Reference Manual
Table Of Contents
- Appendix A Hot key examples
- Example1: selecting a specific channel
- Example2: displaying an information screen
- Example3: displaying and/or changing a setting in the Control List
- Example4: changing a value to the next value in a list
- Example5: opening a list at the marker entry
- Example6: making a call using a specific entry in the Address List
- Example7: setting up one-touch discreet operation
- Appendix B Get Status calls
- Appendix C Forgotten passwords
- Appendix D Limiting user access
- Introduction
- Syntax for the Message10 entry
- Activating configuration commands in the Message10 entry
- Restricting access to the List Manager
- Restricting access to admin level
- Restricting access to call types
- Enabling the automatic removal of the incoming call pop-up
- Restricting access to holding CALL
- Restricting access to Voice Encryptor features
- Index
Limiting user access
340 2110 SSB Transceiver Reference Manual
Introduction
You can limit access by users to certain areas in the 2110 SSB Transceiver’s user
interface by entering special configuration commands in the Message 10 entry in the
Control List. These commands may prevent accidental changes to setup information, and
enable you to hide information on a ‘need to know’ basis.
You can:
• restrict access to the List Manager in total, or restrict access to certain functions
(category LM) (see page 341, Restricting access to the List Manager)
• restrict access to the admin level (category BAL) (see page 342, Restricting access
to admin level)
• restrict the call types that can be used to make a call unless they have already been
used in an address entry (category BCT) (see page 342, Restricting access to call
types)
• enable the automatic removal of an incoming call pop-up (category TIC) (see
page 343, Enabling the automatic removal of the incoming call pop-up)
• restrict access to holding CALL and hence preventing changes to calling
information (category HCD) (see page 343, Restricting access to holding CALL)
• restrict access to the secure PIN function with the Voice Encryptor feature (category
BSP) (see page 344, Restricting access to Voice Encryptor features)
• restrict access to the Secure Standby Mode (category SSD) (see page 344,
Restricting access to Voice Encryptor features)
Syntax for the Message 10 entry
The following rules apply to configuration commands used in the Message 10 entry in
the Control List:
• Commands must begin with the characters #$! followed by a space, for example,
#$! BSP. If you do not use these characters, the transceiver will read any characters
in the entry as a standard message.
• Category commands must be followed by a hyphen, then the specific commands
(see Table 48 and Table 49), separated by commas. Each category and
corresponding commands are separated by a space, for example:
LM-FV,UL BCT-M,GP
NOTE
These configuration commands operate at the user level. If you are logged
into admin level you will have full access to the above functions,
regardless of the setting in the Message 10 entry.