PRC UG
PRC UG
The Motorola products described in this instruction manual may include copyrighted Motorola computer
programmes. Laws in the United States and other countries preserve for Motorola certain exclusive rights for
copyrighted computer programmes. Including the exclusive right to copy or reproduce in any form the copyrighted
computer programme. Accordingly, any copyrighted Motorola computer programmes contained in the Motorola
products described in this Instruction manual may not be copied or reproduced in any manner without the express
written permission of Motorola. Furthermore, the purchase of Motorola products shall not be deemed to grant
either directly or by implication, estoppel or otherwise, any license under the copyrights, patents or patent
applications of Motorola, except for the normal nonexclusive, royalty free license to use that arises by operation of
law in the sale of a product.
Copyrights
No part of this manual may be reproduced, transmitted, stored in a retrieval system, or translated into any
language or computer language, in any form or by any means, without the prior written permission of Motorola Inc.
Disclaimer
Please note that certain features, facilities and capabilities described in this document may not be applicable to or
licensed for use on a particular system, or may be dependent upon the characteristics of a particular mobile
subscriber unit or configuration of certain system parameters. Please refer to your Motorola contact for further
information.
Trademarks
Motorola, the Motorola Logo and all other trademarks identified as such herein are trademarks of Motorola Inc. All
other product or service names are the property of their respective owners.
Your Input
...is much appreciated. If you have any comments, corrections, suggestions or ideas for this publication or any
other requirements regarding Motorola publications, please send an e-mail to doc.emea@motorola.com.
The following major changes have been implemented in this manual since the previous edition:
CTable of Contents
1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
KVLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-22
KVL Port Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-23
Miscellaneous . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-24
Add KVL. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-25
Modify KVL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-26
Assign UKEK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-27
A Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-1
I Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Index-1
FList of Figures
TList of Tables
Table 4-36 List of Modify KVL Fields and Their Descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-26
Table 4-37 List of Modify KVL Action Buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-26
Table 4-38 The KVL UKEK Assignment Field and its Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-27
Table 4-39 List of KVL UKEK Assignment Action Buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-27
Table 4-40 List of User Management Fields and Their Descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-28
Table 4-41 List of User Management Action Buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-30
Table 4-42 List of Add User Fields and Their Descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-31
Table 4-43 List of Add User Action Buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-32
Table 4-44 List of Database Backup Fields and Their Descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-33
Table 4-45 List of Database Backup Action Buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-34
Table 4-46 List of Encryption Devices Fields and Their Descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-35
Table 4-47 List of Encryption Devices Action Buttons. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-35
PList of Procedures
1Overview
This booklet describes the Provisioning Centre (PrC) application. The purpose of this booklet is
to provide you with the knowledge necessary to successfully use this application.
Intended Audience
This booklet is intended for those involved with provisioning activities in a Dimetra IP system.
In order to make the best possible use of the information contained in this booklet you should be
familiar with:
• The Microsoft® Windows 2000 environment
• The operating principles of a Dimetra IP system
• The operation of the PrC workstation's R/W CD ROM Software.
This booklet makes use of acronyms to refer to the components of the provisioning process. The
most frequently used acronyms are explained in Table 1-1.
For an explanation of more acronyms and other terms used in this booklet, please refer to
Appendix A, “Glossary.”.
PrC Architecture
The basic PrC architecture is comprised of the following components:
• PrC Client
• PrC Server
• Key Variable Loader (KVL)
• Encryption Card
This architecture can be extended to include a Secure Authority (SecA) and/or an Authentication
Centre (AuC). In the context of the PrC application a SecA is an organisation that can generate
the keys used by the Dimetra IP system for the encryption of data. The AuC is an application used
for the distribution and storage of encryption keys used in the Dimetra IP’s Switch Management
Infrastructure (SwMI). Figure 1-1 is an illustration of this PrC architecture.
PrC Client
The PrC client is a Java™ based application. A user accesses the PrC application using the PrC
client. The PrC client can be configured differently for individual users of the application. The
configuration is applied when a user logs onto the application. This allows administrators to
manage the application’s users: providing them with access to different configurations of the
applications functionality.
PrC Server
The PrC server provides the services that enable the PrC application and which are accessed using
the PrC client. These services include:
• Transaction and security management
• Database access and management
• Client/server communications
• Logging and auditing services
• External entity services (connection to Encryption Card (CryptoCard) and KVL)
The PrC server operates on a Windows 2000 PC.
In Figure 1-2 three different methods for generating keys are illustrated:
• 1. K + SCK: K and SCK keys can be generated by a SecA and then imported into the PrC for
distribution to the system’s MSs.
• 2. K+SCK: K and SCK keys can be manually entered using the PrC client’s interface.
• 3. K: K keys can be automatically generated by an Encryption Card.
All of these methods can be used separately or in combination to generate keys.
The PrC client interface provides quick access to the main functions of the application. Functions
are accessed using clickable tabs, drop down menus and icons.
For detailed information on the interface, see:
• “PrC Client Main Window” on page 2-2
• “Menu Bar” on page 2-2
• “Status Bar” on page 2-3
• “Shortcut Bar” on page 2-4
• “Work Pane” on page 2-5
• “Events Pane” on page 2-5
Menu Bar
The Menu Bar provides menu driven access to the PrC client’s functions. To access a menu:
• Using the mouse: click on the menu title.
• Using the keyboard: press ALT + the underlined letter, for example, to access the File menu
press ALT + F together.
Menus
The commands that can be accessed through the menus on the Menu Bar are described in Table
2-1.
Status Bar
The Status Bar uses a combination of icons and text to indicate the status of the PrC server and
client. In addition, the Status Bar displays icons, which are used to indicate when new important
information is available. The elements of the Status Bar are illustrated in Figure 2-3.
Icons
The icons used in the Status Bar are described in the table below
Icon Description
Shortcut Bar
The Shortcut Bar provides a quick way of accessing a selection of the PrC client’s work areas.
Clicking a shortcut icon opens the related work area.
Icons
Work Pane
The Work Pane is a container within which the four different work areas are displayed. These are
the areas of the PrC client’s interface where you carry out tasks. Work areas are selected by
clicking the appropriate Work Area Tab at the top of the Work Pane, clicking a shortcut icon, or,
in some cases, using menu items. After starting the PrC client, Mobile Stations is the default
work area.
The Work Pane and Work Area Tabs are illustrated in Figure 2-4.
Events Pane
The Events Pane is a container which displays Events and Audit Trail information. The content
type is selected by clicking one of the Content Selection Tabs at the top of the Events Pane. See
Figure 2-5
3PrC Procedures
This section contains a number of procedures, which describe in a step-by-step way how to carry
out a range of tasks using the PrC client application.
1 Either locate the PrC client’s icon on your desktop and double-click it, or find
Provisioning Centre in the Motorola directory of the Windows, Start Programs
menu and click it.
Result: The Provisioning Center Login dialogue box (see Figure 3-1) will appear.
When you log into the client for the first time after installation you will have to use the following
default values:
After logging in using default values, you should add a new user to the database. In order to begin
the normal operation of the PrC application, this user must be given user management permission.
You should then exit the application and log in again using these new user values. After you have
logged in as this new user, the default log in values will no longer be valid.
In certain situations when you log into the client you will see a Password Expired message, see
Figure 3-2. For more information on changing your password, see “Changing a User Account
Password” on page 3-4.
1 Locate the PrC client’s login dialogue box on your monitor. See Figure 3-1.
1.1 Click inside the User Name text box.
1.2 Enter your user name, then click in the password text box and enter your
password.
1.3 Click OK.
Result: The main client window appears (see Figure 3-3).
Password Requirements
Passwords used in the PrC application have to meet the following requirements:
• Passwords must be minimum 6 characters and maximum 20 characters long.
• Passwords must be alphanumeric: a combination of letters and numbers with at least one of
each being used.
• Passwords must be unique for a user: duplicate passwords are not allowed in the application.
Procedure 3-3 explains how to change a user account password.
Only users that have user management permission are able to carry out this task. If you do not
have user management permission the User Management work area will not be displayed on the
PrC client you access.
3 Check the Change Password box on the User Management work area.
Result: The Change Password fields will change from greyed out to white. This
indicates that they can now be used to enter data. See Figure 3-5.
4 4.1 Type the new password that you have chosen into the New Password text
box. See “Password Requirements” on page 3-4 for a description of the
requirements passwords have to meet.
4.2 Re-type the new password into the Confirm New Password text box.
Only users that have user management permission are able to carry out these tasks. If you do not
have user management permission the User Management work area will not be displayed on the
PrC client you access.
Duplicate login names are not allowed. The new user must have a login name that is not already
in the PrC database.
Procedure 3-5 explains how to add a new user to the PrC database.
3 Enter the new user’s details into the text boxes. Check the appropriate Permissions
boxes to determine the permissions that the new user will have.
Modifying Users
It is possible to modify an existing user’s details. This allows users to be given a new Full Name
and or new permissions.
Procedure 3-6 explains how to modify a user’s details.
Deleting Users
To remove users from the system, it is possible to delete them from the PrC database.
It is not possible for users to delete themselves from the PrC database. This has to be done by
another user with user management permission.
Procedure 3-7 explains how to delete a user from the PrC database.
2 Click Yes.
Result: The PrC client will shut down.
This procedure is based on loading the master key for the first time.
Store a backup of this master key separately in a secure location. You will
need this backup if the loaded key is erased from the encryption device
or cannot be accessed for any other reason. If this happens, then without
the backup the existing PrC database will be unusable and will have to be
regenerated.
When reloading a master key you must ensure that it is the same key that you loaded previously.
If the master key loaded is not the same, then the text in the Master Key and Status fields of the
Encryption Devices dialogue box (see Figure 3-9) will change to Invalid and Failed, respectively.
If this happens you should reload the correct master key from the KVL.
2 If the server is operational and you want to put it out of service, select Go Out of
Service.
If the server is out of service and you want to put it in service, select Go
Operational.
Result: The PrC status icon on the Status Bar changes to the appropriate colour and
status text. See Figure 3-14 and Figure 3-15.
3 Type in the appropriate details for the MS that you want to add. To assign the MS
to a group, select one from the Mobile Groups field. If no group is available you
will have to create one, see “Adding, Modifying and Deleting MS Groups” on
page 3-16.
4 Edit the appropriate details for the MS. To change the assignment of the MS to a
group, select a different group from the Mobile Groups field, or click the
Unassigned Group button to change the MS to Unassigned.
4 Click Yes.
Result: The MS is deleted from the PrC’s database.
2 Click MS Groups.
Result: The Mobile Station Group Management dialogue box will open. See
Figure 3-19.
3 To modify or delete an MS group, you first have to select it in the Mobile Groups
field.
3.1 To modify the selected MS group, edit Group
Name, then click Modify.
Result: The MS group name will be modified
3.2 To delete the selected MS group, click Delete.
Result: The group name will be deleted from the PrC’s database.
4 To add a new group, type the name of the group into the Group Name text box.
Click Add.
Result: The new MS group will be added to the PrC database and will be displayed
in the Mobile Groups field.
2 Configure the Mobile Station Search Form to the search criteria you want to
apply. For more details on the individual search fields, see “Mobile Station Search
Form” on page 4-6.
At least one of the Provisioning Status check boxes in each pair:
Unprovisioned/Fully Provisioned and SCK Not Current/SCK
Current has to be selected.
3 Click Search.
Result: If the search is successful, a number of MSs will be displayed in the
results of search area. See Figure 3-20.
An MS is defined as Unprovisioned when it has NOT been provisioned with BOTH a K and an
SCK key.
In the context of an MS Search, the Provisioning Date settings are only applied to MSs that
have Fully Provisioned status, that is, have been provisioned with both a K and an SCK key
(either Current or Not Current).
SCK Not
MS Provisioning Status K SCK Current
Current
Unprovisioned No No No
Table 3-2 shows a range of search settings that can be applied to the Mobile Station Search Form
to extract information about MSs based on their provisioning status.
These examples are not intended to cover all possible searches. They are based on the assumption
that no MSs in the database were provisioned before 09:00 AM, October 5, 2001.
Provisioning Date
Unprovi- Fully SCK SCK Not
To find...
sioned Provisioned Current Current
between and
Exporting K-Refs
K-Ref values stored in the PrC’s database can be exported to a file. Once exported to a file this
information can be transferred to the system’s Authentication Centre (AuC).
Procedure 3-16 explains how to export K-Refs from the PrC database.
2 Use the Mobile Station Search Form to carry out a search of the MSs in the
database. See “Using the MS Search Form” on page 3-17.
Result: If the search is successful, a number of MSs will be displayed in the
results of search area. See Figure 3-21.
4 Click Export.
Result: The K-Ref values for MSs in the search results that have a K-Ref are
exported to file. See Figure 3-23.
4 Click Import.
Result: The Import Keys Confirmation dialogue box appears. See Figure 3-25.
5 Click Continue.
Result: The Key File Scanning Status dialogue box appears. See Figure 3-26.
This dialogue box displays how many K and SCK-TMO keys the PrC has
detected in the file.
Adding a KVL
To be able to communicate with a KVL the PrC needs to be configured appropriately. This
configuration takes place initially when a KVL is added to the PrC’s database.
Procedure 3-18 explains how to add a KVL to the PrC’s database.
3 Result: Enter the new KVL’s details into the text boxes.
The KVL ID must not be the same as the PrC ID.
Deleting a KVL
If a KVL no longer needs to be contacted by the PrC it can be removed from the database.
Procedure 3-19 explains how to delete a KVL from the PrC’s database.
Modifying a KVL
If necessary the details for a KVL in the PrC’s database can be modified.
Procedure 3-20 explains how to modify a KVL in the PrC’s database.
4 Click Yes.
Result: The KVL will be denied access to the PrC. The KVL Information, Status
field will change to show Access denied.
Auto-Generating K Keys
The PrC can, via the encryption card, generate K keys for distribution to KVLs. This is an
alternative to importing K keys or entering them manually.
Procedure 3-24 explains how to configure the PrC to auto-generate K keys.
2 If it is not already displayed, select the K’s view by clicking K’s in the selection
menu.
Result: The K’s work area will be displayed. See Figure 3-32.
4 To allow Auto Generation, click the Auto Generate K box if it is not already
selected.
Result:
If...Amount of K available is more than 0 the Auto Generate K Information
dialogue box will appear. See Figure 3-34. Click Yes to remove the existing K
Keys, or No to retain them.
5 Click OK.
Result: The dialogue box closes. If no K keys exist, the number of keys set in
Amount of K to distribute per Session will be generated. The Amount of K
available number will change to display the number of keys that have been
generated.
2 If it is not already displayed, select the K’s view by clicking K’s in the selection
menu
Result: The K’s work area will be displayed. See Figure 3-35.
3 Type the K key values into the Enter 32 Hexadecimal Characters for K boxes, then
click Enter.
Result: The K key is entered to the PrC database. The Amount of K available
number will increase by 1.
2 If it is not already displayed, select the SCK-TMO (Static Cipher Key - Trunked
Mode Operation) view by clicking SCK- Trunked Mode Operation in the selection
menu.
Result: The SCK-TMO work area will be displayed. See Figure 3-36.
3 Click the SCK Number that you want to enter a key for.
Result: The SCK will be highlighted. See Figure 3-37.
5 Enter the Key (Hex) and Key Version values, then click OK.
Result: The SCK Key is stored in the PrC database. The SCK Version field will
display the Key Version entered.
Generating Reports
The information stored in the PrC’s database can be used to administer and track the status of
MSs. In addition, it is possible to compile and save to file reports based on the contents of the
database.
The MSs for which you would like to export information have to be displayed as the result of a
search. If the MSs that you need to export information for are not being displayed, then you will
need to carry out a search, before following this procedure. See “Using the MS Search Form” on
page 3-17.
1 Select the Mobile Stations work area in the PrC main client window.
Result: The Mobile Stations work area is displayed. For more information, see
“Mobile Stations Window” on page 4-6.
This task can only be carried out if you have user management or provisioning management
permission.
2 Define the search that you want to carry out using the fields in the Audit Search &
Purge Form display.
3 Click Search.
Result: If there are entries in the events database that match the search criteria used
they will be displayed. See Figure 3-41.
Events that have been removed are no longer displayed by the client. They have not been deleted.
When the client is restarted the 300 most recent events will be displayed.
Procedure 3-29 explains how to remove a single event or all events from the events display.
2 To remove a selection of events: select the events then click Remove. Individual
events are selected by clicking them. Multiple successive events can be selected by
clicking the first event and then, while holding down the Shift key, clicking the last
event in the selection. Multiple non-successive events can be selected by clicking
them while holding down the Ctrl key.
To remove all events, click Remove All.
Result: The events will be removed from the Events display.
This task can only be carried out if you have user management permission.
Purged data are placed in an XML file on the root path of the PrC application’s installation
directory. In the majority of cases this will be C:\. If, however, the PrC is installed on another
drive, then the purged XML files will be stored there instead.
Procedure 3-30 explains how to purge events from the audit trail.
2 Click Purge.
Result: The Purge Audit Trail dialogue box will appear. See Figure 3-44.
3 Select the number of months of data that you would like to RETAIN (these are the
events that will NOT be purged) using the Number of months of audit trail data
to keep selection box.
It is the data for the most recent months that is retained when you
select the months to be kept. For example, if you have 6 months of data
collected from January to June and select to retain 3 months of data,
then the retained data will be for April, May and June
Click Begin Purge.
Result: The audit trail data will be purged.
Database Administration
The data that you enter into the PrC application and that is entered by the KVLs connected to the
PrC are stored in a database. This database contains essential information about the provisioning
status of your system. To protect this data, it should be backed up regularly. For additional
information on database administration, see Administering Databases in Volume 3,
Configuration Management.
2 Fill in the Path: information: where you want the backup to be placed.
The path selected is on the PrC server not on the PrC client
workstation.
Files will be stored in a folder that is named automatically. The folder name will be:
YYYYMMDD_HHMMSS. Where:Y=Year, M = Month, D = Day, H=Hour,
M=Minute and S=Second.
This chapter provides a detailed description of the individual interface elements accessed from
the PrC client interface.
This chapter contains the following topics:
• “Events and Audit Trail” on page 4-2
• “Mobile Stations Window” on page 4-6
• “Key Database” on page 4-15
• “KVLs” on page 4-22
• “User Management” on page 4-28
• “Menu Bar Windows and Dialogue Boxes” on page 4-33
The Audit Trail tab will not be displayed if you do not have user management or provisioning
management permission.
Events
The PrC stores in its database information about important events related to the provisioning of
your system. As these events occur they are added to the database and displayed via the PrC client
in the events area. See Figure 4-1. The last 300 events that have occurred will be displayed. As
well as displaying events the area can be used to remove events from the display and to sort the
events that are being displayed.
Fields
The fields present in this display are described in the table below.
Field Description
Buttons
The buttons present in this display are described in the table below.
Click a column header to sort the display based on the content of that column. For example, click
the Description column header to sort events by description.
Button Action
Audit Trail
The audit trail uses the contents of the PrC’s database to track events and user actions. It provides
a search facility that allows you to find specific events and actions. A successful search displays
detailed information about these events and actions. See Figure 4-2.
Fields
The fields present in this display are described in the table below.
Table 4-3 List of Audit Trail Search Fields and Their Descriptions
Field Description
Date between...and Range of dates and times to search across. Use spin
boxes or manually enter the criteria for the search.
User User log in name to search for.
Table 4-3 List of Audit Trail Search Fields and Their Descriptions (Continued)
Field Description
Entity Type Type of entity to search for. Use drop-down list box
to select entity type.
Entity ID Entity ID to search for.
Key Type Key type to search for.
Key ID Key ID to search for.
Buttons
The buttons present in this display are described in the table below.
Button Action
Fields
The fields present in this display are described in the table below
Table 4-5 List of Audit Trail Display Fields and Their Descriptions
Field Description
Table 4-5 List of Audit Trail Display Fields and Their Descriptions (Continued)
Field Description
Encrypting Key Type Type of key used to encrypt keys for transport.
Encrypting Key ID ID of the key used for encryption.
Description Description of the event.
Click a column header to sort the display based on the content of that column. For example, click
the Description column header to sort events by description.
Table 4-6 List of Mobile Station Search Form Fields and Their Descriptions
Provisioning KVL ID n/a The ID of the KVL that last provisioned the MS.
If no value is entered into this field
it does not affect the search.
Provisioning Status Unprovisioned MSs for which either the K or the SCK Map, or
both, have not been provisioned.
At least
one Fully MSs for which both the K and the SCK Map have
check Provisioned been provisioned.
box has
to be selected for both SCK Not MSs provisioned with an SCK Map that is NOT
Unprovisioned/Fully Current the latest.
Provisioned and SCK SCK Current MSs provisioned with an SCK Map that IS the
Not Current/SCK latest.
Current.
Provisioning Date n/a Displays MSs that fall inside the values entered
for ‘between’ and ‘and’.
The affect of these fields on the
search results is dependent on the
‘Provisioning Status’ criteria
applied in the search. For example,
if both Unprovisioned and Fully
Provisioned are selected, then the
results of the search can contain
both Provisioned and
Unprovisioned MSs.
Button
Table 4-7 Description of the Mobile Station Search Form Action Button
Button Action
Results of Search
Displays the results of database searches. In addition, you can carry out tasks either specifically
based on a selection of the results displayed or which are general, that is they are not related to
the results of a search. The latter type of task does not require that any search results be displayed.
The information displayed can be rearranged by:
• Clicking the column headings to sort results based on the contents of a column.
• Clicking on and dragging the individual column headings to the left or right.
The fields present in this display are described in the table below.
Field Description
Action Buttons
Using the buttons at the top of the results display, you can carry out a number of actions. The
following is a description of each of these buttons.
Selecting MSs
To select an individual MS, click on it. To select more that one MS, click on the first MS and then
drag down to the final MS. Alternatively, (together with the mouse) use the Shift key to select
consecutive MSs and the Ctrl key to select non-consecutive MSs.
Buttons
The buttons present in this display are described in the table below.
Button Action
Fields
The fields present in this display are described in the table below.
Table 4-10 List of Add Mobile Station Fields and Their Descriptions
Field Description
Group Name This is the name assigned to the current MS. Group
names are selected from the Mobile Groups list.
Ref The Ref value for the MS to be added.
Alias The Alias for the MS to be added.
Status The result of the previous attempt to add an MS.
Buttons
The buttons present in this display are described in the table below
Button Action
Fields
The fields present in this display are described in the table below
Table 4-12 List of Edit Mobile Station Fields and Their Descriptions
Field Description
Buttons
The buttons present in this display are described in the table below.
Button Action
Field
Table 4-14 The Mobile Station Group Management Field and its Description
Field Description
Group Name Text field used to enter new Group Names and
display existing Group Names selected to be
modified or deleted.
The Group Name has to be a
minimum of 1 and a maximum of 40
characters. Duplicate Group Names
are not allowed.
Buttons
The buttons present in this display are described in the table below.
Button Action
Export K-Refs
From the results of a search, the K-Refs for all MSs that have one assigned to them can be
exported to a file. These files can be imported by the AuC application.
Fields
The fields present in this display are described in the table below.
Field Description
Buttons
The buttons present in this display are described in the table below.
Button Action
Key Database
The key database can be used to enter two types of key data: K and SCK-TMO. The data for these
keys can be entered manually, imported in electronic format from a file or, for K keys only,
generated by the encryption card.
Selecting either K’s or SCK-Trunked Mode Operation, when importing keys in electronic
format, is not necessary as the application detects what type of key is present.
Figure 4-8 is an illustration of the Key Database window. In this case this shows the K’s view.
K Keys
This part of the interface is used to:
• Enter K Keys either manually or automatically from a file or encryption card.
• Set the Distribute K Configuration parameters.
Figure 4-9 illustrates the K’s key database window.
Fields
The fields present in this display are described in the table below.
Field Description
Enter K Manually
K A 32 character hexadecimal number. The number
is entered in four fields of 8 characters each.
Status The status of the K Key. This is not shown in
Figure 4-9.
Distribute K Configuration
Amount of K available The number of K’s currently in the database.
Amount of K to Distribute per session The maximum number of K’s configured to be
distributed in one session (from 1 to 2000).
Auto Generate K Whether or not the automatic generation of K
keys during a distribution session is enabled.
Buttons
The buttons present in this display are described in the table below.
Button Action
Import Key
This dialogue box is used to find a key file for import.
Figure 4-10 illustrates the Import Key dialogue box.
Fields
The fields present in this display are described in the table below.
Field Description
Buttons
The buttons present in this display are described in the table below
Button Action
Modify Settings
This dialogue box is used to configure the parameters used for the distribution of K keys.
Figure 4-11 illustrates the K Distribution Settings dialogue box.
Fields
The fields present in this display are described in the table below
Field Description
Buttons
The buttons present in this display are described in the table below.
Button Action
SCK-TMO Keys
This part of the interface provides information on the Static Cipher Key - Trunked Mode
Operation (SCK- TMO) keys in the PrC database. In addition, it is used to enter keys. This can
either be done manually, by typing in the required values, or by importing keys from a file.
Figure 4-12 illustrates the SCK- TMO Key Database window.
Fields
The fields present in this display are described in the table below
Field Description
Buttons
The buttons present in this display are described in the table below.
Button Action
For information on the ‘Import key’ dialogue box, see “Import Key” on page 4-17.
Modify
This dialogue box is used to modify a selected key and manually enter keys.
Figure 4-13 illustrates the Modify dialogue box.
Fields
The fields present in this display are described in the table below.
Field Description
Enter SCK Key for Slot n Shows the slot number that the selected key is
stored in. Where n represents the slot number, in
this case 3.
Key (Hex) Used to enter the SCK-TMO’s numbers.
This field will be empty when the
dialogue box opens. It does not
display the key’s current values.
Key Version Used to enter the SCK-TMO’s version number.
This field will be empty when the
dialogue box opens.It does not
display the key’s current values.
Buttons
The buttons present in this display are described in the table below.
Button Action
KVLs
The KVLs work area is used to manage and administer the application’s KVLs.
Figure 4-14 illustrates the KVLs window.
Fields
The fields present in this display are described in the table below.
Field Description
Buttons
The buttons present in this display are described in the table below.
Button Action
Button Action
Fields
The fields present in this display are described in the table below.
Table 4-30 List of KVL Port Settings Fields and Their Descriptions
Field Description
Table 4-30 List of KVL Port Settings Fields and Their Descriptions (Continued)
Field Description
Buttons
The buttons present in this display are described in the table below.
Button Action
Miscellaneous
This dialogue box can be used to modify the PrC Server ID. See Figure 4-16. This dialogue box
has no functional relationship to the KVL Port Settings dialogue box.
Field
Field Description
Buttons
The buttons present in this display are described in the table below.
Button Action
Add KVL
This dialogue box is used to add a new KVL. See Figure 4-17.
Fields
The fields present in this display are described in the table below.
Field Description
Buttons
The buttons present in this display are described in the table below.
Button Action
Modify KVL
This dialogue box is used to update a KVL’s Alias and ID values. See Figure 4-18.
Fields
The fields present in this display are described in the table below.
Field Description
Buttons
The buttons present in this display are described in the table below.
Button Action
Assign UKEK
This dialogue box is used to assign a new UKEK to a KVL. See Figure 4-19.
Field
Table 4-38 The KVL UKEK Assignment Field and its Description
Field Description
Buttons
The buttons present in this display are described in the table below.
Button Action
User Management
The user management display is used to manage and administer the PrC’s users. Users, who have
the required permission, can carry out tasks concerned with managing the application’s users.
Only users with user management permission have access to the user management work area. If
you do not have user management permission, then the User Management tab will not be
displayed when you are working on the PrC client.
Fields
The fields present in this display are described in the table below.
Field Description
User Information
Login Name The User’s log in name. Can contain spaces and non-
alphanumeric characters.
Once created a log in name cannot be changed.
Table 4-40 List of User Management Fields and Their Descriptions (Continued)
Field Description
Full Name The user’s Full Name. Can contain spaces and non-
alphanumeric characters.
The use of a Full Name is optional.
Change Password A check box which, when enabled, allows a user with user
management permission to change another user’s password.
Users cannot modify their own passwords from
this window. Instead, they have to use the
‘Change Password’ function, available from the
User drop-down menu. For more information,
see “Menus” on page 2-3.
New Password The new password that is to replace the current one. See
“Password Requirements” on page 3-4.
Confirm New Password Confirmation of the new password that is to replace the current
one.
Permissions
KVL Management Allows the user to carry out tasks related to the management
of KVLs.
Master Key Load Allows the user to load a master key to the encryption card.
Provisioning Management Allows the user to carry out provisioning tasks:
• Provision Keys
• Export K-Ref pairs
• Modify K Distribution Settings
• Enter Ks and SCK-TMOs
• View Audit Trail contents
Server Management Allows the user to change the server ID and the PrC server’s
operational state.
User Management Allows the user to carry out user management tasks and tasks
involving the Audit Trail.
Buttons
The buttons present in this display are described in the table below.
Button Action
Add User
This dialogue box is used to add new users to the PrC database.
Figure 4-21 shows the Add User dialogue box.
Fields
The fields present in this display are described in the table below.
Field Description
Login Name The user’s login name. Can contain spaces and
non-alphanumeric characters.
Once created a log in name cannot
be changed.
Full Name The user’s Full Name. Can contain spaces and
non-alphanumeric characters.
The use of a Full Name is optional.
Buttons
The buttons present in this display are described in the table below
Button Action
Backups are made using the System menu’s PrC Database option. See Figure 4-22.
Fields
The fields present in this display are described in the table below.
Field Description
Backup Status
Backup in Progress Is a backup currently taking place: Yes/No.
Table 4-44 List of Database Backup Fields and Their Descriptions (Continued)
Field Description
Last Successful Backup The date and time of the last successful backup.
Backup Destination Path
Path The path that the backup will be saved to.
Buttons
The buttons present in this display are described in the table below.
Button Action
Encryption Devices
The System menu’s Encryption Devices item opens a dialogue box that provides detailed
information about the PrC’s encryption device and allows a master key to be loaded. See Figure
4-23.
A master key can only be loaded once, after that an identical copy of the master key can be
reloaded, but the device’s master key cannot be changed.
Fields
The fields present in this display are described in the table below.
m
Field Description
Buttons
The buttons present in this display are described in the table below.
Button Action
To change the server’s state you must have Server Management permission.
The server’s operational state is indicated by the icons on the Status Bar. See “Status Bar” on
page 2-3.
In the operational state users can carry out all the tasks that their permissions allow. In the out of
service state only a limited number of tasks can be carried out, these are as follows:
• Load a master key
• User management
• Server state changes
The server will automatically switch to the out of service state when any of the following has
happened:
• A master key has to be loaded. For example if an incompatible master key has been loaded.
• The database has failed.
• The encryption card has failed.
AGlossary
The glossary describes many terms connected with TETRA AEB slot For E1, one of 960 possible slots on the
and Dimetra and is not system release specific. Therefore not Ambassador Electronics Bank (AEB) Time
Division Multiplexing (TDM) backplane busses
all terms may be relevant for a specific system or release.
(32 busses x 30 AEB slots/bus). For T1, one of 768
possible slots (32 busses X 24 slots/bus).
10Base-T A method of connecting Ethernet devices
directly to an Ethernet switch/hub. Max. AEB System Ambassador Electronics Bank System Timer
Timer Module. An AEB module that provides system
transfer rate is 10Mbps.
clocking and data bus arbitration. Each Audio
Switch users two AEB System Timer Modules in a
ABO Automatic Busy Override. redundant configuration.
Accounting Involves the reporting of the activities of radio Affiliated Zone The zone to which a radio is currently registered.
Management users on the system. The system provides several
accounting management facilities.
Affiliation The process by which a Mobile Station identifies
its location and talkgroup affiliation to the system
ACELP Algebraic Code Excited Linear Prediction. as it moves through the coverage area.
Acknowledged A service provided by the layer below which gives Affiliation Dis- A Motorola software application that tracks
Data Transfer an acknowledgement back over the air interface play mobility characteristics of radio users by
from the lower layer peer entity. This service is monitoring current affiliations and deaffiliations on
used by the layer 3 entities to get a secure the system.
transmission including re-transmissions.
Affiliation GroupThe talkgroup to which a Mobile Station is
Acknowledge- A message sent in response to another message to currently attached.
ment indicate status.
AIE Air Interface Encryption. Dimetra supports Over
ADM See Alias Database Manager. the Air Standard Encryption of Mobile Stations and
Base Stations using the standard TETRA
Admin See CENTRACOM Elite Admin. algorithms TEA1 and TEA2.
Advanced Link An Advanced Link (AL) is a bi-directional AIMI See Ambassador Interface Multiplex Interface.
connection between one Mobile Station (MS) and
a Base Station (BS) with provision of Air Traffic The Radio Applications Programming Interface
acknowledged and unacknowledged services Router (RAPI) is located on the ATR server that is co-
including windowing, segmentation, extended (ATR) located on the same LAN as the ZC. The ATR
error protection and choice among several manages all non-call processing processes for the
throughputs. The data transfer via the advanced Zone Controller and relies on the ZC to provide
link requires a set-up phase. aliases and security group information. The ZC and
the ATR are connected with a TCP link.
AEB See Ambassador Electronics Bank.
AKD Authentication Key Distribution Announced Cell Cell re-selection where Mobile Station (MS)
Re-selection Mobile Link Entity (MLE) informs the Switching
and Management Infrastructure (SwMI) both in the
ALGID Algorithm Identification. serving cell and in the new cell that cell change is
performed. There can be three types of announced
Alias An alphanumeric name used to identify for cell re-selection:
example a mobile station, a talkgroup or a site.
Aliases can be assigned to represent something - type 1: the MS-MLE knows the new cell and the
more meaningful to a console operator than the six- traffic channel allocations on the cell before
digit ID number. deciding to leave its serving cell;
Authentication A function which allows the radio system Base Station Term used to identify the installation including the
infrastructure to validate that a mobile station is EBTS, antenna and ancillary equipment.
genuine before granting access to system services.
Upen receiving an authentication request, the Basic Link A Basic Link (BL) bi-directional connectionless
mobile station may also perform a mutual
path between one or several Mobile Stations and a
validation of the infrastructure to ensure it is safe to
Base Station, with a provision of both
operate.
unacknowledged and acknowledged services on a
The use of authentication establishes a level of trust
single message basis.
between the radio system’s infrastructure and
subscriber mobile stations.
Basic logging This feature collects radio system traffic and
Authentication A Motorola software application that allows
generates the collected data in a report format.
Centre system managers to manage encryption keys for
Dimetra. Bearer Service A type of telecommunication service that provides
the capability for the transmission of signals
Authentication A secret key used to validate a mobile station’s
between user-network interfaces.
Key ability to operate on the radio system. Each MS is
assigned a unique authentication key at the factory BER Bit Error Rate. Used as the performance metric for
or a secure facility. the digitized form of voice.
The authentication key is imported or typed into
the Authentication Centre along with its associated BERT Bit Error Rate Test.
reference (REF).
Base Radio Dimetra remote EBTS site equipment. Each base Broadcast A message to all Mobile Stations currently
(BR) radio (BR) provides one TETRA carrier, listening. Broadcast information can be of a variety
comprising four TETRA time slots. The BR is of types including adjacent channel information
optionally equipped with three receivers for and current system access control information.
diversity reception which increases the coverage
area and reception quality. Bundle A collection of Inter TETRA Connections (ITCs)
which utilises the same scenario over the inter
Base Radio The Base Radio is made up from a number of system interface.
Controller replaceable units. A Base Radio Controller is used
(BRC) to communicate with the Site Controller and to Busy handling When channel resources are not available, the
control the other units within the Base Radio. controller generates a tone over the control channel
to a radio indicating it is in queue for the next
available resource.
Busy queue A memory storage in the central controller to hold CAS Channel Associated Signalling.
Mobile Station information and requests until a
channel is assigned after a busy condition. CBR Constant Bit Rate.
Busy Queuing A method of queuing a call when resources are not CC See Crypto Card.
available to grant the call.
CADI
CCC Crypto Communications Controller.
See Computer Aided Dispatch Interface.
Establishes the communication between the Host
CE. Cuttently implementation uses a Power
CAI Common Air Interface. QUICC II for the CCC
Call Continua- The capability of passing active calls or busy queue CCITT Consultative Committee for International
tion designations across zone boundaries. Also termed Telegraph and Telephone.
“Call Handoff” Call Coordination, or Call
Reconnect. CCM Channel Control Module. A CentraCom console
module that is a direct interface for the dispatcher
Call hand-off The automatic assignment of an available channel to make calls and to indicate received calls.
when a radio user roams from one site to another
with continuous communications. CDM See Console Database Manager.
Camped A Mobile Station (MS) is said to be camped on a CENTRACOM An application for creating objects on the
cell when the MS is synchronized on the cell Base Elite Admin CENTRACOM Elite operator position desktops.
Station (BS) and has decoded the Broadcast
Network CHannel (BNCH) of the cell. The
synchronization procedure is performed by the CentraCom A subnet that consists of a Windows NT-based
Gold Elite Sub- Console Database Manager/Alias Database
Media Access Control (MAC) and the net
interpretation of the network information from the Manager (CDM/ADM) file server(s) and a number
BNCH (Voice+Data) is performed by a procedure of Windows NT-based Operator Dispatch
in the Mobile Link Entity (MLE). It is the MLE workstations.
which decides when an MS is said to be camped on
a cell.
CentraCom A platform that supports Classic Gold CRT, Classic Colocated Pertaining to a configuration in which equipment
Gold Series Gold Button and LEDs, and Elite operator resides in the same physical site.
Platform positions.
Computer Aided The CADI enables the user to do remote network
Central Elec- The CEB is the main processing bank in Dimetra Dispatch Inter- management through an Application Programming
tronics Bank trunking systems and provides an interface face Interface (API). Possible functions may be radio
(CEB) between the console positions and the check, radio inhibit and Dynamic Group Number
RF equipment. Allocation (DGNA).
Central Network This term is used to describe the system control Configuration Refers to the capabilities which allow the user to
Management equipment to which the sites are all connected. This Management configure operational parameters of physical and
is comprised of a number of items including the logical devices used within the system. There are
Zone Controller, Zone Manager, User Consoles, two categories, Subscriber Management performed
and Site Link Multiplexers. through the User Configuration System and
Infrastructure Management performed through the
CEPT
Zone Manager.
Conference European des Postes et
Telecommunications. An association of the
twenty-six European PTTs (Postes (mail), Console The console is the equipment used by dispatchers
Telephone and Telegraph) that recommends to interact with the Dimetra system and thus to
communication specifications to the International communicate with system users. Only
Telecommunications Union (ITU). CENTRACOM Gold Series Consoles are
compatible with Dimetra.
CES Centracom Elite Server.
Console Admin- A terminal that is connected directly to the Zone
istration Termi- Controller to perform Terminal administrative
Channel Control The display seen by a console operator when using nal
Window functions for the system.
a CENTRACOM Elite console operator position.
(CCW) Each CCW corresponds to an object monitored by
the console. Console Data- A software tool that permits changes to the console
base Manager database, which stores all features programmed for
(CDM) the console.
CIE Console Interface Electronics.
CK Cipher Key Console Opera- An interface board in the Central Electronics Bank
tor Interface that has the connections for the console operator
CKEK Common Key Encryption Key. An encryption key Module positions. The module controls audio flow and data
used solely to encrypt traffic keys targeted for a (COIM) signals to and from the console position.
group of secure entities.
Console Patch A unique call type. Some types of console patches
Clear MS A mobile station that is registered on the system can be performed by a console operator to either
with ciphering off. expand the participant size for the call or to provide
inter-operation ability between different agencies
CMS
that do not communicate together. For example,
Cable Management System.
two multigroups would be created if talkgroups 1,
2, 3, and 4 were patched together and if talkgroups
CNE Central Network Equipment. The equipment 1,2, and 3 are home to zone 1 and talkgroup 4 is
located at the Master Site or Mobile switching home to zone 2.
Office.
Console Phone A manual patch of a phone line module to another
Codeplug The firmware that holds the unique personality for Patch CCM/CCW. A CCM/CCW may be associated with
a system or device. The codeplug is programmable a trunked talkgroup or a conventional channel at
to change system or unit parameters. Codeplugs are the time of the patch.
found in Mobile Stations, CentraCom equipment,
as well as in some repeaters and 6809 controllers.
Console-only A type of call used exclusively for console Critical site Critical Site Assignment is a Motorola service that
Talkgroup Call operators, and does not involve any Mobile assignment supplements the group call service. For each
Stations. All console operator members can be talkgroup, the Network Manager can create a list of
located within the same zone or in different zones. ‘Critical Sites’. These are sites that must be
included in a group call for it to be set up. Thus,
Constant delay A network service (NS) where the transit delay of
even when Fast Start is in operation, the call will
service not be set up until channels are available at all the
the NSDUs between the network connection
critical sites for the talkgroup.
endpoints remains constant for the duration of the
connection.
Crypto Card A PCI-based encryption module installed in the
Control channel The first time slot on the lowest TETRA carrier
AuC server. The AuC Crypto Card provides
encryption services to the AuC such as key
frequency is always used as the main Control
generation and database encryption.A master key is
Channel. The rest of the communication channels
stored in the AuC Crypto Card and is utilized to
are used as Traffic Channels, or additional control
encrypt and decrypt data stored in the AuC
channels, if required.
database.
Control Mes- Term used to describe messages of a controlling CSMA/CD Carrier Sense Multiple Access/Collision Detect.
sage nature sent between the EBTS and the Mobile
Technique used in Ethernet to manage access to a
Station (MS).
shared transmission medium.
DCE Data Communication Equipment. DIN Deutsche Industrie Normen (German Industrial
Standards).
DCK Derived Cipher Key
Direct Mode Direct communications between 2 or more mobile
Operation stations without using any infrastructure
DDI Direct Dial In. Also known as DID (Direct Inbound
Dialling).
Direct set-up A signalling procedure where immediate
signalling communication can take place between the calling
DDP Disabled Dialling Pattern. An individual telephone
and the called users without the alerting process
within an ECN.
and without an explicit response from the called
user that he has answered.
Deaffiliation The process in which the Mobile Station signals to
the system, that it is no longer monitoring the Dirty box An indicator button associated with a form or field.
system, because it is power down or it is changing
This button appears darkened when any change to
mode to another system which is not part of the
the form or field occurs.
Dimetra system.
Diagnostics A feature that allows the user to disable a failing Dispatcher A person logged on to the RCM terminal as a
device, enable repaired devices, and/or set certain Dispatcher who monitors and transmits commands
device operational states. to radio traffic.
DIB Data Interface Box. DLCI See Data Link Connection Identifier.
DID Direct Inbound Dialling. Also known as DDI DM See Direct Mode Operation.
(Direct Dial In).
DMO See Direct Mode Operation.
Digital Access A data concentrator and organizer for Tl / El based
Cross-Connect systems.
System DMZ DeMilitarised Zone (see Peripheral Network
(DACS) Router).
Dimetra Con- See Elite Console. Downlink The radio frequency communications path from the
sole EBTS to the Mobile Station. Also referred to as the
EBTS transmit path.
Dimetra™ DIgital Motorola Enhanced Trunked RAdio. The
Motorola Dimetra system family is a sophisticated Driver card A Zone Controller platform card for conversion of
range of digital radio equipment that delivers the TTL protocol to RS-232 for the Line card.
full benefits of the TETRA standard. It is designed
to meet the needs of the users of both Private
Mobile Radio networks (PMR) and Public Access DS0 The basic unit in the DSn (T1 and up) and E1
Mobile Radio systems (PAMR). The Dimetra transmission applications. A DS0 carries a 64 Kbps
product line includes base stations, switches, data stream. A T1 line has twenty-four DS0s and an
operations management control, portables, E1 line has thirty-two DS0s.
mobiles, and consoles, all of which are easily
reprogrammed as the system is enhanced. DSP Digital Signal Processing.
DSU Data Service Unit. A device used in digital E1 Digital carrier facility used for transmission of data
transmission for connecting data terminal through the telephone hierarchy. E1 links are used
equipment (DTE). in most countries other than the United States and
Japan. T1 links are mostly used in the US and
DSX
Japan. Both T1 and E1 are composed of DS0s, the
Digital Service Cross-connect. Cross-connection
basic 64 Kbps path that makes up these links.
point for DS1 signals.
Embassy SwitchAmbassador Electronics Bank (AEB). A Time Enhanced Base A site connected to a Dimetra master site via a site
Division Multiplexing (TDM) audio switch Transceiver link. A Dimetra remote EBTS site consists of a
capable of simultaneously routing audio from System base radio (BR), a site controller, and subscriber
multiple sources to one or more destinations. In a radios.
Dimetra system, each Zone Controller controls the Contains up to 7 base radios, TETRA Site
audio routing for its associated AEB. Controller, Environmental Alarm System, RF
Distribution System, antennas, power supply and
EMC
the telephone company supplied X.21 line
1) Encryption Module Cartridge.
termination equipment.
2) Electro Magnetic Compatibility.
Encryption A method of encrypting and decrypting Ethernet Hub A device that acts as a multiport repeater in
Algorithm information. allowing multiple devices to be connected together
into a single ethernet LAN. All the devices
connected to the hub share the available bandwidth
Encryption A PCI-based encryption module installed in the as all packets are repeated at all ports.
Device/Crypto PrC server. The PrC Encryption Device (a Crypto
Card Card) provides encryption services to the PrC such
as key generation and database encryption. Ethernet Switch A device that acts as a multiport bridge allowing
A master key is stored in the PrC Encryption multiple devices to be connected together into a
Device and is utilized to encrypt and decrypt data single ethernet LAN. Each of the devices
stored in the PrC database. connected to the switch have the full bandwidth
available as a switch learns which devices are
connected to which ports.
Encryption Key A set of 1s and 0s that is used to encrypt or decrypt
information. Router: A device that routes IP packets between IP
subnets.
Encryption Man-The Network Management system is able to switch
agement the use of encryption at a site on or off. This is a site ETS ETSI Technical Specification. A technical
wide function for all control and traffic channels, specification produced by ETSI to define a
except where users may be individually communications standard.
provisioned to operate without encryption. These
units will always operate with encryption switched
off. ETSI See European Telecommunications Standards
The Network Management system is able to Institute.
remotely download new SCK to all EBTS’s in the
network using the remote Software Download European Tele- The European standards organization responsible
facility. communica- for the TETRA standard.
tions Standards
Institute
(ETSI)
Exit Router The Exit Routers allow communication between Frame Relay A form of packet switching that uses smaller
different zones. packets and requires less error checking than
traditional forms of packet switching.
Explicit Authen- This term is used to describe a successful
Communications protocol used for multiplexing
tication and routing data over the site link.
challenge-response-result authentication procedure
based on knowledge of the secret key K.
Frequency A complex method of maximizing coverage with
Reuse Planning the same set of RF channels. With proper planning,
External calls A call where only one of the parties (either the
a given set of RF frequencies can be reused a
source or the destination) is in a TETRA network.
number of times throughout a very large service
The other party is in a non-TETRA network.
area.
FastStart A feature that allows a talkgroup call to start as FSU Fault Sense Unit
long as resources programmed as critical are
available. Non-critical resources are added to a call
in progress as they become available. FT See Fault Tolerant.
Fault Manage- A feature that allows the user to monitor operation FullVision Subsystem of the Dimetra network manager. This
ment status, display fault information, perform uses Hewlett Packet OpenView Network Node
diagnostics on the system, and provide notification Manager to provide a industry standards-based
of managed object malfunctions. fault management platform.
Fault Tolerant A redundant equipment design that withstands a FullVision Inte- A Dimetra IP network management application
single point of failure without disruption of call grated Network used for reporting system fault conditions.
processing or isolation of the failure with only Manager (INM) Using the SNMP protocol, the FullVision INM
partial loss of call capabilities. application displays alarms reported by the
Authentication Centre (AuC).
FIFO First in, first out. In a busy trunked system, radio
service requests are handled in the order received. FVS FullVision Server.
FIPS Federal Information Processing Standards. G-HLR See Group Home Location Register.
FIPS-140-1 This Federal standard assures that cryptographic GGSN Gateway GPRS Support Node. This is the only
modules are effectively designed to meet specific node, that Dimetra 5.0 implements and that allows
security objectives. mobile users to access the customer network or
specified private IP networks.
Fleetcall See Announcement group.
Global Position- A global positioning system which uses satellites to
ing System provide a continuous time and positioning system.
Fleetmap A document listing configuration information for
The EBTS uses this system to maintain system
all users in the system.
synchronization.
FNE Fixed Network Equipment. All the system GOS See Grade Of Service.
componets excluding the mobile equipment. i.e the
CNE and all the remote site equipment
GPRS General Packet Radio Service.
FRAD Frame Relay Access Device.
GPS See Global Positioning System.
Frame TETRA term used to describe a period of time on a
channel. A frame is further divided into timeslots, Grade Of Serv- A specification which determines how often a radio
and a number of frames may be grouped into a ice or console user will receive a busy. This is typically
multi-frame. (GOS) rated as a percentage of the total calls being
processed by the system.
Graphical User An icon-based user interface. HSSI High Speed Serial Interface
Interface
(GUI)
I/F Router The Interface Routers provide access to the Wide
Area Network (WAN) links.
Group Home The HLR that stores information for talkgroups
Location Regis- that are home to that zone.
ter ID Identification.
(G-HLR)
HLR See Home Location Register. Individual Site This command allows individual radio user access
Access for Private Call and Interconnect options on
Home Location The entity that is used to receive (from the UCS) a specific sites, as configured by the Dimetra
Register master copy of individual and talkgroup Mobile Network Manager.
(HLR) Station information for call processing. It will also
contain mobility information for individuals and Individual- Individual voice-based services which include
talkgroup on a per zone level. Based Service Private Calls, Landline-to-Radio Interconnect
Calls and Radio-to-Landline Interconnect Calls.
Home network A network where a Mobile Station (MS) has a
direct subscription. This means that an MS identity Infrastructure The equipment and facilities that make up the
has been allocated in advance of any network Dimetra IP radio system. These include zone,
access. EBTS site, and network management devices.
Home Zone A designation made for each talkgroup and Inhibit A Dimetra RCM feature cancelling transmit and
individual in the system that helps determine what receive functions of a radio. The target radio must
Zone Controller will coordinate the call process. be on and within system range in order for this
feature to function.
Host A computer which provides services to other
computers, such as database access. Initial cell selec- In TETRA the act of choosing a first serving cell to
tion register in. The initial cell selection is performed by
Hot pull Modules or boards that can be pulled out and procedures located in MLE and in the MAC. When
replaced without powering down the equipment the cell selection is made and possible registration
that contains them. is performed, the Mobile Station (MS) is said to be
attached to the cell.
Interconnect This option provides independent telephone call ISDN Integrated Services Digital Network.
capability for mobiles and portables.
ISI Inter System Interface.
Internal calls A call where both the source (the calling party) and
the destination (the called party) both lie in a ISSI Individual Short Subscriber Identity. TETRA term,
TETRA network domain.
in Dimetra called Individual ID, a subset of ITSI.
InterZone Audio plugs into an Ambassador Electronics Bank IZAS See IntraZone Audio Slot.
Card (AEB). The card has modified AMB firmware to
(IZAC) support interzone audio. The hardware is the same IZNM Inter-Zone Network Manager.
as an AMB board that interfaces Central
Electronics Banks (CEBs) or sites to the AEB.
K See Authentication Material.
InterZone Audio 64 kbps channel on OmniLink Ambassador card
Slot that carries audio DS0 level between two K-REF A pair of parameters that identify a mobile station
(IZAS) Ambassador Electronics Banks (AEBs) in different (MS) to the Authentication Centre (AuC). A K-
zones. REF pair is needed by the AuC to create
authentication material (KS and KS’) for a MS.
InterZone Trunk-A trunking state between two zones in which the
ing Ambassador Electronics Bank (AEB) and Zone Kbps Kilobits (1024 bits) per second.
Controller can communicate, and talkgroup-to-
controlling zone mapping tables exist in both KEK Key Encryption Key. Also known as a shadow key.
zones. An encryption key used solely to encrypt traffic
keys.
Intra-TETRA call A call where both source and destination are in the
same TETRA network sub-domain. Key Variable Also known as an encryption key. A set of 1s and
0s that is used to encrypt and decrypt information.
IntraZone Audio IZAC slots used for intrazone audio.
Slot
Key Variable A portable device used to load encryption keys to a
(IZAS)
Loader secure entity.
KI Authentication (Infrastructure) Key. A secret key LST When a system fails or many of the sites lose
used to encrypt and decrypt system and zone key connection to the CNE, the sites are designed to go
encryption keys (KEKm and KEKz) transported into a fall back situation known as Local Site
over the radio system’s infrastructure network. Trunking (LST). When the sites are forced to go
Each zone controller, TETRA site controller, and into LST, the radios (users) are randomly
base radio controller in the system is assigned a distributed across all the sites and communication
unique infrastructure key.An infrastructure key is between radios is dependant on which site they are
generated and sent from the Authentication Centre registered. Only radios registered at a particular
(AuC) to the system entities using the Key Variable site can communicate to each other.
Loader (KVL) device.
MAC Media Access Control. An address that is hardware
KID Key Identification. coded into every Ethernet controller and is unique
and cannot be changed. It is also the lower part of
KMT
the second layer of the OSI Reference Model.
Key Message Transport protocol. Protocol used to
transfer keys between the AuC and ZC, TSC, and
BRC Main Control The main control channel at a site. The channel is
Channel used by Mobile Stations to register on the system
(MCCH) and to request and setup speech calls with other
KS, KS’ Session Authentication Keys (See Authentication
Mobile Stations.
Material.).
Logging This Central Electronics Bank (CEB) module MGEG See Motorola Gold Elite Gateway.
Recorder Inter- interfaces with a recording device to provide audio
face from the LOMI through the AEI.
(LORI) MGEG Router The MGEG Routers send and receive audio via
multicast, and send and receive control packets via
unicast.
LOMI See Logging Operator Multiplex Interface.
Migration The act of changing to a new Location Area in a
LORI See Logging Recorder Interface. network (either with different MNC and/or MCC)
where the user does not have subscription (ITSI)
for that network.
MLE See Mobile Link Entity. MultiSelect Dispatchers can select several talkgroups at once
(MSEL) for dispatching, using a single channel resource.
MMI Man Machine Interface.
Mute A control signal used by the repeater to quiet audio
MDG IPL
and break the in-cabinet repeat.
Mobile Data Gateway Initial Program Load
Mobile Network The identity that is broadcast by all TETRA base Network Man- A management system that offers control from any
Identity stations to uniquely identify the network. agement
(MNI)
authorized user terminal in the system and includes
(NM) the following: the User Configuration Subsystem
(UCS), the FullVision INM, and the Zone Manager
Mobile Station A two-way voice and data communications device (ZM) Subsystem.
used by Dimetra IP system subscribers.
For the Dimetra IP system, the MS stores and
Network Router The Network Router allows connection of the
utilizes an authentication key (K) for explicit
authentication purposes and a static cipher key- Dimetra LAN to other networks, and interposes a
trunked mode operation key (SCK-TMO) for protective firewall to prevent access to the Dimetra
implicit authentication and air interface encryption system from unauthorised external devices.
purposes.
Network SAP Addresses that belong to other (non-TETRA)
Address addressing domains. These other domains include
MoCa Motorola California. (NSAP Address) ISDN, PSTN and PDN domains.
NTS See Network Time Server. Packet Data A data mode selected from the radio. It offers the
Mode possibility of transferring data in the packet data
(PDM) format.
Object A term referring to a system resource manipulated
through the Dimetra Manager.
Packet Data The Packet Data Router is one of the two software
Router packages in the Packet Data Gateway. The PDR
OmniLink Shortened from the complete product name (PDR) handles the IP functionality. See also RNG. The
‘Dimetra OmniLink’. OmniLink also indicates the
two software packages, PDR and RNG, cannot
function or feature operates across zone
function as standalone applications, i.e. both must
boundaries; also called ‘MultiZone’ or ‘inter-
be in operation before PDG functionality is
zone’.
available.
Peripheral Net- The Peripheral Network Routers allow PSTN Public Switched Telephone Network.
work Router communication to De-Militarized Zone (DMZ)
subnets. PTT See Push-to-Talk.
Primary Talk- Unique talkgroup parameter in the subscriber Radio activated A radio function to send in a deregistration signal
group radio. deregistration when turning off power or going to another trunked
or conventional personality.
Private Call An "individual" call between two radios or
between a radio and a console operator. Radio Control RCM is a software application which runs at the
Manager System Manager and is primarily used by certain
(RCM) Console dispatchers, typically supervisors.
Private Radio The Private Radio Network Managment Suite
Network Manag- Application Launcher is the single entry to all the
ment Suite management applications on a Dimetra system. Radio Fre- General term for the range of frequencies used in
Application quency radio communication systems.
Launcher (RF)
Radio Network The Radio Network Gateway is one of the two Remote Site See Enhanced Base Transceiver System.
Gateway software packages in the Packet Data Gateway. The
(RNG) RNG handles the EBTS interface. See also PDR. Requesting Requesting Zone - the actual Zone the radio is
The two software packages, PDR and RNG, cannot Zone registered with at that moment if it is not the
function as standalone applications, i.e. both must
selected talkgroup’s home Zone
be in operation before PDG functionality is
available.
Resources A general term for network infrastructure and radio
Radio Query
channels.
A set of dispatcher commands to obtain
Tasks information on radio users in the Dimetra system.
RF See Radio Frequency.
Radiocheck A Radio Query Task command the dispatcher uses
to verify registered radio users. RF Distribution Remote Enhanced Base Transceiver System
System (EBTS) site component that combines inputs from
(RFDS) the base radios and combines them to feed one or
RAIM Receiver Autonomous Integrity Monitoring. This
more antennas.
feature is provided to handle a specific GPS
satellite which is known to provide a low quality
signal. RFDS See RF Distribution System.
Random Access The method by which a Mobile Station transmits RJ45 A serial connector similar to a standard telephone
unsolicited requests to the EBTS. This might occur connector, except it houses eight wires instead of
in the case of specific periods where Mobile four
Stations are permitted to transmit requests.
RNG See Radio Network Gateway.
Ranking A procedural method of listing cells in descending
order from the most suitable for communication to roaming The movement of a radio user from one site to
the least suitable for communication. The method
another site. The radio registers and affiliates on
comprises multiple calculations of C4 parameters
each site as the user moves from one coverage area
and C3 parameters, defined in ETS 300 392-2 [17],
to another.
clause 10. As inputs to the ranking procedure are:
- outputs from the monitor process (e.g. C2
parameters); RP Rendezvous Point.
- outputs from the scanning process (e.g. C1
parameters); RSM Remote Speaker Microphone (for a Mobile
- network parameters received in the MLE
Station).
broadcast.
Ruthless A method of acquiring a channel for an emergency Short Sub- The network specific portion of a TSI. An SSI is
Preemption call in a busy condition. A call with a lower priority scriber Identity only unique within one TETRA sub-domain (one
is terminated to release a channel for assignment to (SSI) TETRA network).
the emergency call. Note: There are four different types of SSI (see
subclause 7.2.3):
RX
a) Individual SSI (ISSI);
Receiver.
b) Group SSI (GSSI);
c) Alias SSI (ASSI);
SAC Subscriber Access Control. d) Un-exchanged SSI (USSI).
SC See Site Controller. Site This normally refers to a remote base station site.
SCI Serial Communications Interface. Site Controller The Site Controller is capable of controlling up to
(SC) 7 BRs (28 logical channels) and contains the SRI
SCK
(Site Reference ISA) time and frequency reference
Static Cipher Key. Key used for encryption
module. The module’s function is to provide a
between subscribers and EBTS base radio.
precise timing reference and a highly stable
frequency reference for the EBTS.
SCK-TMO See Static Cipher Key-Trunked Mode Operation An optional second Site Controller can be added to
Key. the EBTS for redundancy.
SDR See Short Data Router. Site Handover When a roaming Mobile Station in handing over
within the same zone or to a new zone.
SDS See Short Data Service.
Site Link Wide area network (WAN) communication link
SDS - TL
that connects a Dimetra master site to a remote site.
Short Data Service Transport Layer.
Site Link Multi- The Site Link Multiplexer combines all the
SDTS Short Data Transport Service. plexer necessary control, management, IP data, and
(SLM) voice/data traffic into one n * 64 kbit Frame Relay
Secure Data- A database in encryption mode which holds all of formatted link between the master and remote sites.
base the encryption keys. This allows efficient use of the links between the
remote and master site which are often expensive
Services
leased links. The SLM also ensures system
The TETRA standard offers a range of services.
synchronization to the network, i.e. the provider of
the leased synchronous lines.
Serving cell The cell that is currently providing service to the
Mobile Station (MS). Site Registra- Automatic radio transmission of talkgroup
tion and Affilia- affiliation and radio ID when powering up or
Short Data A Short Data Router (SDR) provides TETRA short tion entering a new site. This site registration
Router data services between host applications connected information enables the Zone Controller to locate
(SDR) to Dimetra Mobile Stations or between a host all active radio users and talkgroup members.
application connected to a Dimetra Mobile Station
and a host application connected through the Site switch acti- When a radio registers on a new site, the Zone
Dimetra Master Site. Furthermore the SDR vated deregis- Controller deregisters the radio from its previous
provides TETRA short data services directly tration trunking site and registers it on the new site.
between two Dimetra Mobile Stations or directly
between a Dimetra Mobile Station and a host
application connected through the Dimetra Master Site Switch When a radio changes sites and affiliates on the
Site. Deaffiliation new site, the Zone Controller automatically
deaffiliates the radio from its previous trunking
Short Data Serv- A flexible bearer service that transfers information
site.
ice from one interface to another.
(SDS) Site trunking Local trunking operations after remote site and
mode audio link failures. The site controller performs all
call processing. No communication links exist to
other sites.
Site wide call This feature is similar to system wide call in Storm Plan An RCM optional function to regroup talkgroups
SMARTNET II. A site wide call goes out to all for special situations, such as disasters or crowd
radio users and talkgroups registered on the sites control. The feature allows preset procedures for
selected for the call. quick and efficient manipulation of emergencies
and planned events.
SLM See Site Link Multiplexer.
Sub-network A collection of equipment and physical media
SNMP
which forms an autonomous whole and which can
Simple Network Management Protocol. A means
be used to interconnect real systems for purpose of
to monitor and set network configuration and
communication.
runtime parameters.
Source Site The site where a radio user initiates any of the call Switching and The TETRA term for FNE. See FNE.
types. Management
Infrastructure
SS7 Signalling System 7. A signalling protocol used in System Statis- The SSS is a UNIX based server that provides data
the Integrated Services Digital Network (ISDN) tics Server storage for statistics data. It allows for SystemWide
that controls how the ISDN network is managed. (SSS) reporting functions to be stored.
SSS See System Statistics Server. T1 Digital carrier facility used for transmission of data
through the telephone hierarchy. T1 links are
Static Cipher Key used for encryption between subscribers and mostly used in the US and Japan. E1 links are used
Key EBTS base radio. in most other countries. Both T1 and E1 are
composed of DS0s, the basic 64 Kbps path that
makes up these links.
Static Cipher A key used to provide over-the-air encryption
Key-Trunked services for mobile stations operating in a trunking
Mode Operation mode. All MSs and EBTS site equipment within Talkgroup A group of radio users that can share calls and
Key the radio system share a unique SCK-TMO key. messages as a group. Normally a talkgroup is
A static cipher key is imported or typed into the comprised of users who normally have a need to
Authentication Center (AuC) and is distributed to communicate with each other.
all base radio controllers using its zone key
encryption key (KEKz). TalkGroup Scan A feature that allows a Mobile Station to scan those
talkgroups that have an affiliated member at the
STM System Timer Module. This CEB module controls scanning radio’s site. The Talkgroup Scan list(s)
the timing signals for data and audio processing. must be programmed in the radio.
Talkgroup site The Zone Manager can limit access by talkgroups TG See Talkgroup.
access to specific sites and the controller rejects call
requests on non-designated sites. Emergency calls TIA Telecommunications Industries Association.
can access any site.
Task work win- An interactive window that allows dispatchers to Time slot Four communication channels per TETRA carrier
dow enter information into the RCM database. form the TETRA time slot.
TCP/IP Transmission Control Protocol / Internet Protocol. TLAN Transitional Local Area Network.
TDMA See Time Division Multiple Access. TMI Tetra Management Identity.
TEA1/TEA2 TETRA Encryption Algorithms. Top of queue A method of acquiring a channel for an emergency
call by transmission trunking calls with the lowest
TEI
priority. When a call ends, the controller assigns the
Tetra Equipment Identity.
available channel to the emergency call.
TEK Traffic Encryption Key or Traffic Key. An Traffic Channel Traffic channels are logical channels used to carry
encryption key used for voice and data.
user data over the air interface. Traffic channels
may be assigned to carry speech or packet data.
Telephone Inter- A call feature that provides subscriber access to the Each Base radio in and EBTS supports up to 4
connect Public Switched Telephone Network (PSTN). traffic channels.
Telephone interconnect can be used for both land-
to-mobile calls and mobile-to-land calls. Traffic Packet Term used to describe the voice signal sent between
the EBTS and a Mobile Station.
Telephone Inter- Dimetra master site equipment providing a
connect Gate- computer telephony-based Telephone Interconnect
way Trak 9100 A system providing ultra-stable frequency time and
Gateway function providing easy adaptation of
reference signals, referenced to the GPS satelite
current and new analogue and digital line
system.
interfaces.
Transmission Trunking application that requires radios in a Unique Key A key used by the key variable loader (KVL)
Trunking talkgroup to return to the control channel and Encryption Key device to communicate with other secure devices.
receive a new channel assignment after each Push- This UKEK key is used for secure communications
To-Talk (PTT). between the PrC and KVL.
An encryption key used solely to encrypt traffic
Truncate
keys targeted for an individual secure entity.
To shorten or cut off. For example, if a voice
transmission is truncated, the receiving radios do
not hear part of the message. Uplink The radio frequency communications path from the
Mobile Station to the EBTS. Also referred to as the
Trunking
EBTS receive path.
The automatic and dynamic sharing of a small
number of communication channels between a
large number of radio users. UPS Uninterruptable Power Supply. Highly
recommended to supplement the standard battery
TSC
backup in the fault tolerant Zone Controller and for
TETRA Site Controller, see Site Controller.
network management computer devices.
TSI Tetra Subscriber Identity. User There are three types of users in an Dimetra
system: individual radio users, console operators,
TX Transmitter. and manager users (administrators and maintainers
of the system).
UCM See User Configuration Server.
User Configura- A network management entity that is used for
tion Manager configuration and distribution of system-wide
UCS See User Configuration Subsystem.
parameters in a Dimetra IP system. There is one
UCS for the entire system.
UDP User Data Protocol. The UCS delivers system-level configuration
information to the Authentication Centre (AuC).
UKEK
The AuC utilizes the configuration information to
See Unique Key Encryption Key.
perform key management operations such as
delivering keys to new system entities.
Unannounced This type of cell re-selection occurs during a call The UCS stores a copy of all authentication
Cell Re-selec- when the Mobile Station (MS) suddenly loses cell material (RS, KS, and KS') distributed by the AuC.
tion coverage before it has found an alternative cell.
The MS has no time to inform the serving cell that User Configura- A Motorola software application that is used to
it is about to change cell and so simply scans for an tion Server configure user parametres.
alternative cell, registers with the new cell, if
necessary, and attempts to reconnect the call. This
results in a break in communication which can be User Configura- The network database that stores information on
several seconds. tion Subsystem system users. Information in the UCS is propagated
(UCS) to each zone. User information has to be configured
Undeclared Cell This type of cell re-selection occurs when the
in the UCS and is then propagated to each zone so
Re-selection the same database is present throughout the system.
Mobile Station (MS) is outside a call and is idle.
When an MS then decides that a better cell is
available and hence wants to change cell, it will User Configura- The UCS database server allows the system
then switch to the new cell and register itself. The tion Subsystem administrator to configure subscribes, talkgroups,
change-over will be very fast (less than 500 Database Serversome channel information and system level
milliseconds) as the MS need not to synchronise or parameters, and security information. There is only
search for any new cell as this already has been one UCS per system. See Network Time Protocol
done while still on the ‘old’ cell. (NTP).
Unicast Traffic IP traffic that requires one-to-one communication User ID or Radio ID, sent to receiving Mobile Stations
for each source-destination pair. This means that (MSs) at start of transmission.
multiple identical packets must be transmitted to
send the same information to many destinations. User station A terminal with a monitor, keyboard, and mouse.
(terminal) Provides a user interface to the Dimetra
applications and database via the Ethernet network.
Virtual Local A technology that allows the formation of Virtual ZMS Zone Master Site.
Area Network Ethernet segments and subnets according to
(VLAN) business needs, not cabling needs. Zone 1) A geographical region covered by a Dimetra
system. The zone design comprises sites to allow
Visited network A network where a subscriber has an indirect intra-zone communications and roaming between
subscription. This means that a valid subscriber sites/subsystems within a zone.
identity is only allocated as part of the first network 2) The equipment (Network Management, Data
access. Management, Networking, Switching,
Infrastructure, i.e. SwMi) that forms the central
Visitor Location The entity that is used to manage a local copy of
part of a Dimetra radio communications system
Register with interfaces to air, telephone and other
zone specific information for individuals and
(VLR) zones/radio systems.
TalkGroups. This includes subscriber database
information as well as site location information for
both the individual and the TalkGroup. There is a Zone Ambassa- Interfaces Embassy Switch with Zone Controller.
VLR associated with each zone in the system. dor Interface A Board that acts as an interface between the
Board Ambassador Electronics Bank (AEB) and the Zone
(ZAMBI) Controller.
VLAN See Virtual Local Area Network.
Voice Channel When a call request is made by Mobile Stations the Zone Configura- A Motorola software application that is used to
system will assign a voice channel for the call. tion Manager configure zone parametres.
Mobile Stations are informed of the assigned
channel and are then permitted to transmit and
receive speech on that channel. Zone Controller Dimetra master site equipment providing very fast
call control for group communication in a wide-
WAN
area network. The Zone Controller supports Packet
See Wide Area Network.
Data, Short Data, and Status.
Wide-area call A call using a channel resource at all sites in a Zone Database Each zone in the Dimetra system has one ZDS. The
wide-area system. Server ZDS stores a replicated copy of the User
(ZDS) Configuration Database. The ZDS is the host for
Wide Area Net- A transport network that delivers communications Zone Configuration Manager. In addition the ZDS
work between two geographically separated areas. collects status and fault information for objects in
(WAN) its zone.
X.21 ITU-T Standard for n × 64 kbps link presentation. Zone Level Trunking operation is limited to the coverage area
Trunking of one single Dimetra system.
XCDR Transcoder, see Transcoder.
Zone Link Multi- Zone SLM. Used in Releases prior to 5.0. The ZLM
ZAMBI See Zone Ambassador Interface Board. plexer ensures inter-zone connectivity. The ZLM is based
upon the Zhone (Premisys) IMACS platform.
ZC See Zone Controller.
Zone Manager A network management product allowing
(ZM) configuration of the Dimetra system and system
ZCM See Zone Configuration Manager. management activities. The Zone Manager
interfaces the Zone Controller for software
ZDS See Zone Database Server. functions and database access.
Zeroize To erase information, specifically, to write 0s to Zone Master A Master Site containing a set of zone control
memory. Site equipment (e.g. Zone Controller, AEB, etc.)
comprising a single zone.
Zone Statistics The ZSS is a UNIX based server that provides data
Server storage for statistics data. Each zone contains one
(ZSS) ZSS for statistics that should be stored locally.
IIndex
A D
access menus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2 Database Administration. . . . . . . . . . . . . . . . . . . . . . . . 3-34
accessing the Audit Trail . . . . . . . . . . . . . . . . . . . 3-31, 3-32 Database Backup
Add KVL Interface Reference . . . . . . . . . . . . . . . . . . . . . . . . . 4-33
Interface Reference . . . . . . . . . . . . . . . . . . . . . . . . .4-25 procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-34
Add User default login values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
Interface Reference . . . . . . . . . . . . . . . . . . . . . . . . .4-30 Deleting
Adding a KVL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-23
a KVL. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-22 a Mobile Station . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-15
a Mobile Station . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-13 MS Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-16
a user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6 users from the PrC database . . . . . . . . . . . . . . . . . . . 3-7
MS Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-16 Denying Access to a KVL . . . . . . . . . . . . . . . . . . . . . . 3-24
Administering
Audit Trails . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-31
the PrC database. . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-34 E
Administering and Setting Up Keys . . . . . . . . . . . . . . . 3-22 Editing
Allowing Access to a KVL . . . . . . . . . . . . . . . . . . . . . . 3-25 a Mobile Station . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-14
Assign UKEK Encryption Devices
Interface Reference . . . . . . . . . . . . . . . . . . . . . . . . .4-27 Interface Reference . . . . . . . . . . . . . . . . . . . . . . . . . 4-34
Assigning a UKEK to a KVL. . . . . . . . . . . . . . . . . . . . . 3-25 Entering KVL Information . . . . . . . . . . . . . . . . . . . . . . 3-22
Audit Trail Events
accessing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-31, 3-32 moving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-32
administering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-31 sorting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5
creating. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-31 Events and Audit Trails
purging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-32 interface reference . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2
Auto-Generating K Keys . . . . . . . . . . . . . . . . . . . . . . . .3-26 Events Pane . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5
Exporting
B K-Refs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-19
MS Information to File . . . . . . . . . . . . . . . . . . . . . . 3-30
Backing up the database. . . . . . . . . . . . . . . . . . . . . . . . . 3-34
F
C
Finding MSs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-18
Changing
password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
the PrC ID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-24 G
Changing Another User’s Account Password . . . . . . . . . 3-5 Generating Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-30
Changing Operational State . . . . . . . . . . . . . . . . . . . . . . 3-12 Go Operational . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-35
Content Selection Tabs . . . . . . . . . . . . . . . . . . . . . . . . . .2-5 Go Out of Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-35
Creating an Audit Trail . . . . . . . . . . . . . . . . . . . . . . . . .3-31
I L
Icons Loading a Master Key. . . . . . . . . . . . . . . . . . . . . . . . . . . 3-8
Shortcut Bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-4 Logging into the PrC Client . . . . . . . . . . . . . . . . . . . . . . 3-2
Status Bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-3 login
Importing defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
K keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-20 password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
Keys from a File. . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-20 user name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
SCK-TMO keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-20
Interface Reference . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-1
Add KVL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-25 M
Add User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-30 Managing Mobile Stations . . . . . . . . . . . . . . . . . . . . . . 3-13
Database Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-33 Manually
Encryption Devices . . . . . . . . . . . . . . . . . . . . . . . . .4-34 Entering a K Key . . . . . . . . . . . . . . . . . . . . . . . . . . 3-27
Events and Audit Trail . . . . . . . . . . . . . . . . . . . . . . . .4-2 Entering an SCK-TMO Key . . . . . . . . . . . . . . . . . . 3-28
Key Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-15 Master Key
KVL Port Settings . . . . . . . . . . . . . . . . . . . . . . . . . . 4-23 invalid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-11
KVLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-22 loading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-8
Mobile Station Search Form . . . . . . . . . . . . . . . . . . .4-6 reloading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-11
Mobile Stations Window . . . . . . . . . . . . . . . . . . . . . . 4-6 menu access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2
Modify KVL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-26 Menu Bar
User Management . . . . . . . . . . . . . . . . . . . . . . . . . . 4-28 menus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3
submenus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3
K Miscellaneous settings . . . . . . . . . . . . . . . . . . . . . . . . . 4-24
Mobile Stations
Key Database adding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-13
Interface Reference . . . . . . . . . . . . . . . . . . . . . . . . .4-15 deleting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-15
keyboard shortcuts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2 editing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-14
keys managing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-13
administering and setting up . . . . . . . . . . . . . . . . . .3-22 Results of Search . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8
auto-generating . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-26 searching for . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-17
entering K keys manually . . . . . . . . . . . . . . . . . . . . 3-27 Mobile Stations Window . . . . . . . . . . . . . . . . . . . . . . . . 4-6
entering SCK-TMO keys manually . . . . . . . . . . . . .3-28 Modify KVL
importing from a file . . . . . . . . . . . . . . . . . . . . . . . .3-20 Interface Reference . . . . . . . . . . . . . . . . . . . . . . . . . 4-26
loading a master key . . . . . . . . . . . . . . . . . . . . . . . . .3-8 Modifying
reloading a master key . . . . . . . . . . . . . . . . . . . . . . . 3-11 a KVL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-23
setting up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-22 modifying a user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6
K-Refs MS Groups
exporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-19 adding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-16
KVL Port Settings deleting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-16
Interface Reference . . . . . . . . . . . . . . . . . . . . . . . . .4-23 modifying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-16
KVLs MS Information
adding. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-22 exporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-30
allowing access to . . . . . . . . . . . . . . . . . . . . . . . . . . 3-25 MS Provisioning Status. . . . . . . . . . . . . . . . . . . . . . . . . 3-17
assigning a UKEK to . . . . . . . . . . . . . . . . . . . . . . . . 3-25 MS Search Form . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-17
deleting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-23 examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-17
denying access to . . . . . . . . . . . . . . . . . . . . . . . . . . .3-24 MSs
entering information. . . . . . . . . . . . . . . . . . . . . . . . . 3-22 finding unprovisioned . . . . . . . . . . . . . . . . . . . . . . . 3-18
Interface Reference . . . . . . . . . . . . . . . . . . . . . . . . .4-22 Provisioning Statuses . . . . . . . . . . . . . . . . . . . . . . . 3-18
modifying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-23 Search Form Examples . . . . . . . . . . . . . . . . . . . . . . 3-18
P icons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3
submenus. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3
password
changing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-4
changing another user’s . . . . . . . . . . . . . . . . . . . . . . . 3-5 T
default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-2
The Role of the PrC Application . . . . . . . . . . . . . . . . . . 1-3
default user. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
transferring K-Refs to AuC. . . . . . . . . . . . . . . . . . . . . . 3-19
expired . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-2
new user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-2
requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4, 3-5 U
Permissions
Provisioning Management . . . . . . . . . . . . . . . 3-31, 3-32 UKEK
User Management . . . . . . . . . . . . . . . . . . . . . . . 3-5, 3-6 assigning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-25
PrC User Management
accessing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1 Interface Reference . . . . . . . . . . . . . . . . . . . . . . . . . 4-28
login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-2 permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-5, 3-6
main client window . . . . . . . . . . . . . . . . . . . . . . . . . .2-2 users
main functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3 adding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6
main windows elements . . . . . . . . . . . . . . . . . . . . . . . 2-1 deleting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6
menu bar. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-2 modifying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6
role of . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3 Using the MS Search Form. . . . . . . . . . . . . . . . . . . . . . 3-17
start up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-1
starting the client . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1 W
PrC Client. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3
PrC ID windows elements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1
changing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-24 Work Area Tabs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5
PrC Procedures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1 Work Pane. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5
PrC Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-3 Work Pane Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5
PrC shutting down . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-8
Purging Data from the Audit Trail . . . . . . . . . . . . . . . . .3-32
R
reloading a master key . . . . . . . . . . . . . . . . . . . . . . . . . . 3-11
Removing Events from the Events Display . . . . . . . . . .3-32
reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-30
Requirements
passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4, 3-5
S
search form. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-17
self-deletion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-7
Service
Go Operational. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-35
Go Out of Service . . . . . . . . . . . . . . . . . . . . . . . . . . 4-35
Setting up keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-22
Shortcut Bar
icons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-4
Shutting Down the Application . . . . . . . . . . . . . . . . . . . . 3-8
sorting events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-5
starting the PrC client. . . . . . . . . . . . . . . . . . . . . . . . . . . .3-1
Status Bar
The ERSC Customer Information Desk is available through the following Service Numbers:
Request for help in identification of non-referenced spare parts should be directed to the Customer Care
Organization of Motorola’s local area representation. Orders for replacement parts, kits and assemblies should be
placed directly on Motorola’s local distribution organization or via the Extranet site Motorola Online at
http://moleurope.comm.mot.com.
Information related to support and service of Motorola Test Equipment is available via the Extranet site Motorola
Online at http://moleurope.comm.mot.com, through the Customer Care Organization of Motorola’s local area
representation or by calling the Motorola switchboard in Germany at +49 6128 700.