Motorola KVL 4000 User Manual page 21

Astro 25 integrated voice and data
Table of Contents

Advertisement

List of Procedures
1.4.3 - Connecting the PDA and the Security Adapter ..........................................................................................................1-12
1.4.4.1 - Connecting the KVL to a Radio or Another Target Device.....................................................................................1-13
1.4.4.2 - Connecting Two KVL Units ....................................................................................................................................1-16
1.4.4.3.1 - Connecting the KVL to the KMF - Direct Connection........................................................................................1-16
1.4.4.3.2 - Connecting the KVL to the USB Modem for the KMF Communication.............................................................1-17
1.4.4.3.3 - Connecting the KVL to the Serial Modem for the KMF Communication ...........................................................1-18
1.4.4.3.4 - Connecting the KVL to the Network for the KMF Communication ....................................................................1-19
1.4.4.4 - Connecting the KVL to the CRYPTR micro ...........................................................................................................1-21
1.4.5 - Charging the KVL 4000..............................................................................................................................................1-21
1.4.6 - Launching the KVL Application ................................................................................................................................1-23
1.4.7 - Exiting the KVL Application......................................................................................................................................1-25
1.4.8.1 - Configuring VPN Settings - KVL Directly Connected to the Firewall ...................................................................1-27
2.1.1 - Setting the KVL Log Off Time.....................................................................................................................................2-1
2.1.2 - Setting the KVL Screen Color Scheme ........................................................................................................................2-1
2.1.3 - Turning Sharing On/Off................................................................................................................................................2-3
2.1.4.1.1 - Setting Up the Operator Password..........................................................................................................................2-4
2.1.4.1.2 - Setting Up the Administrator Password..................................................................................................................2-5
2.1.4.2.1 - Changing the Operator Password (Operator Access Level) ...................................................................................2-6
2.1.4.2.2 - Changing the Operator Password (Administrator Access Level) ...........................................................................2-7
2.1.4.2.3 - Changing the Administrator Password ...................................................................................................................2-8
2.1.4.3 - Clearing KVL Passwords.........................................................................................................................................2-10
2.1.4.4 - Selecting the Password Masking Mode ...................................................................................................................2-11
2.2.1 - KVL 4000 - Switching Between the Modes of Operation .........................................................................................2-11
2.2.2 - Setting the Baud Rate for RS-232 Communication....................................................................................................2-12
2.2.3 - Changing the FIPS Mode............................................................................................................................................2-13
2.2.4.1 - Entering the User-Defined System Key ...................................................................................................................2-15
2.2.4.2 - Changing the User-Defined System Key .................................................................................................................2-15
2.2.4.3 - Setting Up the KVL to Use the Default System Key...............................................................................................2-16
3.1.1 - Entering Encryption Keys Manually ............................................................................................................................3-1
3.1.2 - Auto-Generating Encryption Keys ...............................................................................................................................3-3
3.2.1 - Creating a Group...........................................................................................................................................................3-5
3.2.2.1 - Viewing Keys in a Group...........................................................................................................................................3-8
xix

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents