EasyManua.ls Logo

Motorola solutions KVL 4000 User Manual

Motorola solutions KVL 4000
136 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
ASTRO
®
25
INTEGRATED VOICE AND DATA
KVL 400
KEY VARIABLE LOADER
ADVANCED SECURENET
USER GUIDE
January 2013
*6871018P35*
6871018P35-F
© 2013 Motorola Solutions, Inc. All rights reserved

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Motorola solutions KVL 4000 and is the answer not in the manual?

Motorola solutions KVL 4000 Specifications

General IconGeneral
TypeKey Variable Loader
Dimensions6.5 x 4.5 x 1.5 inches
Operating Temperature-22°F to +140°F (-30°C to +60°C)
CompatibilityMotorola ASTRO 25 and P25 radios
Battery LifeUp to 12 hours
EncryptionAES
Channel Spacing12.5 kHz, 25 kHz
Power SupplyRechargeable lithium-ion battery

Summary

1 Introduction

1.2 Overview of the KVL 4000

Introduction to the KVL 4000, its functions, components, and capabilities for key transfer.

1.4 Getting Started

Covers initial setup procedures, including security settings, connecting components, charging, and launching the application.

1.4.6 Launching the KVL Application

Steps to power on the device and start the Key Variable Loader application.

2 KVL 4000 – Performing Initial Programming

2.1.4 Managing Passwords

Overview of KVL security levels (Administrator, Operator) and password management functions.

2.1.4.1 Setting Up Passwords on the KVL

Steps to define and set up both Operator and Administrator passwords for the KVL.

2.2 KVL 4000 System-Dependent Parameters

Configuring system-specific parameters based on the operating mode (ASN, ASTRO 25, Radio Authentication).

3 Managing Encryption Keys

3.1 Entering Encryption Keys Manually

Step-by-step guide to manually inputting Traffic or Shadow keys into the KVL's internal database.

3.4 Editing Keys

Instructions for modifying existing Traffic and Shadow encryption keys stored in the KVL memory.

3.5 Deleting Keys

Procedure for administrators to erase Traffic or Shadow encryption keys from specific slots in the KVL memory.

4 Loading Keys into Target Devices

4.1 Loading Traffic Keys

Step-by-step guide for transferring Traffic Keys from the KVL to a target device.

4.2 Loading Shadow Keys

Instructions for loading Shadow Keys to Common Shadow Key (CSK) or Unique Shadow Key (USK) slots.

5 Managing Keys in Target Devices

5.1 Removing Keys from Target Devices

Instructions on how to erase encryption keys (Traffic or Shadow) from a target device using the KVL.

6 Sharing Keys Between KVLs

6.1 Sharing a Single Key

Process for a source KVL to share a selected key with another KVL.

7 Managing Log Records

7.3 Clearing Log Records

Procedure for an Administrator to erase log records from the KVL memory.

8 Converting Encryption Keys

8.3 Converting a Key from ASN to ASTRO 25

Step-by-step process to convert an ASN key to an ASTRO 25 key, requiring CKR ID input.

9 Troubleshooting

9.1 Error Messages

Categorization of error messages into User Entry and Operational errors with their causes and remedies.

9.2 Performing a System Reset

Procedure to reset the KVL to factory defaults, erasing all data and settings.

Appendix A: KVL 4000 – Performance Specifications

Appendix B: KVL 4000 – Orderable Parts

Appendix C: Radio Frequency Interference Requirements

C.1 Radio Frequency Interference Requirements – USA

Compliance information for FCC rules regarding radio frequency interference for Class A digital devices.

C.2 Radio Frequency Interference Requirements – Canada

Compliance information for Canadian ICES-003 standards for Class A digital apparatus.

C.3 Radio Frequency Interference Requirements – European Union – EMC Directive 2004/108/EC

Compliance information for EMC Class A products under the EU EMC Directive.

Appendix D: Acronyms