EasyManua.ls Logo

L-3 Communications STE-R - User Manual

Default Icon
312 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Loading...
Prepared by:
L-3 Communications
Communication Systems – East
One Federal Street
Camden, NJ 08103-1013
SECURE TERMINAL EQUIPMENT (STE)
USER’S MANUAL
Release 2.6
Rev A January 2008
THE INFORMATION CONTAINED HEREIN IS SUBJECT TO THE U.S. EXPORT CONTROL LAWS
AND MAY NOT BE EXPORTED, RELEASED, OR DISCLOSED TO FOREIGN PERSONS INSIDE OR
OUTSIDE THE U.S. WITHOUT OBTAINING PROPER APPROVALS.
Control Number: K00011722

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the L-3 Communications STE-R and is the answer not in the manual?

Summary

Chapter 1 INTRODUCTION

1-5. SAFETY INSTRUCTIONS

Essential safety guidelines to follow when using the STE terminal to reduce risks.

Chapter 2 INSTALLATION

Chapter 3 CONTROLS, INDICATORS AND INTERFACES

3-1.1 Crypto Card Slot

Details on inserting and handling the PCMCIA Crypto Card for secure communications.

Chapter 4 TPA FUNCTIONS

4-1.1 TPA

Describes the responsibilities of the TPA, including security and programming.

4-2. FORTEZZA PLUS KRYPTON ENHANCED CRYPTOCARD

Information on the types and functionality of FORTEZZA PLUS KRYPTON™ ENHANCED CRYPTOCARDs.

4-2.2 TPA Card

Details the role and usage of the TPA Card for controlling security features.

4-3. TRANSFER TPA PRIVILEGES

Procedure for transferring TPA privileges to a replacement crypto card.

4-3.1 Install TPA Password

Steps to install a TPA password for privilege transfer.

4-5. TERMINAL PRIVILEGES, ASSOCIATION, AND SOFTWARE UPDATE MANAGEMENT - TPA Settings

TPA-exclusive settings for terminal privileges, associations, and software updates.

4-5.1 Terminal Configuration Control

Control settings for Initial Secure Mode, TPA Password, Remote Control, and Card Privileges.

Chapter 5 USER FUNCTIONS

Chapter 6 CRYPTO CARD MANAGEMENT

6-2. REKEY FUNCTIONS

Procedures for updating rekey phone numbers and performing rekey operations for STU-III and SDNS keys.

6-2.1 Update Rekey Phone Number;Perform Rekey

Guides on updating phone numbers and initiating rekey operations for crypto cards.

6-2.2 Perform Rekey

Steps to perform a Rekey operation on the User Card for STU-III and SDNS crypto keys.

6-4. ZEROIZE KEY

Procedure to remove specific keys from the STE or Crypto Card, if privileges are enabled.

6-5. REMOVE TERMINAL;CARD ASSOCIATION

Steps to remove User Card associations from the STE if card privileges are enabled.

6-7. ZEROIZE TERMINAL

Resets the STE to factory default settings, removing user associations and TPA.

Chapter 7 CALLS

Chapter 8 REMOTE CONTROL OPERATIONS

8-3. Feature Settings for Remote Control

Settings for Remote Control, Terminal Control, Auto-Answer, and Data Port.

8-3.1 Remote Control

TPA must enable Remote Control and Remote Authentication or Secure Data ACL.

8-3.3 Auto_Answer

Enabling automatic handling of incoming secure data and voice calls when unattended.

8-4.1 Remote Authentication

Capability for DTE to authenticate far-end key material and make access control decisions.

Chapter 9 8510 CAPABILITIES

9-5. 5 ESS SECURE CALLING

Procedures for placing and receiving secure voice and data calls on 5ESS.

9-5.1 Secure Voice Calls on 5 ESS

How to place and receive secure voice calls on 5ESS using STE-8510.

9-5.1.1 Placing Secure Voice Calls on 5 ESS with STE-8510

Methods for establishing auto-secure or non-secure to secure voice calls on 5ESS.

9-6. DEFINITY SECURE CALLING

Procedures for placing and receiving secure calls on DEFINITY with STE-8510.

9-6.1 Placing Secure Voice Calls on DEFINITY With STE-8510

Methods for establishing secure voice calls on DEFINITY using STE-8510.

9-7. SETTING UP STE-8510

Instructions for configuring the STE to work as an 8510-type terminal.

9-7.1 Setting the STE 8510 Switch Type

How to set the STE 8510 switch type for ISDN configuration.

9-7.1.1 Single 8510 Switch Type Selection

Steps to set the ISDN switch type to STE-8510 mode.

Chapter 10 EXTERNAL UTILITIES

10-2.3 Software Download Tool

Information on the Software Download Tool for updating STE and Crypto Card software.

Chapter 11 USER MAINTENANCE

11-3. SELF TEST AND SOFTWARE VERIFICATION

How to initiate terminal self-test and software verification.

11-5. TERMINAL FAILURE INDICATIONS

Lists possible terminal failures and their associated STE displays.

L-3 Communications STE-R Specifications

General IconGeneral
TypeSecure Telephone
ManufacturerL-3 Communications
CompatibilityCompatible with secure communication networks
Key FeaturesSecure voice communication, user-friendly interface
Security Featuressecure voice communication

Related product manuals