User's Guide
Table Of Contents
- Contents
- List of Figures
- List of Tables
- Declaration of Conformity
- Safety Information
- Notice to Users (FCC and Industry Canada)
- Copyrights
- General Information
- Getting Started
- 2.1 Product Technical Information
- 2.2 Before Power On
- 2.3 Controls and Indicators
- 2.4 Powering On the Radio
- 2.5 Writing Text
- 2.6 PIN Code Authentication
- 2.7 Locking or Unlocking the Keys or Buttons
- 2.8 Display
- 2.9 Status Icons
- 2.10 During a Call
- 2.11 Entering TMO or DMO Mode
- 2.12 Selecting Talkgroups
- 2.13 Using Timed Talkgroup Change
- 2.14 One-Touch Buttons
- Modes
- 3.1 Trunked Mode Operation
- 3.2 Local Site Trunking
- 3.3 Direct Mode Operation
- 3.3.1 Entering DMO Mode
- 3.3.2 Making Group Calls in DMO
- 3.3.3 Receiving Group Calls in Idle
- 3.3.4 Selecting DMO Communications Options
- 3.3.5 Private Call With Presence Check
- 3.3.6 DMO Private Priority Call
- 3.3.7 Talkgroup for Individual Calls
- 3.3.8 Network Monitor
- 3.3.9 Communication through Repeaters
- 3.3.10 Communication through Gateways
- 3.3.11 Gateway and Repeater Synchronization
- 3.4 Transmit Inhibit Mode
- 3.5 Emergency Operations
- 3.5.1 Emergency Alarm
- 3.5.2 Emergency Group Call
- 3.5.3 Non-Tactical Emergency
- 3.5.4 Emergency Individual Calls (Private or MSISDN)
- 3.5.5 Emergency SDS Status
- 3.5.6 Emergency Hot Microphone
- 3.5.7 Alternating Hot Microphone
- 3.5.8 Silent Emergency Mode
- 3.5.9 Invisible Emergency
- 3.5.10 Emergency Alert
- 3.5.11 Emergency Mode by Dialing
- 3.5.12 Disaster Alert
- 3.5.13 Emergency Destination in Local Site Trunking
- 3.5.14 Exiting Emergency Operations
- 3.6 Repeater Mode
- 3.7 Gateway Mode
- Main Menu
- 4.1 Scrolling through the Menu
- 4.2 Menu Icons
- 4.3 Messages
- 4.4 Contacts
- 4.5 Browser
- 4.6 Security
- 4.7 Setup
- 4.8 Group Setup
- 4.9 Individual Setup
- 4.10 Favorites
- 4.11 My Info
- 4.12 Recent Calls
- 4.13 Shortcuts
- 4.14 Radio User Identity (RUI)
- 4.15 Networks
- 4.16 Location
- 4.17 Packet Data
- Features
- 5.1 Ambience Listening (AL) Call
- 5.2 Buffer Full Overwrite Policy
- 5.3 Call-Out
- 5.4 DTMF Overdial
- 5.5 Dual Control Head
- 5.6 Global Navigation Satellite System (GNSS) Location Service
- 5.7 Home Display Text Message
- 5.8 Horn and Lights Alarm
- 5.9 Individual Call
- 5.10 Multi Radio Control
- 5.11 OEM Control Head
- 5.12 One-Touch Dial
- 5.13 Radio Messaging System (RMS)
- 5.14 Radio User Assignment (RUA) and Radio User Identity (RUI)
- 5.15 Shadow Groups (Address Bundle)
- 5.16 Short Number Dial
- 5.17 Talkgroup Dialing by Index
- 5.18 Terminal Permanent Disable
- 5.19 Terminal Temporary Disable or Enable
- 5.20 Wireless Application Protocol (WAP)
- 5.20.1 WAP Browser
- 5.20.2 Entering the Browser
- 5.20.3 Entering Browser Menu Panes
- 5.20.4 Tips for Browsing
- 5.20.5 Disabled Packet Data Service
- 5.20.6 Disabled Browser Entry
- 5.20.7 Browser Keys Usage
- 5.20.8 Browser Menu Panes Overview
- 5.20.9 Navigate Pane
- 5.20.10 Advanced...
- 5.20.11 Bookmarks Pane
- 5.20.12 History Pane
- 5.20.13 Tools Pane
- 5.20.14 Options Pane
- 5.20.15 Text Input Pane
- 5.20.16 WAP Push
- Appendix A: Tones
- Appendix B: LED Indications
- Appendix C: Troubleshooting
- Appendix D: Audio Routing and PTT Hook Interactions
IMPORTANT: The key deletion takes up to 30 seconds.
Encryption and/or Authentication keys are deleted. The radio enters Temporary Disable state and the
service provider must manually restore it.
4.6.4
K Validity
Key (K) is a secret key the infrastructure uses to authenticate the radio in the system. It is part of the
authentication that provides service confidentiality between your radio and the system.
4.6.4.1
Verifying K Validity
Procedure:
1 From the home screen, press the Menu key.
2 Select Security → K Validity.
3 Your radio displays:
• K is Valid – the infrastructure can authenticate your radio.
• K is Invalid – the infrastructure is unable to authenticate your radio. Please call your
service provider to restore the key to your radio.
4.6.5
SCK (Air Interface Encryption Class 2)
Static Cipher Key (SCK) is a secret key used for the Air Interface Encryption Class 2. It may be used to
encrypt calls and data in TMO and DMO. The SCK air interface encryption provides service
confidentiality between radios and infrastructure when in TMO, and between radios when in DMO. A
radio is capable of being loaded with up to 32 SCKs. Specific keys are used for encrypting the air
interface.
Any mismatch between radios and/or infrastructure impacts communication – only those using the
same key as the transmitting party are able to decode and hear the communication.
4.6.5.1
TMO SCK
Your service provider can enable SCKs in TMO. The SCKs used in TMO are called TMSCKs.
4.6.5.1.1
Verifying TMSCK Validity
When and where to use: To ensure that the TMSCKs in the radio are valid and can be used for the
air interface encryption.
Procedure:
1 From the home screen, press the Menu key.
2 Select Security → TMSCK Validity.
3 The radio displays:
• TMSCK is Valid
– the radio can work encrypted in TMO.
68015000180-MG
Chapter
4: Main Menu
87










