EasyManua.ls Logo

Motorola solutions KVL 4000 - Page 10

Motorola solutions KVL 4000
136 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
KVL4000KeyVariableLoaderAdvancedSECURENETUserGuide
4LoadingKeysintoTargetDevices.................................................................................................................4-1
4.1LoadingTrafcKeys.........................................................................................................................4-1
4.2LoadingShadowKeys.......................................................................................................................4-4
4.3LoadingaMacro..............................................................................................................................4-7
5ManagingKeysinTargetDevices.................................................................................................................5-1
5.1RemovingKeysfromTargetDevices....................................................................................................5-1
5.1.1RemovingTrafcKeysfromaTargetDevice................................................................................5-1
5.1.2RemovingShadowKeysfromaTargetDevice..............................................................................5-3
6SharingKeysBetweenKVLs.......................................................................................................................6-1
6.1SharingaSingleKey.........................................................................................................................6-1
6.2SharingaMacroandAssociatedKeys..................................................................................................6-3
6.3SharingAllKeysandAllMacros.........................................................................................................6-4
7ManagingLogRecords...............................................................................................................................7-1
7.1OrganizationofLogRecords..............................................................................................................7-1
7.2AccessingLogRecords......................................................................................................................7-1
7.3ClearingLogRecords........................................................................................................................7-2
7.4ExportingLogRecordstoaPC...........................................................................................................7-4
8ConvertingEncryptionKeys........................................................................................................................8-1
8.1WhentoConvertKeys.......................................................................................................................8-1
8.2KeyConvertingRestrictionsandGuidelines..........................................................................................8-1
8.3ConvertingaKeyfromASNtoASTRO25...........................................................................................8-1
8.4ConvertingaKeyfromASTRO25toASN...........................................................................................8-4
9Troubleshooting.........................................................................................................................................9-1
9.1ErrorMessages.................................................................................................................................9-1
9.1.1UserEntryErrors....................................................................................................................9-1
9.1.2OperationalErrors...................................................................................................................9-2
9.2PerformingaSystemReset.................................................................................................................9-4
9.3UnlockingtheOperatorAccount..........................................................................................................9-5
9.4SettingthePDAUSBMode................................................................................................................9-5
9.5KVL4000DisasterRecovery..............................................................................................................9-5
9.6TroubleshootingKVLApplicationand/orVPNSoftwareFailure...............................................................9-6
9.7DisassemblingtheSecurityAdapter.....................................................................................................9-6
9.8AssemblingtheSecurityAdapter.........................................................................................................9-8
9.9ContactingMotorola.......................................................................................................................9-13
9.9.1MotorolaSystemSupportCenterandRadioSupportCenter..........................................................9-14
9.9.2NorthAmericaPartsOrganization............................................................................................9-14
AppendixAKVL4000PerformanceSpecications.........................................................................................A-1
AppendixBKVL4000OrderableParts........................................................................................................B-1
AppendixCRadioFrequencyInterferenceRequirements....................................................................................C-1
C.1RadioFrequencyInterferenceRequirementsUSA...............................................................................C-1
C.2RadioFrequencyInterferenceRequirementsCanada...........................................................................C-1
C.3RadioFrequencyInterferenceRequirementsEuropeanUnionEMCDirective2004/108/EC.....................C-1
AppendixDAcronyms.................................................................................................................................D-1
viii

Table of Contents