Reference Manual
Table Of Contents
- Table of contents
- 1 About this manual
- 2 2110SSB Transceiver compliance
- 3 HF radio transmission
- 4 The 2110SSB Transceiver
- 5 Preparing the 2110SSB Transceiver for use
- 6 Operating the transceiver
- 7 Using lists
- 8 The Channel List
- 9 The Network List
- 10 The NETList
- 11 The Phone Link List
- 12 The Address List
- 13 Making and receiving calls
- 14 The Control List
- 15 The Keypad List
- 16 The Mode List
- 17 Using the transceiver in free tune and Amateur Mode
- 18 Hot keys
- 19 Operating the transceiver from a computer
- 20 Connectors
- 21 System messages
- 22 Accessories and hardware options
- 23 Specifications
- Index
- List of figures
- List of tables
- 1 About this manual
- 2 2110SSB Transceiver compliance
- 3 HF radio transmission
- 4 The 2110SSB Transceiver
- 5 Preparing the 2110SSB Transceiver for use
- Charging a battery
- Connecting a battery to the transceiver
- Inserting the transceiver into a backpack
- Selecting an appropriate antenna
- Troubleshooting the transceiver
- Testing the installation
- 6 Operating the transceiver
- Switching on the transceiver
- The front panel screen
- The channel screen
- Entering and editing text
- Quick Start
- Muting the transceiver
- Scanning channels
- Using the microphone
- Finding words and values
- Setting the basics
- Using hot keys
- Tuning the antenna
- Using the clarifier
- Reducing background noise with Easitalk
- Using the voice encryptor
- 7 Using lists
- The Main Menu
- Selecting a list
- The List Manager
- Setting a marker
- Setting the home screen
- Changing a setting in the Control List
- Making changes to all other lists
- Hiding and showing settings
- Grouping and ungrouping entries
- Restricting access to information
- Logging into admin level
- Displaying full and normal view
- Hiding and showing information
- Locking and unlocking information
- 8 The Channel List
- 9 The Network List
Table of contents
vi 2110 SSB Transceiver Reference Manual
telcall command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
ver command. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
Summary of command syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
CICS response messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
CICS error messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
20 Connectors
Front panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
Bottom panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306
Battery pack. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
21 System messages
22 Accessories and hardware options
23 Specifications
Accessories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Appendix A—Hot key examples
Appendix B—Get Status calls
Appendix C—Forgotten passwords
Appendix D—Limiting user access
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
Syntax for the Message 10 entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
Activating configuration commands in the Message 10 entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
Restricting access to the List Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
Restricting access to admin level. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
Restricting access to call types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
Enabling the automatic removal of the incoming call pop-up. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
Restricting access to holding CALL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
Restricting access to Voice Encryptor features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344
Index