2-58 Services and Feature Description
6866537D87-F Chapter 2 - MTM800 Product Information Manual September 2008
In any error situation the red LED will be ON. You can leave the KVL mode by pressing the
power button.
The communication via the serial interface to the AIE KVL is as before.
Terminal Software Upgrade: (refer to Chapter 3 of the Product Information Manual,
Paragraph "Upgrade Phone")
• E2E Key Del (depending on UCM configuration)
Deleting E2E Traffic Keys
The traffic keys (all keys except the KEK) can be deleted from customer and engineering test
page. If customer test page is enabled then this option will be accessible from main test page.
If engineering test page is enabled this option will be accessible under Data Svc menu option.
After deleting the keys all groups will have encryption mode set to off and the encryption icon
will be cleared. For private numbers the icon will be still displayed (contacts list) since the
encryption mode for private numbers is taken from codeplug.
Deletion of all keys
The key deletion key sequence " **00## " includes deletion of all the UCM key sets (including
the KEK, GEK and SEK).
Displaying UCM Version Information
UCM version number can be accessed from Ver Info menu item. After selecting UCM version
option the UCM Version and Algorithm IDs will be listed. If the number of algorithms is more
than what can be displayed on the screen then the user can cycle through them by using the
navigation keys.
Displaying UCM Error Log Information
UCM Error Log option can be accessed from Err Logs menu item. After selecting UCM Error
Log option the UCM error logs will be listed. The user can cycle through the error logs by
using the navigation keys. Every log will have a number (Log[n] and a Log value). The user is
able to clear the logs by selecting the left soft key (Clear). If no logs are available a notice with
’List Empty’ string and the right soft key (Back) will be shown.
16.14.7 Key Information
This option allows displaying the security information for the following conditions.
• For Serving Cell:
• Security class of the serving cell, i.e. Security Class 1, Security Class 2,
Security Class 3, Security Class 3 with GCK
• For Group OTAR:
• CMG GTSI
• For SDMO and TM-SCK OTAR:
• SDMO SCK Subset Grouping Type
• Current SDMO SCK Subset Number and SCK-VN
• Current Fallback TMO SCK, i.e. SCKN and SCK-VN attributes