EasyManua.ls Logo

Harris P7300 SERIES - Clearing Emergencies and Understanding Encryption

Default Icon
94 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
MM-013994-001, Rev. J
50
9.28.4 Clearing an Emergency Call or Alert
Check with your system administrator to ensure that your radio is configured with the
ability to clear an emergency.
1. To clear an emergency, press and hold Option 2 button . While holding , press the emergency
button. Release both buttons when the “emergency cleared” tone sounds.
2. The radio returns to your default selected Talk Group. The EMERGENCY display is removed from the
main screen.
If the radio is in stealth mode, clearing the emergency will cause the radio to exit stealth
mode.
9.29 OPENSKY ENCRYPTION
In the OpenSky network, both data and voice use a 128-bit or 256-bit key encryption standard published
by the Federal Information Processing Service (FIPS), called Advanced Encryption Standard (AES).
AES is approved by the U.S. Department of Commerce for encryption of classified materials.
When encryption is enabled on the network, data is encrypted from the MDIS to the Mobile End System
(MES) (e.g., P7300 portable radio). This form of encryption provides airlink security.
Voice encryption is handled either automatically or manually. Automatic encryption is initiated through
the Unified Administration Server (UAS) for a specific Talk Group and requires nothing from the user.
Manual encryption is initiated by two or more radio users. Both methods of encryption are discussed in
the following sections.
When a user transmits encrypted voice, any listening users with different encryption keys
hear distorted voice and No Access appears in the radio display.
9.29.1 Automatic Encryption
For automatic encryption, a system administrator will select the Talk Group to be encrypted at the
interface to the UAS. Once the Talk Groups have been selected and identified as secure, credentials for
key generation are generated automatically by the system and provisioned to authorized users. This
process requires that authorized users log-in to the network and be authenticated. Encryption keys require
no manual handling and are never sent “in the clear” over any network interface or airlink.
If enabled via programming, a radio can automatically log-in
at voice registration and
enable voice encryption.
NOTE
NOTE
NOTE
NOTE

Table of Contents

Related product manuals