User's Manual
Table Of Contents
- OPERATING INSTRUCTIONS
- 1.1 Controls and Display
- 1.2 Transceiver Basic Operation
- 1.3 About Commands
- SECTION 2
- 2.1 Channel Operating Parameters
- 2.2 Editing Channel Operating Parameters
- 2.3 Scan and Multi-Mode Operation
- 2.4 Controlling User Access
- 2.5 Encrypted Operation
- 3.1 Operator Level 1 Commands
- 3.1.1 Select the Operating Memory for the Main Channel
- 3.1.2 Increase Display Brightness
- 3.1.3 Edit Channel Operating Mode
- 3.1.4 Scroll Backwards through Available Memories
- 3.1.5 Start/Stop Scan
- 3.1.6 Scroll Forewards through Available Memories
- 3.1.7 Edit Channel Operating Frequency
- 3.1.8 Decrease Display Brightness
- 3.1.9 Edit Channel Squelch Mode
- 3.1.10 Command Level Up
- 3.1.11 Toggle memory: current/home
- 3.1.12 Toggle Talk Around
- 3.1.13 Erase Encryption Keys
- 3.2 Operator Level 2 Commands
- 3.2.1 Create/Edit All Channel Information
- L2-1.1. Entering a Memory Number (refer to L1-1 for details)
- L2-1.2. Enter a Scan List & Enabling/Disabling Scan (refer to L2-5 for details)
- L2-1.3. Enter a Text Description (refer to L2-6 for details)
- L2-1.4. Enter an Operating Mode (refer to L1-3 for details)
- L2-1.5. Enter a Frequency (refer to L1-7 for details)
- L2-1.6. Enter the Squelch Parameters (refer to L1-9 for details)
- 3.2.2 Copy Guard to Main
- 3.2.3 Lock Keypad
- 3.2.4 L2-4 not used.
- 3.2.5 Edit Scan List & Enable/Disable Scan
- 3.2.6 Edit Memory Text Description
- 3.2.7 Create Shadow Memory
- 3.2.8 Copy Main to Guard
- 3.2.9 Encryption ON/OFF
- 3.2.10 Command Level Up
- 3.2.11 Command Level Down
- 3.2.12 L2–#. Not Used.
- 3.2.1 Create/Edit All Channel Information
- 3.3 Operator Level 3 Commands
- 3.3.1 Select Boot Channel
- 3.3.2 Assign Key by KeyTag
- 3.3.3 Set Numeric Edit Mode: Decimal or Hexadecimal
- 3.3.4 Display Firmware Release and Version Information
- 3.3.5 Edit Scan Parameters
- 3.3.6 Configure PTT Timer
- 3.3.7 Side Tone Audio Level Adjust
- 3.3.8 PC Data Upload/Download
- 3.3.9 Display Channel Squelch Parameters
- 3.3.10 Command Level Up
- 3.3.11 Command Level Down
- 3.3.12 Unused
- 3.4 Maintenance Commands (Level 4)
- 3.4.1 Set Default Record
- 3.4.2 Set Restricted Level Access Mode
- 3.4.3 Set Command Permissions
- 3.4.4 Set Memory Edit
- 3.4.5 L4-5. not used
- 3.4.6 L4-6. not used
- 3.4.7 Set Frequency Display
- 3.4.8 Assign KeyTags to Encryption Keys
- 3.4.9 Set Squelch Restrictions
- 3.4.10 Command Level Up
- 3.4.11 Command Level Down
- 3.4.12 L4-# not used
- 3.5 Supervisor Commands (Level 5)
- 4.1 Appendix A. Installing the Jumper for Restricted Level Access.
- 4.2 Appendix B. CTCSS Tone and DCS Code Tables
- 4.3 Appendix C. Programming Channel data using TDP and a PC.
- 4.4 Appendix C. 2.5 kHz & 6.25 kHz Valid Frequencies
- 4.5 Appendix D. Default Tables
TDFM-136B Operating Instructions 08RE399
2.5 Encrypted Operation
The TDFM-136 supports encrypted operation using both DES OFB and AES encryption
keys for P25 communications. The sequence to use encryption is as follows:
1. Load keys using a KVL keyloader.
2. Assign a KeyTag (name) to a key, defined by its SLN.
3. Assign a key, via the KeyTag to a memory.
4. Enable or disable use of encryption in radio operation.
2.5.1 Loading Encryption Keys
In order to use the encryption feature on the transceiver, you must have encryption keys loaded
into the unit. The keys must be loaded into the unit using a KVL-3000+ keyloader. Of course the
keys must have been created in the KVL first. Operating instructions for the KVL are beyond the
scope of this document, see manufacturer documentation.
Note: The keyloader (KVL) must be connected to the transceiver with the correct cable: ensure
you only use a cable designed for use with the TDFM-136B.
Once you have a KVL with the correct keys loaded, follow this procedure to load and use them in
the transceiver:
1. Connect the KVL to the TDFM-136 via the correct cable.
2. Load the keys following the KVL procedure. The keys will load to the Main or Guard
module as determined by the front panel switches.
3. Once you have loaded one module, you must load the same keys in the same order into
the other module. This is because the Guard operation is split across the two hardware
modules.
2.5.2 Assign KeyTag to Encryption Keys
Once the keys have been loaded, you need to assign a name (referred to here as a KeyTag) to the
key so that they can be manipulated later. Initially, the key will be identified by it's SLN (sometimes
called CKR).
Command L4-8 allows you to set the KeyTag for any of the keys loaded into the radio following this
sequence:
1. Select the key, by SLN, to assign a KeyTag to.
2. Enter the KeyTag
3. Repeat for other SLN's if desired.
Select Key by SLN. The first screen, shown below, allows you to step through the available
keys (by SLN), and shows the encryption algorithm for that key.
Figure 2- 25 . The screen to select the SLN to assign the KeyTag to.
Technisonic Industries Ltd. 23
+ F+-,!>?$%&'
+-,/6-/+