Selecting Clear Transmissions; Managing Encryption; Loading Encryption Keys; Multikey Feature - Motorola APX 8000 User Manual

Hide thumbs Also See for APX 8000:
Table of Contents

Advertisement

MN001422A01-AW
Chapter 7 : Advanced Features
7.14.2

Selecting Clear Transmissions

Procedure:
Turn the preprogrammed Secure/Clear switch to the clear position.
If the selected channel is preprogrammed for secure-only operation, when you press the PTT
button, you hear an invalid mode tone and the display shows SEC TX.
The radio does not transmit until you set the Secure/ Clear switch to the secure position.
You can request to configure the radio to ignore the clear voice or insecured transmission
when the radio is in secured transmission. Check with your agent for details.
If the "Ignore Secure/Clear Switch when Strapped" programming option is enabled, the radio
transmits without displaying any messages in the strapped mode of operation, regardless of
the Secure/Clear switch setting. This option must be preprogrammed by a qualified radio
technician.
The Secure/Clear switch only applies when the radio is transmitting.
7.14.3

Managing Encryption

This chapter explains the encryption feature on your radio.
7.14.3.1

Loading Encryption Keys

Prerequisites:
Refer to the Key Variable Loader (KVL) manual for equipment connections and setup.
Procedure:
1 Attach the KVL to your radio.
The display shows KEYLOAD and all other radio functions, except for power down, backlight, and
volume, are locked out.
NOTE:
If the Multi-system Over-the-Air Rekeying feature is in use, the ASTRO profile name is
displayed below KEYLOAD.
2 Select the required keys and press Load on the KVL.
The KVL indicates that keyload is successful.
7.14.3.2

Multikey Feature

This feature allows your radio to be equipped with different encryption keys and supports the DES-OFB
algorithm.
There are two types of encryption keys:
Conventional Multikey
The encryption keys are strapped on a one-per-channel basis, through Customer Programming
Software (CPS). In addition, you can have operator-selectable keys, operator-selectable keysets,
and operator-selectable key erasure. If talkgroups are enabled in conventional, then the encryption
keys are strapped to the talkgroups.
56

Advertisement

Table of Contents
loading

Table of Contents