User's Manual

ENVOY™ TRANSCEIVER REFERENCE MANUAL 1
1
Introduction
This manual provides an overview of the Envoy™ Transceiver, how to install it in
mobile and fixed stations, how to operate the transceiver, and how to perform
advanced setup procedures. This manual is for system administrators who set up and
maintain HF communication networks.
There may be a list of related links at the end of a section of text, if required. There is
an index at the end of this manual as an aid to finding specific information.
This manual contains:
Using the wizard—describes the steps required to set up your transceiver in a basic
configuration using the wizard
The Envoy™ Transceiver—provides an overview of the components that make up the
transceiver system
Navigating the menu structure—describes the menu structure in the user interface of
the control point and how to navigate it, basic and advanced views, user and admin
levels, how to enter text, and how to select entries and values
Structure of information—describes the building blocks of information in the
transceiver
Operating the transceiver—provides an overview of the channel screen and describes
typical user-level functions such as selecting a channel and making a call
Channels—describes the entries for a channel and how to add a channel
Scan tables—describes the entries for a scan table and how to add a scan table
HF networks—describes the entries for an HF network and how to add an HF network
Contacts—describes the call information that you can set up for a contact and an
emergency contact
Phone links—describes the entries for a phone link and how to add a phone link
NETs—describes the entries for a NET and how to add a NET
Messages—describes how to edit a message
Peripherals—describes how to select a peripheral on a connector, and the settings that
you can change to suit your requirements
Settings—describes the contents of the Control Point, Configuration, Connectors,
Scan, Calling, GPS, Audio, Security, and Connectivity submenus
Access rights—provides an overview of access rights that may be set via TPS, and
how this affects access to entries in the user interface of the control point