up Key Press to turn the volume of the KVL sounds up 4 Volume Down Key Press to turn the volume of the KVL sounds down 5 Action Button You can use it instead of your finger to initiate an action 6 End Key Press to return to the KVL main screen 7 Side Up Navigation Key You can use it instead of your finger to scroll up a list 8 Side Down Navigation Key You can use it instea...

Page 48: ...A to the Security Adapter or to a PC through the USB Programming Cable 15 Stylus You can use it instead of your finger to tap and drag items on the screen For more information on the PDA see the MC55 Enterprise Digital Assistant User Guide 72E 108859 available at http www motorola com enterprisemobility manuals 1 2 1 2 Security Adapter The Security Adapter is an integral component of the KVL 4000 ...

Page 49: ... upgrade operations 2 Tricolored LED Serves as the diagnostic status indicator for the KVL The available states are Momentary Red before security adapter self tests Fast Flashing Amber during security adapter self tests power up Solid Green after successful security adapter self tests Solid Red fatal error hardware failure 3 Charging Port Connect the charger to charge the PDA battery 6871018P37 F ...

Page 50: ...into position 7 PDA Interface Port Serves as the interface to any attached host the primary host for the Security Adapter is the PDA 1 2 2 KVL 4000 Key Features The KVL 4000 offers the following features Manual and automatic generation of encryption keys Password protection Administrator and Operator security levels Secure storage of encryption keys Configuration of system and user specific settin...

Page 51: ... loading Tactical OTAR Remote Control Head key loading 1 2 3 KVL 4000 Sounds Table 1 3 Sounds Played by the KVL 4000 Sound name Description attention Played for any case when your attention is needed bad bonk Played when you enter an invalid digit when entering a value completed Played when an action or a process such as loading keys is completed connected Played when you connect an external devic...

Page 52: ...cryption Keys KEK Used by the KVL to provide an additional level of encryption to the encryption keys when transferring keys directly to the KMF or over the air to secure subscriber devices Both types of keys are stored in the KVL memory in an encrypted format and are protected from tampering 1 2 4 2 Entering and Loading Keys Overview Encryption keys are entered into the KVL memory locations slots...

Page 53: ...d Windows 7 ensure that Microsoft Windows Mobile Device Center is installed on your PC When and where to use By default the KVL uses Transparent Security Settings If required by your organization s policies follow this procedure to apply Enhanced Security Settings Applying Enhanced Security Settings causes the KVL to prevent installation and launching of any unsigned applications disable the use o...

Page 54: ...ws XP the ActiveSync application starts For Windows Vista and Windows 7 the Windows Mobile Device Center starts If ActiveSync or Windows Mobile Device Center do not start automatically perform 12 4 Setting the PDA USB Mode page 12 5 to put the PDA into the USB Client or USB OTG mode 4 Insert the CD provided by Motorola and run the Setup exe file to start the KVL Software Installation Wizard Step r...

Page 55: ...r PC Step result The Enhanced Security Settings are applied successfully 9 Click Next Exit to close the KVL Software Installation Wizard 10 Disconnect the USB Programming Cable from the PDA 11 Connect the Security Adapter to the PDA If the Security Adapter is not detected automatically perform 12 4 Setting the PDA USB Mode page 12 5 to put the PDA into the USB Host or USB OTG mode 1 4 2 Applying T...

Page 56: ...pt 6 In the window that appears clear the check box next to Your device is using Enhanced Security Settings and click Next The Transparent Security Settings will be applied after the KVL application reinstallation upgrade During the installation process the PDA may restart several times 7 When the process is completed click Next Exit to close the KVL Software Installation Wizard Step result The Tr...

Page 57: ... position an orange dot is visible Figure 1 7 PDA and Security Adapter Connected 3 If the Security Adapter is not detected automatically after powering on the PDA perform 12 4 Setting the PDA USB Mode page 12 5 to put the PDA into the USB Host or USB OTG mode 1 4 4 Connecting the KVL to Target Devices 1 4 4 1 Connecting the KVL to a Radio or Another Target Device You can load encryption keys into ...

Page 58: ...ity KMF see 1 4 4 3 Connecting the KVL to the KMF page 1 16 KMF CryptR CRYPTR micro used with MCC 7100 IP Dispatch Console and AME 1500 2000 see 1 4 4 4 Connecting the KVL to the CRYPTR micro page 1 21 Procedure Steps 1 For information on what cables adaptors to use with particular target devices see Table B 5 Interface Cables in B KVL 4000 Orderable Parts page B 1 2 Connect the KVL and the Target...

Page 59: ...1 4 4 1 Connecting the KVL to a Radio or Another Target Device Figure 1 9 KVL and KMF Connected Figure 1 10 KVL and MGEG Connected Example 6871018P37 F January 2013 1 15 ...

Page 60: ... two KVLs through their key load ports Figure 1 11 Two KVL Units Connected The KVL 4000 is also compatible with the previous models of the KVL 1 4 4 3 Connecting the KVL to the KMF 1 4 4 3 1 Connecting the KVL to the KMF Direct Connection Prerequisites Ensure you have a Null Modem Cable When and where to use Use these steps to directly connect the KVL to the KMF 1 16 6871018P37 F January 2013 ...

Page 61: ...VL to the KMF through the DB9 Port RS 232 Depending on the cable type you may need to use a DB9 Gender Changer Figure 1 12 KVL and KMF Direct Connection 1 4 4 3 2 Connecting the KVL to the USB Modem for the KMF Communication Prerequisites Ensure that You have the power supply You have the USB modem 6871018P37 F January 2013 1 17 ...

Page 62: ...connected to the KVL during the operation 2 Connect the KVL to the USB modem Use the MultiMobile USB modem Figure 1 13 KVL and USB Modem Connected 3 Connect the USB modem to the telephone line 1 4 4 3 3 Connecting the KVL to the Serial Modem for the KMF Communication Prerequisites Ensure you have serial modem serial cable 1 18 6871018P37 F January 2013 ...

Page 63: ...dem Connected Example Since the KVL 4000 has no flow control you need to configure any attached external modem to Override the modem s Data Terminal Ready signal Turn off the echo of offline commands 1 4 4 3 4 Connecting the KVL to the Network for the KMF Communication Prerequisites Ensure that you have USB to Ethernet Adapter MINI B to Type A USB Cable Ethernet cable Procedure Steps 6871018P37 F ...

Page 64: ...d to the KVL during the operation 2 Connect the USB to Ethernet Adapter to the USB Port on the KVL using the MINI B to Type A USB Cable Use the CradlePoint Technology Ethernet adapter 3 Connect the USB to Ethernet Adapter to the network using the Ethernet cable Figure 1 15 KVL and USB to Ethernet Adapter Connected 1 20 6871018P37 F January 2013 ...

Page 65: ...ps 1 Connect the CRYPTR micro key load cable to the key load port on the KVL 2 Insert the CRYPTR micro into the Cable Connector Figure 1 16 CRYPTR micro and KVL Connected 1 4 5 Charging the KVL 4000 Prerequisites Ensure that you have Power Supply AC Line Cord See B KVL 4000 Orderable Parts page B 1 for the list of compatible AC Line Cords 6871018P37 F January 2013 1 21 ...

Page 66: ...the AC Line Cord to the power supply 3 Connect the power supply to the KVL through the Charging Port on the Security Adapter Step result The KVL starts charging The middle LED on the PDA is blinking to indicate the KVL is being charged Once the device is fully charged the LED becomes solid Figure 1 17 KVL 4000 Charging 1 22 6871018P37 F January 2013 ...

Page 67: ...Procedure Steps 1 If the device is not already powered on press the Power button on the PDA If you reboot the device the KVL application launches automatically Step result The KVL powers on and the Today screen appears Figure 1 18 Today Screen 6871018P37 F January 2013 1 23 ...

Page 68: ... Otherwise the Welcome screen appears Figure 1 19 Welcome Screen To change the user level tap User the current user level is presented The available values are Operator and Administrator To exit the KVL application tap Exit If you launch the KVL first time after reinstalling upgrading the KVL application upgrading Security Adapter software or applying Security Settings on the KVL the End User Lice...

Page 69: ...erator and enter an incorrect password 3 times your account is locked Wait 15 minutes to try again or contact an Administrator to unlock your account see 12 3 Unlocking the Operator Account page 12 5 1 4 7 Exiting the KVL Application When and where to use Use these steps to exit the KVL application To avoid unnecessary drain on the battery always exit the KVL application before turning off the uni...

Page 70: ...e 1 21 Log Off Screen 3 Select Yes exit or Yes log off and exit Step result You exit the application and the Today screen appears 1 4 8 Configuring VPN Settings The KVL can use an Ethernet connection to communicate with the KMF If applicable you can establish this connection within your organization s trusted network or you can use the VPN client provided by Motorola To be able to use the VPN clie...

Page 71: ...n the VPN gateway IP address from the system administrator For Windows XP ensure that Microsoft ActiveSync is installed on your PC For Windows Vista and Windows 7 ensure that Microsoft Windows Mobile Device Center is installed on your PC Ensure that NCP Entry Configuration Manager WM is installed on your PC NCP Entry Configuration Manager WM is available at http www ncp e com en downloads software...

Page 72: ...n Manager WM Step result The NCP Entry Configuration Manager WM launches Figure 1 22 NCP Entry Configuration Manager WM Window 2 On the NCP Entry Configuration Manager WM window select Configuration Profile Settings Step result The Profile Settings window appears Figure 1 23 Profile Settings Window 1 28 6871018P37 F January 2013 ...

Page 73: ...tant for New Profile Pre shared Key window appears Figure 1 24 Assistant for New Profile Pre shared Key Window 4 Select Link to Corporate Network Using IPSec and click Next Step result The Assistant for New Profile Connection Name window appears Figure 1 25 Assistant for New Profile Connection Name Window 6871018P37 F January 2013 1 29 ...

Page 74: ...le Communication Medium window appears Figure 1 26 Assistant for New Profile Communication Medium Window 6 From the Communication Media drop down list select LAN over IP and then click Next Step result The Assistant for New Profile VPN Gateway Parameters window appears Figure 1 27 Assistant for New Profile VPN Gateway Parameters Window 1 30 6871018P37 F January 2013 ...

Page 75: ...dress you obtained from the system administrator For systems with the Dynamic System Resilience DSR feature in case of a switchover you will need to change the IP address to be able to contact the backup Gateway b Click Next Step result The Assistant for New Profile IPSec Configuration window appears Figure 1 28 Assistant for New Profile IPSec Configuration Window 6871018P37 F January 2013 1 31 ...

Page 76: ...der ASTRO 25 User Guide 8 On the IPSec Configuration window click Next Step result The Assistant for New Profile Pre shared Key window appears Figure 1 29 Assistant for New Profile Pre shared Key 1 32 6871018P37 F January 2013 ...

Page 77: ...hat you enter here must match the Pre shared key on the Firewall For more information see the Firewall manual b From the Type drop down list select Fully Qualified Domain Name c In the ID field enter the ID d Click Next Step result The Assistant for New Profile IPSec Configuration IP Addresses window appears Figure 1 30 Assistant for New Profile IPSec Configuration IP Addresses Window 6871018P37 F...

Page 78: ... Settings window click OK Step result The window closes 13 Connect the PDA to the PC using the USB Programming Cable Step result For Windows XP the ActiveSync application starts For Windows Vista and Windows 7 the Windows Mobile Device Center starts If ActiveSync or Windows Mobile Device Center do not start perform 12 4 Setting the PDA USB Mode page 12 5 to put the PDA into the USB Client or USB O...

Page 79: ...led on your PC NCP Entry Configuration Manager WM is available at http www ncp e com en downloads software html Ensure that you have the USB Programming Cable When and where to use If you are going to establish the KVL to KMF Ethernet connection using the VPN client provided by Motorola use these steps to create a configuration profile for a scenario when the KVL is going to be connected to the Fi...

Page 80: ...uration Profile Settings Step result The Profile Settings window appears Figure 1 33 Profile Settings Window 3 On the Profile Settings window click Add Step result The Assistant for New Profile Pre shared Key window appears Figure 1 34 Assistant for New Profile Pre shared Key Window 1 36 6871018P37 F January 2013 ...

Page 81: ...nt for New Profile Connection Name window appears Figure 1 35 Assistant for New Profile Connection Name Window 5 In the Name of the connection field type KVL4000 through Network and click Next Step result The Assistant for New Profile Communication Medium window appears Figure 1 36 Assistant for New Profile Communication Medium Window 6871018P37 F January 2013 1 37 ...

Page 82: ... the Communication Media drop down list select LAN over IP and then click Next Step result The Assistant for New Profile VPN Gateway Parameters window appears Figure 1 37 Assistant for New Profile VPN Gateway Parameters Window 1 38 6871018P37 F January 2013 ...

Page 83: ...P address you obtained from the system administrator For systems with the Dynamic System Resilience DSR feature in case of a switchover you will need to change the IP address to be able to contact the backup Gateway b Click Next Step result The Assistant for New Profile IPSec Configuration window appears Figure 1 38 Assistant for New Profile IPSec Configuration Window 6871018P37 F January 2013 1 3...

Page 84: ...der ASTRO 25 User Guide 8 On the IPSec Configuration window click Next Step result The Assistant for New Profile Pre shared Key window appears Figure 1 39 Assistant for New Profile Pre shared Key 1 40 6871018P37 F January 2013 ...

Page 85: ...key that you enter here must match the Pre shared key on the Firewall For more information see the Firewall manual b From the Type drop down list select Fully Qualified Domain Name c In the ID field enter the ID d Click Next Step result The Assistant for New Profile IPSec Configuration IP Addresses window appears Figure 1 40 Assistant for New Profile IPSec Configuration IP Addresses Window 6871018...

Page 86: ...ettings window click OK Step result The window closes 13 Connect the PDA to the PC using the USB Programming Cable Step result For Windows XP the ActiveSync application starts For Windows Vista and Windows 7 the Windows Mobile Device Center starts If ActiveSync or Windows Mobile Device Center do not start perform 12 4 Setting the PDA USB Mode page 12 5 to put the PDA into the USB Client or USB OTG...

Page 87: ... service if it is not already running Obtain the VPN Username and VPN Password from your system administrator When and where to use Use these steps if you want to establish the KVL to KMF Ethernet connection using the VPN client provided by Motorola Procedure Steps 1 In the upper left corner of the PDA screen select Start Programs Step result The Programs screen appears Figure 1 42 Programs Screen...

Page 88: ...r Guide 2 Select the NCP Secure Client icon Step result The NCP Secure Client screen appears Figure 1 43 NCP Secure Client Screen KVL 4000 at Firewall Figure 1 44 NCP Secure Client Screen KVL 4000 Through Network 1 44 6871018P37 F January 2013 ...

Page 89: ...KVL4000 through Network 4 Select Connect Step result You are prompted to enter your VPN Username 5 Type in your VPN Username and select OK Step result You are prompted to enter your VPN Password 6 Type in your VPN Password and select OK Step result The Connecting animation appears followed by the Connected screen The VPN connection is established Figure 1 45 NCP Secure Client Screen KVL 4000 at Fi...

Page 90: ...NCP Secure Client Screen KVL 4000 Through Network Connected 1 4 10 Terminating the VPN Connection When and where to use Use these steps if you established the KVL to KMF Ethernet connection using the VPN client provided by Motorola 1 46 6871018P37 F January 2013 ...

Page 91: ...icon Step result The NCP Secure Client screen appears 3 Select Disconnect Step result The Disconnecting animation appears and then the NCP Secure Client screen comes back The VPN connection is terminated Postrequisites Before provisioning radios with authentication keys ensure the NCP Client Service is stopped On the PDA screen select Start Programs NCP Client Service and stop the service 6871018P...

Page 92: ......

Page 93: ...r KVL Only an Administrator can set or change the KVL log off time Procedure Steps 1 Log on to the KVL application as an Administrator 2 On the KVL main screen select Settings Security Inactivity Step result The list of available duration appears with the currently set duration highlighted To return to the previous screen without changing the current duration tap Cancel 3 Tap the desired duration ...

Page 94: ...TRO 25 User Guide When and where to use Use these steps to set the KVL screen color scheme Figure 2 1 KVL Screen in Day Time Color Scheme Example Figure 2 2 KVL Screen in Night Time Color Scheme Example 2 2 6871018P37 F January 2013 ...

Page 95: ...eys the sharing feature must be turned on in both the source and target KVL Prerequisites Only an Administrator can turn sharing on or off Procedure Steps 1 On the KVL main screen select Settings Security Sharing Step result A list of available values appears On Off with the currently set value highlighted 2 Select the desired value 3 Tap Done on the consecutive screens to return to the KVL main s...

Page 96: ... Backup KMF entering and changing KMF phone numbers changing UKEK for KMF operation clearing the list of received jobs clearing log records Without password protection all users have access to all of the KVL functions 2 1 4 1 Setting Up Passwords on the KVL This section covers the following topics 2 1 4 1 1 Setting Up the Operator Password page 2 4 2 1 4 1 2 Setting Up the Administrator Password p...

Page 97: ... type the password dynamic hints about password rules appear 3 In the Repeat password entry field type the password again Step result If the passwords match the Done button is enabled To abort the operation at any time tap Cancel 4 Tap Done Step result The password has been set up 5 Tap Done on the consecutive screens to return to the KVL main screen If the Operator password is forgotten the Admin...

Page 98: ...les appear 3 In the Repeat password entry field type the password again Step result If the passwords match the Done button is enabled To abort the operation at any time tap Cancel 4 Tap Done Step result The password has been set up 5 Tap Done on the consecutive screens to return to the KVL main screen 2 1 4 2 Changing Passwords on the KVL This section covers the following topics 2 1 4 2 1 Changing...

Page 99: ...n 15 and 30 characters including at least 1 special character 1 numeric character and 1 uppercase character The following special characters are acceptable _ As you type the password dynamic hints about password rules appear 5 In the Repeat password entry field type the password again Step result If the passwords match the Done button is enabled To abort the operation at any time tap Cancel 6 Tap ...

Page 100: ...ypad The password must contain between 15 and 30 characters including at least 1 special character 1 numeric character and 1 uppercase character The following special characters are acceptable _ As you type the password dynamic hints about password rules appear 5 In the Repeat password entry field type the password again Step result If the passwords match the Done button is enabled To abort the op...

Page 101: ... 1 special character 1 numeric character and 1 uppercase character The following special characters are acceptable _ As you type the password dynamic hints about password rules appear 5 In the Repeat password entry field type the new password again Step result If the passwords match the Done button is enabled To abort the operation at any time tap Cancel 6 Tap Done Step result The password has bee...

Page 102: ...gs Security Passwords Clear passwords Step result A screen with the Clear passwords slider appears Figure 2 3 Clear Passwords Screen 3 Touch the slider and drag it from left to right Alternatively highlight the slider and use the navigation key on the PDA to move it Clearing passwords removes the passwords for both administrator and operator Step result The passwords have been cleared 4 Tap Done o...

Page 103: ...the particular system ASN ASTRO 25 or Radio Authentication in which the KVL is operating 2 2 1 KVL 4000 Switching Between the Modes of Operation The KVL provides three modes of operation ASN Advanced SECURENET ASTRO 25 and Radio Authentication The KVL is shipped from the factory to power on in the ASTRO 25 mode Then the KVL powers on in the mode it was operating in when it was last powered off Pre...

Page 104: ...y used mode highlighted To return to the previous screen without changing the mode tap Cancel 2 Tap the desired mode of operation Step result The mode is changed 3 Tap Done to return to the KVL main screen 2 2 2 Setting the Baud Rate for RS 232 Communication When using the KVL DB9 Port RS 232 to communicate with external equipment such as a KMF or a modem select the proper baud rate 2 12 6871018P3...

Page 105: ...lue 3 Tap Done on the consecutive screens to return to the KVL main screen 2 2 3 Changing the FIPS Mode The KVL can operate in a mode that is compliant with the U S Federal Information Processing Standard FIPS guidelines To be FIPS compliant set passwords on your KVL Prerequisites Only an Administrator can change the FIPS mode When and where to use Use these steps to change the FIPS mode Changing ...

Page 106: ...evel 2 is set for the mode the KVL is currently operating in 2 Select the desired value Step result A Warning screen appears informing that changing the FIPS mode will remove all keys 3 Select Yes change FIPS mode if you are sure that you want to continue Step result The FIPS mode is changed 4 Tap Done on the consecutive screens to return to the KVL main screen 2 2 4 Managing the System Key DVI XL...

Page 107: ...erate the key automatically Enter the key manually using the Hex keypad At any time you can tap the key entry bar to go to the key review screen 4 Tap Done Step result A warning message appears informing that changing the system key will delete all keys associated with the system key 5 Tap Yes change system key to confirm the change Step result The System Key is changed 6 Tap Done on the consecuti...

Page 108: ...em key 5 Tap Yes change system key to confirm the change Step result The System Key is changed 6 Tap Done on the consecutive screens to return to the KVL main screen 2 2 4 3 Setting Up the KVL to Use the Default System Key Procedure Steps 1 On the KVL main screen select Settings Security System Key 2 Tap the Use default tab Step result A message appears informing that the default system key will b...

Page 109: ...ring Encryption Keys Manually Prerequisites Only an Administrator can enter keys When and where to use Use these steps to manually enter a Traffic Encryption Key TEK or a Key Encryption Key KEK into the KVL internal key database Procedure Steps 1 Select Manage keys on the KVL main screen Step result The Manage keys screen appears Figure 3 1 Manage Keys Screen Entering a Key Example 6871018P37 F Ja...

Page 110: ...Type and choose one of the key types from the list 7 Select CKR ID and type the Common Key Reference number Valid CKRs for TEKs are 1 through 4095 Valid CKRs for KEKs are 61440 through 65535 8 Tap Done when ready 9 Select Key ID and type the hexadecimal number to set the key location The possible range is 0000 FFFF The KVL does not accept keys of the same algorithm type with duplicate Key IDs each...

Page 111: ...flashes red In this case tap Del and correct the number Every two numbers entered for the key represent a byte of data that must have odd parity for DES keys For non DES keys Encryption key validity is checked only after you entered the entire key and tapped Done Figure 3 2 Review Key Screen Example 13 Once you have entered the key tap Done to confirm or Next Key to confirm and enter a new key wit...

Page 112: ...creen Entering a Key Example 2 Select the button to define a new key 3 Select Auto generate to generate multiple keys quickly 4 Enter the number of keys to auto generate and tap Next Step You can generate a maximum of 100 keys at a time 5 Type the naming pattern for the new keys using the PDA keypad 6 Select Algorithm and choose one of the algorithms from the list 7 Select Key Type and choose one ...

Page 113: ...ed you return to the Manage keys screen 13 Tap Done to return to the KVL main screen 3 2 Using Key Groups The KVL provides a convenient feature called key groups This feature allows you to associate several keys stored in the KVL memory with a specified group name You can then load the entire group of keys to the target device in a single operation This is especially useful when loading the same g...

Page 114: ...e keys screen appears with a list of available keys Figure 3 4 Manage Keys Screen Creating a Group Example 2 Select the Groups tab 3 Tap the button to define a new group 4 Type the group name using the PDA keypad and tap Next Step Group names may contain 18 characters including spaces 3 6 6871018P37 F January 2013 ...

Page 115: ...d and displayed in the groups list Figure 3 5 Adding Keys to a Group Example 6 Tap Done 7 Tap the button to create another group or tap Done to return to the KVL main screen 3 2 2 Modifying Groups When the KVL contains one or more key groups you can perform the following tasks on them view keys in a group add keys to a group delete keys from a group delete a group rename a group 6871018P37 F Janua...

Page 116: ...croll through the list or quickly jump within the list to a selected area If the list fits completely on the screen the smart bar is disabled 3 Select the group you want to see the keys for Step result The group with all keys associated with it appears Figure 3 6 Viewing Keys in a Group Example 4 When finished tap Done on the consecutive screens to return to the KVL main screen 3 2 2 2 Adding Keys...

Page 117: ... tab You can use the smart bar on the right side of the screen to scroll through the list or quickly jump within the list to a selected area If the list fits completely on the screen the smart bar is disabled 3 Select the group you want to add keys to Step result The group with all keys associated with it appears 4 Tap Edit keys Step result A list of all available keys appears Figure 3 7 Group wit...

Page 118: ...s from a Group Prerequisites Only an Administrator can delete keys from a group Procedure Steps 1 Select Manage keys on the KVL main screen Step result The Manage keys screen appears with a list of available keys 2 Select the Groups tab You can use the smart bar on the right side of the screen to scroll through the list or quickly jump within the list to a selected area If the list fits completely...

Page 119: ...with the selected key to the left When finished tap Done 6 Tap Done Step result The new configuration is saved and the groups list appears 7 Tap Done to return to the KVL main screen 3 2 2 4 Deleting a Group Prerequisites Only an Administrator can delete a group Procedure Steps 1 Select Manage keys on the KVL main screen Step result The Manage keys screen appears with a list of available keys 6871...

Page 120: ...completely on the screen the smart bar is disabled 3 Select the group you want to delete Step result The group with all keys associated with it appears Figure 3 9 Deleting a Group Example 4 Tap Delete Step result The group has been deleted If you want to restore the deleted group tap Restore before leaving the confirmation screen 5 Tap Done to confirm 6 Tap Done to return to the KVL main screen 3 ...

Page 121: ... the right side of the screen to scroll through the list or quickly jump within the list to a selected area If the list fits completely on the screen the smart bar is disabled 3 Select the group you want to rename Step result The group with all keys associated with it appears 4 Tap Edit name Step result The name field appears Figure 3 10 Group Name Field Example 5 Delete the current name and type ...

Page 122: ...ng Encryption Keys You can modify an Encryption Key TEK or KEK stored in a specific CKR location in the KVL memory Prerequisites Only an Administrator can modify keys Procedure Steps 1 Select Manage keys on the KVL main screen Step result The Manage keys screen appears Figure 3 11 Manage Keys Screen Modifying a Key Example 3 14 6871018P37 F January 2013 ...

Page 123: ...ep result A screen with details for the selected key appears Figure 3 12 Key Details Screen Example The Algorithm Key Type and CKR ID entries are read only 3 Modify the Name of the key using the PDA keypad 4 Select and modify Key ID using the Hex keypad The KVL does not accept keys of the same algorithm type with duplicate Key IDs each key of a particular algorithm type must have a unique KID 5 Ta...

Page 124: ... of data that must have odd parity for DES keys For non DES keys Encryption key validity is checked only after you entered the entire key and tapped Done 8 Once you have entered the key tap Done to confirm Step result The key has been modified and you return to the list of keys 9 Tap Done to return to the KVL main screen 3 4 Deleting Encryption Keys You can erase an Encryption Key TEK or KEK store...

Page 125: ... key you want to delete You can use the smart bar on the right side of the screen to scroll through the list or quickly jump within the list to a selected area If the list fits completely on the screen the smart bar is disabled 3 Tap Delete Step result The key has been deleted If you want to restore the deleted key tap Undo before leaving the confirmation screen 4 Tap Accept to confirm 5 Tap Done ...

Page 126: ......

Page 127: ...igital Interface Unit DIU Motorola Gold Elite Gateway MGEG MCC 7500 Console PDEG Encryption Unit CAI Data Encryption Module CDEM Key Management Facility KMF see Chapter 7 Using KVL 4000 in OTAR Systems KMF CryptR CRYPTR micro used with MCC 7100 IP Dispatch Console and AME 1500 2000 4 1 Loading a Selected Key Prerequisites There are encryption keys in the KVL database When and where to use Use thes...

Page 128: ...en Example You can use the smart bar on the right side of the screen to scroll through the list or quickly jump within the list to a selected area If the list fits completely on the screen the smart bar is disabled 2 Connect the target device to the KVL using an appropriate key load cable See 1 4 4 1 Connecting the KVL to a Radio or Another Target Device page 1 13 4 2 6871018P37 F January 2013 ...

Page 129: ...een loaded to the target device 4 Select another key to load or tap Done If you want to load the same key to another target device disconnect the current target device and connect another one The loading process starts automatically 5 Tap Done to return to the KVL main screen 4 2 Loading a Key Group Prerequisites There are key groups in the KVL database When and where to use Use these steps to loa...

Page 130: ...p Example 2 Select the Groups tab You can use the smart bar on the right side of the screen to scroll through the list or quickly jump within the list to a selected area If the list fits completely on the screen the smart bar is disabled 3 Connect the target device to the KVL using an appropriate key load cable See 1 4 4 1 Connecting the KVL to a Radio or Another Target Device page 1 13 4 4 687101...

Page 131: ...ups may contain undefined keys CKRs with no KID or key data the number of keys loaded may differ from the number of keys in the key group Only the defined keys in a key group are loaded into the target device 5 Select another group to load or tap Done If you want to load the same group to another target device disconnect the current target device and connect another one The loading process starts ...

Page 132: ... Use these steps to load all keys into a target device Procedure Steps 1 On the KVL main screen select Load keys groups Load keys groups Step result The list of keys appears Figure 4 5 Load Keys Groups Screen Loading All Keys Example 2 Tap Select all Step result All the keys on the list are selected If the target device is already connected the button says Load all instead Tap it to start the load...

Page 133: ...ne is played and a confirmation screen appears The following are the possible statuses indicated on the list of keys Check mark the key has been loaded Animation the key is currently being loaded Selection the key is waiting to be loaded Figure 4 6 Loading a Key Statuses Example 4 Disconnect the target device 5 Connect another target device to load all keys to the loading process starts automatica...

Page 134: ...s tab 3 Tap Select all Step result All the groups on the list are selected If the target device is already connected the button says Load all instead Tap it to start the loading process Because key groups may contain undefined keys CKRs with no KID or key data the number of keys loaded may differ from the number of keys in the key group Only defined keys in a key group are loaded into a target dev...

Page 135: ... group being loaded through blinking indication When the loading process is completed a completed tone is played and a confirmation screen appears The following are the possible states indicated on the list of key groups Check mark the key group has been loaded Animation the key group is currently being loaded Selection the key group is waiting to be loaded 5 Disconnect the target device 6 Connect...

Page 136: ......

Page 137: ...y from a Target Device page 5 1 5 1 2 Removing a Key Group from a Target Device page 5 3 5 1 3 Removing All Keys from a Target Device page 5 6 5 1 4 Removing All Key Groups from a Target Device page 5 8 5 1 5 Removing All Keys and All Key Groups from a Target Device page 5 10 5 1 1 Removing a Key from a Target Device Prerequisites There are encryption keys in the target device Procedure Steps 1 Se...

Page 138: ...et device to the KVL using an appropriate key load cable See 1 4 4 1 Connecting the KVL to a Radio or Another Target Device page 1 13 Step result A tone is played and a list of available options appears Figure 5 1 Configure a Radio Screen 5 2 6871018P37 F January 2013 ...

Page 139: ...list fits completely on the screen the smart bar is disabled 4 Select the key you want to remove by dragging the slider of the key from left to right Step result An animation appears while the key is being removed When the key has been removed a completed sound is played 5 Remove another key or tap Done on the consecutive screens to return to the KVL main screen 5 1 2 Removing a Key Group from a T...

Page 140: ...o connect the target device 2 Connect the target device to the KVL using an appropriate key load cable See 1 4 4 1 Connecting the KVL to a Radio or Another Target Device page 1 13 Step result A tone is played and a list of available options appears Figure 5 3 Configure a Radio Screen Removing a Group 5 4 6871018P37 F January 2013 ...

Page 141: ...ars Figure 5 4 Remove Keys Groups Screen Removing a Group Example 4 Select the Groups tab You can use the smart bar on the right side of the screen to scroll through the list or quickly jump within the list to a selected area If the list fits completely on the screen the smart bar is disabled 6871018P37 F January 2013 5 5 ...

Page 142: ...Figure 5 5 Group Removed Example 6 Remove another group or disconnect the target device and tap Done on the consecutive screens to return to the KVL main screen 5 1 3 Removing All Keys from a Target Device Prerequisites There are keys in the target device Procedure Steps 1 Select Configure a radio on the KVL main screen Step result You are prompted to connect the target device 5 6 6871018P37 F Jan...

Page 143: ...o the KVL using an appropriate key load cable See 1 4 4 1 Connecting the KVL to a Radio or Another Target Device page 1 13 Step result A tone is played and a list of available options appears Figure 5 6 Configure a Radio Screen Removing All Keys 6871018P37 F January 2013 5 7 ...

Page 144: ...cating that the keys are being removed When the operation has completed successfully a completed tone is played 6 Disconnect the target device and connect another target device to remove keys from or tap Done on the consecutive screens to return to the KVL main screen 5 1 4 Removing All Key Groups from a Target Device Prerequisites There are key groups in the target device Procedure Steps 1 Select...

Page 145: ... to the KVL using an appropriate key load cable See 1 4 4 1 Connecting the KVL to a Radio or Another Target Device page 1 13 Step result A tone is played and a list of available options appears Figure 5 8 Configure a Radio Screen Removing All Groups 6871018P37 F January 2013 5 9 ...

Page 146: ...e groups Step result A progress animation appears indicating that the groups are being removed When the operation has completed successfully a completed tone is played 7 Disconnect the target device and connect another target device to remove groups from or tap Done on the consecutive screens to return to the KVL main screen 5 1 5 Removing All Keys and All Key Groups from a Target Device Prerequis...

Page 147: ...o connect the target device 2 Connect the target device to the KVL using an appropriate key load cable See 1 4 4 1 Connecting the KVL to a Radio or Another Target Device page 1 13 Step result A tone is played and a list of available options appears Figure 5 10 Configure a Radio Screen Removing All Keys and Groups 6871018P37 F January 2013 5 11 ...

Page 148: ... Disconnect the target device and connect another target device to remove keys and key groups from or tap Done on the consecutive screens to return to the KVL main screen 5 2 Viewing Keys in Target Devices Prerequisites There are encryption keys in the target device Procedure Steps 1 Select Configure a radio on the KVL main screen Step result You are prompted to connect the target device 5 12 6871...

Page 149: ...nfigure a Radio Screen Viewing Keys 3 Select CKR keys Step result The list of all available CKR keys appears The list is read only Three sort methods are allowed By the CKR ID default By the Key ID By the Key type Switch between sort methods by tapping the Sort button It cycles through the sort methods from 1 to 3 then back to 1 4 When you have finished viewing the keys tap Done on the consecutive...

Page 150: ......

Page 151: ...e source and target KVL See 2 1 3 Turning Sharing On Off page 2 3 The target KVL must be on its main screen Sharing cannot be performed between a KVL in ASN mode and a KVL in ASTRO 25 mode To change the mode of operation see 2 2 1 KVL 4000 Switching Between the Modes of Operation page 2 11 Only key data and key groups are shared KVL configuration settings the UKEK for each algorithm and log record...

Page 152: ...he list fits completely on the screen the smart bar is disabled 2 Connect the target KVL using the KVL to KVL cable See 1 4 4 2 Connecting Two KVL Units page 1 16 For the sharing operation to work the target KVL must have the sharing function turned on and must be on its main screen 3 Select the key you want to share by dragging the slider from left to right The KVL displays an animation indicatin...

Page 153: ...ys in both KVLs must match for the sharing to be successful Procedure Steps 1 On the KVL main screen select Load keys groups Load keys groups Step result The list of available keys appears Figure 6 2 Load Keys Groups Screen Sharing a Group Example 2 Select the Groups tab You can use the smart bar on the right side of the screen to scroll through the list or quickly jump within the list to a select...

Page 154: ... the number of keys in the group Only the defined keys in a group are shared with the target KVL 5 Select another group to share or disconnect the KVLs and tap Done on the consecutive screens to return to the KVL main screen 6 3 Sharing All Keys and All Groups Prerequisites In order to share all keys the target KVL must support the same algorithms as the source KVL assuming that there is at least ...

Page 155: ...ad Now Step result A progress animation appears indicating that the keys and groups are being shared When the operation has completed successfully a confirmation screen appears and a completed tone is played Because key groups may contain undefined keys CKRs with no KID or key data the number of keys shared may differ from the number of keys in the key group Only the defined keys in a key group ar...

Page 156: ......

Page 157: ...gement see 4 1 Loading a Selected Key page 4 1 The KMF then transfers encryption keys to target devices via OTAR Download encryption keys from the KMF into the KVL Two methods are available for transferring encryption keys when OTAR cannot be performed such as for radios that do not support OTAR radios that are out of range or radios that have not yet been initialized The download from the KMF to ...

Page 158: ...quired enter the Main and Backup KMF dial up phone numbers for modem connections See 7 1 3 Entering Main and Backup KMF Phone Numbers page 7 4 7 If required enter the Main and Backup KMF port for the Network connection See 7 1 4 Entering Main and Backup KMF Ports page 7 6 8 If required enter the Main and Backup KMF IP address for the Network connection See 7 1 5 Entering Main and Backup KMF IP Add...

Page 159: ...cates the progress If you enter an incorrect digit a bad bonk tone is played When you have entered a valid string of digits a check mark appears next to it To delete a digit you have entered tap the Del key or hold it to delete all entered digits To abort the operation tap Cancel 4 Tap Done Step result The UKEK for the selected algorithm has been entered 5 Repeat step 2 through step 4 for each alg...

Page 160: ...s The KVL supports dial up phone numbers for the Main and Backup KMF Prerequisites Only an Administrator can enter KMF phone numbers When and where to use Use these steps to enter the Main and Backup KMF phone numbers You might have to experiment with your particular calling card service to determine the number of pauses needed and in which locations in the phone number string they must be placed ...

Page 161: ...in screen select Settings KMF Phone s Step result The phone keypad appears Figure 7 1 Phone s Screen The screen appears with the tab for the currently selected KMF open 2 Select the tab for the KMF you want to enter the phone number for 6871018P37 F January 2013 7 5 ...

Page 162: ...to split the string in 3 3 4 chunks To delete a digit you have entered tap the Del key or hold it to delete all entered digits To abort the operation tap Cancel 4 When you have entered a valid phone number tap Done Step result The phone number is changed 5 Tap Done on the consecutive screens to return to the KVL main screen 7 1 4 Entering Main and Backup KMF Ports For the KVL to connect with the K...

Page 163: ...ct the Backup tab and enter the port number for the Backup KMF 4 Tap Done Step result The KMF ports are set 5 Tap Done on the consecutive screens to return to the KVL main screen 7 1 5 Entering Main and Backup KMF IP Addresses For the KVL to connect with the KMF through the Network you need to configure the KMF IP address on the KVL Prerequisites Only an Administrator can enter Main and Backup KMF...

Page 164: ...one Step result The IP addresses are set 5 Tap Done on the consecutive screens to return to the KVL main screen 7 1 6 Entering the KMF RSI The KMF requires a Radio Set Identifier RSI in order to operate in the OTAR system The KVL only accepts keys and KMMs from the KMF with this RSI Prerequisites Only an Administrator can enter the KMF RSI When and where to use Use these steps to enter the KMF RSI...

Page 165: ...delete a digit you have entered tap the Del key or hold it to delete all entered digits To abort the operation tap Cancel 3 When you have entered the RSI tap Done on the consecutive screens to return to the KVL main screen 7 1 7 Entering the MNP for OTAR The Message Number Period MNP is a feature used in an ASTRO 25 system that provides additional security in the over the air rekeying of subscribe...

Page 166: ... info field If you have entered a 5 digit value the keypad becomes disabled To delete a digit you have entered tap the Del key or hold it to delete all entered digits To abort the operation tap Cancel 3 When you have entered the MNP tap Done on the consecutive screens to return to the KVL main screen 7 1 8 Entering the KVL RSI for OTAR The KVL requires a Radio Set Identifier RSI in order to operat...

Page 167: ... have entered the RSI tap Done on the consecutive screens to return to the KVL main screen 7 2 Using the Store and Forward Feature The Store and Forward feature supported only in the ASTRO 25 mode of operation offers a simple and secure method of transferring keys and other messages from the KMF to target devices through the KVL The UKEK must be present in the KVL and target devices in order to su...

Page 168: ...t tap Done to return to the KVL main screen 7 2 2 Downloading Keys from KMF to KVL Using Modem Connection You can use a modem connection to download keys from a KMF to a KVL The following modem procedures are available 7 2 2 1 Downloading Keys from KMF to KVL Using USB Modem Connection page 7 12 7 2 2 2 Downloading Keys from KMF to KVL Using Serial Modem Connection page 7 13 7 2 2 1 Downloading Ke...

Page 169: ...to KMF Through modem USB Step result The following takes place 1 The connection between KVL and KMF is established 2 KVL sends status reports of radios to KMF 3 KVL receives keys and jobs for radios from KMF 3 When all the information has been sent tap Done to return to the KVL main screen 7 2 2 2 Downloading Keys from KMF to KVL Using Serial Modem Connection Prerequisites The KVL must have a UKEK...

Page 170: ... tap Done to return to the KVL main screen 7 2 3 Downloading Keys from KMF to KVL Using Network Connection You can download encryption keys stored in the KMF to the KVL using a Network connection Prerequisites Ensure that The KVL has a UKEK assigned for the algorithm type of the keys being downloaded and the UKEK matches the UKEK defined for this KVL in the KMF You have entered the KMF port and IP...

Page 171: ...rward Connect to KMF Through network Step result The connection between the KVL and KMF is established The KVL sends status reports of radios to the KMF and then receives keys and jobs for radios from the KMF 5 When all the information has been sent tap Done to return to the KVL main screen 6 If you established the KVL to KMF Ethernet connection using the VPN client provided by Motorola terminate ...

Page 172: ...L using an appropriate key load cable see 1 4 4 1 Connecting the KVL to a Radio or Another Target Device page 1 13 and tap the item for this device on the list If there are no updates for the device it is indicated on the screen and the attention tone is played Step result A progress animation appears indicating that the device is being updated When the update is completed it is indicated on the s...

Page 173: ...n the list starting with this letter If the list fits completely on the screen the smart bar is disabled 2 To clear the list of received jobs continue to 7 2 6 Clearing the List of Received Jobs page 7 17 7 2 6 Clearing the List of Received Jobs Prerequisites The KVL received keys and jobs for radios from the KMF Only an Administrator can clear the list of received jobs When and where to use Use t...

Page 174: ...p the Undo button 3 Tap Accept Step result The list of received jobs has been cleared 4 Tap Cancel to return to the KVL main screen 7 3 Performing a Keyset Changeover on a Target Device You can use the KVL to perform a keyset changeover such as switching from Keyset 1 to Keyset 2 on a target device Prerequisites Ensure you have an appropriate key load cable an adaptor if required 7 18 6871018P37 F...

Page 175: ...nd a progress animation appears while the keyset is being changed Otherwise the keyset is changed instantly the completed tone is played and the list item for the new keyset receives a check mark 5 Disconnect the target device and tap Done on the consecutive screens to return to the KVL main screen 7 4 Managing OTAR Configuration Parameters in Target Devices The following parameters are required b...

Page 176: ...Device page 1 13 Step result A connected tone is played and a list of available options appears 3 Select MNP Step result The MNP list item appears with the currently selected value presented If the value is being actively updated the list item says updating instead of presenting the value 4 To change the target device s MNP continue to 7 4 3 Changing the Target s MNP page 7 21 7 4 2 Viewing the Ta...

Page 177: ...her Target Device page 1 13 Step result A connected tone is played and a list of available options appears 3 Select RSIs Step result A list of RSI values appears If a value is being actively updated the list item says updating instead of presenting the value The Group RSI list item is read only 4 To change the target device s RSI or KMF RSI continue to 7 4 4 Changing the Target s RSI and KMF RSI p...

Page 178: ... the keypad becomes disabled To delete a digit you have entered tap the Del key or hold it to delete all entered digits To abort the operation and return to the previous screen tap Cancel 4 When you have entered the MNP tap Done Step result The MNP is changed and you return to the previous screen When the MNP is updated in the target device the completed tone is played 5 Disconnect the target devi...

Page 179: ...s 9999999 As you enter the digits they appear in the info field If you have entered a 7 digit value the keypad becomes disabled To delete a digit you have entered tap the Del key or hold it to delete all entered digits To abort the operation and return to the previous screen tap Cancel 4 When you have entered the correct value tap Done Step result The value is changed and you return to the previou...

Page 180: ......

Page 181: ...ontrol Head operations See 8 2 Setting Up KVL for Remote Control Head Operations page 8 1 2 Provision a radio for Remote Control Head key loading See 8 3 Provisioning a Radio for Remote Control Head Key Loading page 8 5 3 Connect the KVL to the Remote Control Head See 8 4 Connecting the KVL to the Mobile Radio s Remote Control Head page 8 6 4 Initiate one of the operations For details see the appr...

Page 182: ...L and the radio through the Remote Control Head 2 Entry a 5 digit Message Number Period See 8 2 2 Entering the MNP for Remote Control Head Operations page 8 3 The MNP provides additional rekeying security for remote key loading 3 Enter a 7 digit KVL Radio Set Identifier KVL RSI number See 8 2 3 Entering the KVL RSI for Remote Control Head Operations page 8 4 8 2 1 Entering the SEK and KEK In order...

Page 183: ... entered 6 Tap Done 7 If you want to set up the SEK and KEK for another algorithm perform step 2 through step 6 for this algorithm Otherwise tap Done on the consecutive screens to return to the KVL main screen 8 2 2 Entering the MNP for Remote Control Head Operations The Message Number Period MNP is used in an ASTRO 25 system to provide additional security in the remote rekeying of subscriber unit...

Page 184: ...d a 5 digit value the keypad becomes disabled To delete a digit you have entered tap the Del key or hold it to delete all entered digits To abort the operation tap Cancel 3 When you have entered the MNP tap Done If you have entered an incorrect value the Done button is disabled 4 Tap Done on the consecutive screens to return to the KVL main screen 8 2 3 Entering the KVL RSI for Remote Control Head...

Page 185: ...he consecutive screens to return to the KVL main screen 8 3 Provisioning a Radio for Remote Control Head Key Loading In order to be able to perform operations through a Remote Control Head provision a radio with keys for the available algorithms Prerequisites Ensure you have an appropriate key load cable an adaptor if required Procedure Steps 1 Select Configure a radio on the KVL main screen Step ...

Page 186: ...h the statuses for each of the algorithms The possible statuses are Provisioning successful when the process is completed successfully Provisioning failed when the process is completed but failed Keys not defined when there are no keys defined for the particular algorithm 5 Disconnect the radio 6 If you want to provision another radio tap Done to return to the list of options and repeat step 2 thr...

Page 187: ...ake the data cable HKN6183 and the DB9 Gender Changer provided with the KVL 2 Connect the KVL to the mobile radio s Remote Control Head through the DB9 RS 232 Port and the DB9 Gender Changer Figure 8 1 KVL Connected to a Mobile Radio s Remote Control Head 6871018P37 F January 2013 8 7 ...

Page 188: ......

Page 189: ...em must be equipped with the Tactical Rekey OTAR feature The radio serving as an RF modem may also be a member of any one of the managed Tactical OTAR groups 9 1 Equipment Needed For Tactical OTAR You need the following equipment for Tactical OTAR Data cable see Table B 5 Interface Cables DB9 Gender Changer Radio equipped with the Tactical Rekey OTAR feature Figure 9 1 Tactical OTAR Equipment Exam...

Page 190: ...he Tactical OTAR group see 9 9 Updating a Tactical OTAR Group page 9 8 Step result The members can now talk securely 9 3 Creating a New Tactical OTAR Group Prerequisites Only an Administrator can create a Tactical OTAR group When and where to use Use these steps to create a Tactical OTAR group You can create up to 10 Tactical OTAR groups Procedure Steps 1 On the KVL main screen select Tactical OTA...

Page 191: ...or enter a new key by tapping the button For details on how to enter encryption keys see 3 1 Entering Encryption Keys page 3 1 When entering a new key remember that Algorithm and Key Type have already been predefined 9 Select KEK to define the Key Encryption Key for the group Step result The list of KEKs appears 10 You can either select a key from the list or enter a new key by tapping the button ...

Page 192: ...n to scroll through the list or quickly jump within the list to a selected area If the list fits completely on the screen the smart bar is disabled 2 Select the group you want to delete Step result Details for the group appear 3 Tap Delete Step result A confirmation screen appears 4 Tap Accept to confirm To restore the group tap Undo Step result The group has been deleted 5 Tap Done on the consecu...

Page 193: ... Select the group you want to view members for Step result The details for the group appear 3 Select Members Step result A list of available members appears 4 When finished tap Done on the consecutive screens to return to the KVL main screen 9 6 Adding a Member to a Tactical OTAR Group Before a radio can be a part of a Tactical OTAR group it must first be added to that Tactical OTAR group Prerequi...

Page 194: ...tep result The details for the group appear 3 Select Members Step result A list of available members appears 4 Tap the button Step result You are prompted to connect a radio 5 Connect the radio See 1 4 4 1 Connecting the KVL to a Radio or Another Target Device page 1 13 Step result The target radio has been added as a member and a completed tone is played 6 Disconnect the radio and connect a new r...

Page 195: ...on the screen the smart bar is disabled 2 Select the group you want to remove a member from Step result The details for the group appear 3 Select Members Step result A list of available members appears 4 Drag the slider from right to left to remove a member from the group Step result The member has been removed 5 Remove another member or tap Done on the consecutive screens to return to the KVL mai...

Page 196: ... appear 3 Select TEK Step result The list of TEKs appears 4 You can either select a key from the list or enter a new key by tapping the button For details on how to enter encryption keys see 3 1 Entering Encryption Keys page 3 1 When entering a new key remember that Algorithm and Key Type have already been predefined Step result The TEK has been modified Upon the next update request for the Tactic...

Page 197: ...e to be updated or select Full update if you want all members to be updated Step result You are prompted to connect the radio 5 Connect the radio See 1 4 4 1 Connecting the KVL to a Radio or Another Target Device page 1 13 Step result A progress animation appears indicating that the group is being updated When the process is complete a screen with all Success and Failed members appears The followi...

Page 198: ......

Page 199: ...0 1 Organization of Log Records The log records are stored chronologically in a 100 location continuous buffer with the most recent log record displayed first each time you access the log records Each new log record created is appended to the beginning of the buffer with each existing log record moving down one position When the buffer is full 100 entries maximum the next new log record is appende...

Page 200: ...ations Log Example You can scroll through the list or quickly jump to a selected area using the smart bar on the right side of the screen 2 When you have finished viewing log records tap Done on the consecutive screens to return to the KVL main screen 10 3 Clearing Log Records Prerequisites Only an Administrator can clear log records Procedure Steps 10 2 6871018P37 F January 2013 ...

Page 201: ...10 3 Clearing Log Records 1 On the KVL main screen select Settings Operations log Step result The list of log records appears Figure 10 2 Operations Log Clear Example 6871018P37 F January 2013 10 3 ...

Page 202: ...the logs for the current mode of operation ASN ASTRO 25 or Radio Authentication are cleared Step result The log records have been cleared 4 Tap Done to return to the KVL main screen 10 4 Exporting Log Records to a PC You can connect the KVL to a COM port on a PC typically a laptop and export log records to the PC You can then print log records from the PC or save them on the PC as a file 10 4 6871...

Page 203: ...ications program 2 Launch a communications program on the PC such as Microsoft HyperTerminal or equivalent Set up the program as follows No parity 8 bits 1 stop bit Translate line feeds LF to Carriage Return and Line Feed CR LF 80 character width 3 On the KVL main screen select Settings Operations log Print Print Now Step result A progress animation appears indicating that the log records are bein...

Page 204: ......

Page 205: ...ory to ASTRO 25 memory within the KVL you save the effort of recreating the key in the ASTRO 25 memory and reentering the encryption key data You may also convert keys from the ASTRO 25 memory and load them into the ASN memory 11 2 Key Converting Restrictions and Guidelines Observe the following restrictions and guidelines when converting keys Only keys with AES 256 DES OFB DES XL DVP XL and DVI X...

Page 206: ...ffic keys Figure 11 1 Manage Keys Screen Converting ASN Key Example To see the list of available Shadow keys select the Shadow tab You can use the smart bar on the right side of the screen to scroll through the list or quickly jump within the list to a selected area If the list fits completely on the screen the smart bar is disabled 11 2 6871018P37 F January 2013 ...

Page 207: ...etails for the ASTRO 25 key 4 From the list of available algorithms select the algorithm for the key Step result A screen with the decimal keypad appears prompting you to enter the CKR ID for the key 5 Enter the CKR ID using the decimal keypad If you are converting a Traffic key the valid CKR range is 1 4095 If you are converting a Shadow key the valid CKR range is 61440 65535 6 Tap Convert Step r...

Page 208: ...nly an Administrator can convert keys Procedure Steps 1 Select Manage keys on the KVL main screen Step result A list of available keys appears Figure 11 3 Manage Keys Screen Converting ASTRO 25 Key Example You can use the smart bar on the right side of the screen to scroll through the list or quickly jump within the list to a selected area If the list fits completely on the screen the smart bar is...

Page 209: ...m conversion Otherwise a screen with the decimal keypad appears prompting you to enter the Physical ID for the key 4 Enter the PID for the key using the decimal keypad The valid PID range is 0 511 5 Tap Convert Step result A screen appears informing that the conversion has completed successfully 6 Tap OK 7 If you want to convert another key perform step 2 through step 6 for this key Otherwise tap ...

Page 210: ......

Page 211: ...match Displayed for a single algorithm mismatch 1 During key loading the KVL does not have the same algorithm as the target device 2 During sharing the KVLs do not have the same algorithm 1 Use the KVL that has the same algorithm as the target device 2 Purchase an appropriate algorithm and add it to the KVL or target device X algorithm mismatches Displayed for more than one algorithm mismatch 1 Du...

Page 212: ...ue Error Duplicate Name found The name you have entered for the key already exists Enter another name Error Duplicate CKR ID found A key with this CKR already exists in the KVL database Enter another CKR value 12 1 2 KVL Operational Errors This section lists all operational errors along with their probable causes and remedies For most of the operational errors the cause is a faulty cable connectio...

Page 213: ...he keys that the KVL is trying to send Error Load All could not be performed Algorithm mismatch Displayed for a single algorithm mismatch during a share operation when the source KVL is trying to send a key to the destination KVL that has an algorithm that the destination KVL does not support Do not attempt to share keys with an algorithm that is not supported by the destination KVL Error Load All...

Page 214: ...nection and retry the operation Check radio s algorithm Displayed as a key subtitle An algorithm issue occurred Check the connection to the target device and make sure that the target device supports the algorithm of the key being loaded Not supported by radio Displayed as a key subtitle An algorithm is not supported Check the connection to the target device and make sure that the target device su...

Page 215: ...he action is completed you are logged out of the KVL application and the Welcome screen appears Figure 12 1 KVL System Reset Slider Subsequent States 12 3 Unlocking the Operator Account Prerequisites Only an Administrator can unlock the Operator account Procedure Steps 1 Select Settings Security Unlock operator account Yes unlock now Step result The Operator account is unlocked 2 Tap Done on the c...

Page 216: ...Disaster Recovery Table 12 3 KVL 4000 Disaster Recovery Event Remedy Hardware failure Replace the device and reenter all the lost data Refer to this manual to configure your KVL with all the necessary parameters SUGGESTION Keep non sensitive data in a secure location so that you can restore it quickly when needed KVL application failure Reinstall the KVL application See Running the KVL Software In...

Page 217: ...se Use these steps to disassemble the Security Adapter Figure 12 2 Security Adapter Exploded View Make sure to exit the KVL application on the PDA before disconnecting the Security Adapter Otherwise you may lose any unsaved work or cause data corruption Procedure Steps 6871018P37 F January 2013 12 7 ...

Page 218: ...r Guide 1 Remove the self tapping screws and then remove the back housing Figure 12 3 Removing Back Housing 2 Remove the dust covers from the tongue features on the front housing Figure 12 4 Removing Dust Covers 12 8 6871018P37 F January 2013 ...

Page 219: ...tor from the flex to the PCB and remove the PCB assembly from the front housing Figure 12 5 Removing PCB Assembly 4 Remove the USB clip from the USB connector and the foam pad from the DB 9 connector on the PCB assembly Figure 12 6 Removing USB Clip and Foam Pad 12 8 Assembling the Security Adapter Procedure Steps 6871018P37 F January 2013 12 9 ...

Page 220: ... the USB clip to the USB connector on the PCB Figure 12 7 Assembling USB Clip 2 Attach the foam pad on top of the DB 9 connector Ensure that the foam pad is aligned to the middle of the DB 9 face Figure 12 8 Assembling Foam Pad 12 10 6871018P37 F January 2013 ...

Page 221: ...the O ring tabs are slotted to the back housing features Orient the O ring so that its tabs size matches the back housing features size Figure 12 9 Assembling O Ring 4 Connect the 30 pins board to board connector from the flex to the PCB Figure 12 10 Assembling Front Housing PCB 6871018P37 F January 2013 12 11 ...

Page 222: ...tors through the front housing connector holes Figure 12 11 Assembling Front Housing Connectors 6 Place the PCB assembly to the front housing Ensure the PCB sits properly on screw bosses Figure 12 12 Assembling Front Housing PCB Placed 12 12 6871018P37 F January 2013 ...

Page 223: ...ue features on the front housing Figure 12 13 Assembling Dust Covers 8 Press down the back housing to the front housing vertically Before closing the back housing verify that the USB clip is assembled correctly Figure 12 14 Assembling Back Housing to Front Housing 6871018P37 F January 2013 12 13 ...

Page 224: ...ing torque 7 lbf in Figure 12 15 Tightening Back Housing 10 Press the dust covers until they are flush with the front housing Figure 12 16 Pressing Dust Covers Result The assembly is complete 12 9 Contacting Motorola This section contains information about calling Motorola for help 12 14 6871018P37 F January 2013 ...

Page 225: ...ystem Support Center for information about returning faulty equipment or ordering replacement parts Motorola Radio Support Center Phone 800 247 2346 Fax 800 318 0281 The Motorola Radio Support Center repairs mobile and portable radios and related RF equipment 12 9 2 North America Parts Organization The North America Parts Organization is your source for manuals replacement parts and assemblies Tab...

Page 226: ......

Page 227: ... 6 kbps Secure ASTRO VSELP Vocoder Supported Encryption Protocols 9 6 kbps Secure APCO Project 25 IMBE Vocoder 1 024 Total Traffic and Shadow Keys ASN Encryption Keys Traffic Encryption Keys TEK and Key Encryption Keys KEK ASTRO 25 FIPS 46 3 FIPS 140 2 Standards FIPS 197 Table A 3 Supported Algorithms Algorithm ASN ASTRO 25 KMF ASTRO 25 Only Radio Authentication DES DES XL DES OFB DVI XL DVP XL AE...

Page 228: ...s by selecting the DES option ADP does not support the following features related to OTAR Store Forward KEK Key loading Tactical OTAR Remote Control Head Key loading Table A 4 Electromagnetic Compatibility EN 55022 Class A EN 55024 FCC Part 15 Class A Table A 5 Regulatory Compliance and Approvals EN 60950 1 UL 60950 1 Safety cUL 60950 1 A 2 6871018P37 F January 2013 ...

Page 229: ...S Battery 2400 mAH 1 BTRY MC55EAB00 MC55 Quick Start Guide 1 72 127603 02 MC55 Regulatory Guide 1 72 108860 02 Table B 3 Security Adapter Super Tanapa Item Count Part Number Front Housing Assembly see Table B 4 Front Housing Assembly Orderable Parts 1 01009328004 PCB Assembly Kit 1 NNTN7650 Back Housing 1 15009431001 Main O ring 1 32009316001 Self tapping screw Dia 3 x 18 mm 4 03009288001 USB Cove...

Page 230: ...6500 XTL 5000 2500 ASTRO Spectra n a NKN1027 XTS 4000 n a RKN4106 XTS 5000 3000 2500 n a OTAR Radio Authentication Cable WPLN6905 APX 7000 6000 4000 n a KVL To KVL Cable TKN8209 KVL 3000 3000 Plus 4000 n a USB Programming Cable 25 108022 02R PDA to PC n a MINI B to Type A USB Cable 25 68596 01R USB to Ethernet Adapter n a CKN6324 Serial Modem n a Other TKN8210 Service Monitor n a Table B 6 Optiona...

Page 231: ...ble Parts Table B 6 Optional Accessories cont d Item Part Number MultiMobile USB Modem V 92 56K DSMT9234MUCDCXR CradlePoint Technology USB to Ethernet Adapter PS6U1UPE 3600mAH Battery BTRY MC55EAB02 6871018P37 F January 2013 B 3 ...

Page 232: ......

Page 233: ...io communications Operation of this equipment in a residential area is likely to cause harmful interference in which case the user is required to correct the interference at his own expense C 2 Radio Frequency Interference Requirements Canada This Class A digital apparatus complies with Canadian ICES 003 Cet appareil numrique de la classe A est conforme la norme NMB 003 du Canada C 3 Radio Frequen...

Page 234: ......

Page 235: ...al Range Extension DVP Digital Voice Protection DVP XL Digital Voice Protection Range Extension FIPS Federal Information Processing Standard I O Input Output KID Key ID KEK Key Encryption Key KMF Key Management Facility KMM Key Management Message SEK Signaling Encryption Key KVL Key Variable Loader LED Light Emitting Diode LID Logical ID MDC Motorola Data Communications MGEG Motorola Gold Elite Ga...

Page 236: ...4000 Key Variable Loader ASTRO 25 User Guide Table D 1 Acronyms cont d Item Description USK Unique Shadow Key VPN Virtual Private Network WACN Wide Area Communications Network D 2 6871018P37 F January 2013 ...

Reviews: