3-52 Customer Programming Software (CPS)
6866537D87-F Chapter 3 - MTM800 Product Information Manual September 2008
15.6 DMO SCK OTAR
Indicates whether DMO SCK Keys can be delivered to the MS by OTAR.
Turn the check box on (Enable) or off (Disable) by clicking in the check box.
WARNING: The DMO SCK OTAR feature flag shall only be enabled on the MS in one of the following 2 conditions: - The
current System supports SCK OTAR (e.g. SR6.1) and the MS belongs to a CMG
- The current System does not support SCK OTAR (e.g. SR5.2), the current System operates with TMO SCKs 31 and 32
only, DMO SCK is not being used, and the customer plans to upgrade his System to an SCK OTAR System and add the
MS to a CMG.
Enabling the DMO SCK OTAR feature for an MS operating on a System not supporting DMO SCK OTAR will result in the
deletion of SCKs provisioned by KVL except SCKs 31 and 32. Therefore, unless the System only uses SCKs 31 and 32
for TMO operations in Security Class 2, the MS will not be able to operate in TMO Security Class 2 on such a System
and DMO SCK will not operate because the DMO SCKs would have been deleted. To recover from such a configuration
mistake, the DMO SCK OTAR flag needs to be disabled and SCKs need to be reloaded via KVL.
15.7 DCK Air If Encryption
This field contains the Class of MS and the all MS information elements to indicate the infrastructure
the characteristics of the MS terminal support.
15.8 GCK Air If Encryption and OTAR
Indicates if MS shall support GCK AIE and OTAR feature.
Turn the check box on (Enable) or off (Disable) by clicking in the check box.
15.9 Non Secured Call Indication
Specifies whether or not the Non Secured Call Indication feature is enabled in the phone. When
enabled, this feature warns the user about unencrypted incoming calls.
Turn the check box on (Enable) or off (Disable) by clicking in the check box.
15.10 Temporary Enable/Disable Policy
This feature is used to accept or reject Temporary Enable / Disable commands sent by the
Switching and Management Infrastructure (SwMi) of the system when the command had not been
implicitly authenticated using AI (Air Interface) encryption.
The options are:
• No Security
• Encryption Required
• Authentication Required
• Mutual Authentication Required
• Encryption and Authentication Required
• Encryption and Mutual Authentication Required