Motorola solutions KVL 4000 User manual

ASTRO®25
INTEGRATED VOICE AND DATA
KVL 400
KEY VARIABLE LOADER
ADVANCED SECURENET
USER GUIDE
January 2013
*6871018P35*
6871018P35-F
© 2013 Motorola Solutions, Inc. All rights reserved


Copyrights
TheMotorolaproductsdescribedinthisdocumentmayincludecopyrightedMotorolacomputerprograms.Laws
intheUnitedStatesandothercountriespreserveforMotorolacertainexclusiverightsforcopyrightedcomputer
programs.Accordingly,anycopyrightedMotorolacomputerprogramscontainedintheMotorolaproductsdescribed
inthisdocumentmaynotbecopiedorreproducedinanymannerwithouttheexpresswrittenpermissionofMotorola.
©2013MotorolaSolutions,Inc.AllRightsReserved
Nopartofthisdocumentmaybereproduced,transmitted,storedinaretrievalsystem,ortranslatedintoanylanguage
orcomputerlanguage,inanyformorbyanymeans,withoutthepriorwrittenpermissionofMotorolaSolutions,Inc.
Furthermore,thepurchaseofMotorolaproductsshallnotbedeemedtogranteitherdirectlyorbyimplication,
estoppelorotherwise,anylicenseunderthecopyrights,patentsorpatentapplicationsofMotorola,exceptforthe
normalnonexclusive,royalty-freelicensetousethatarisesbyoperationoflawinthesaleofaproduct.
Disclaimer
Pleasenotethatcertainfeatures,facilities,andcapabilitiesdescribedinthisdocumentmaynotbeapplicableto
orlicensedforuseonaparticularsystem,ormaybedependentuponthecharacteristicsofaparticularmobile
subscriberunitorcongurationofcertainparameters.PleaserefertoyourMotorolacontactforfurtherinformation.
Trademarks
MOTOROLA,MOTO,MOTOROLASOLUTIONS,andtheStylizedMLogoaretrademarksorregistered
trademarksofMotorolaTrademarkHoldings,LLCandareusedunderlicense.Allothertrademarksaretheproperty
oftheirrespectiveowners.
EuropeanUnion(EU)WasteofElectricalandElectronicEquipment
(WEEE)directive
TheEuropeanUnion'sWEEEdirectiverequiresthatproductssoldintoEUcountriesmusthavethecrossedout
trashbinlabelontheproduct(orthepackageinsomecases).
AsdenedbytheWEEEdirective,thiscross-outtrashbinlabelmeansthatcustomersandend-usersinEUcountries
shouldnotdisposeofelectronicandelectricalequipmentoraccessoriesinhouseholdwaste.
Customersorend-usersinEUcountriesshouldcontacttheirlocalequipmentsupplierrepresentativeorservice
centreforinformationaboutthewastecollectionsystemintheircountry.
i


DocumentHistory
VersionDescriptionDate
6871018P35-AOriginalreleaseoftheKVL4000KeyV ariable
LoaderAdvancedSECURENETUserGuide
May2010
6871018P35-BUpdatedasfollows:
•Addedthefollowingsections:
–“PerformingtheOSHardening”
–“UnlockingtheOperatorAccount”
–“SettingthePDAUSBMode”
–“KVL4000DisasterRecovery”
–“RadioFrequencyInterference
Requirements-EuropeanUnion-EMC
Directive2004/108/EC”
•UpdatedFigure1-11KVL4000-Charging.
•UpdatedtoincludetheRadioAuthentication
operatingmode.
November2010
6871018P35-CUpdatedasfollows:
•Changed“Motorola,Inc.”to“Motorola
Solutions,Inc.”
•Changeddocumentlayout.
July2011
6871018P35-DAdded/updatedthefollowingsections:
•“MOTOROLASOLUTIONS,INC.END
USERLICENSEAGREEMENT”
•“PUBLICLYA V AILABLESOFTW ARE
LIST–KVLSOFTW AREINSTALLA TION
WIZARD”
•“PUBLICLYA V AILABLESOFTW ARE
LIST–PDA”
•“PersonalDigitalAssistant”
•“ApplyingEnhancedSecuritySettings
ThroughtheKVLSoftwareInstallation
Wizard”
•“ApplyingTransparentSecuritySettings
ThroughtheKVLSoftwareInstallation
Wizard”
•“ConnectingtheKVLtoaRadioorAnother
TargetDevice”
•“LaunchingtheKVLApplication”
•“SettingUpPasswordsontheKVL”
March2012
iii

KVL4000KeyVariableLoaderAdvancedSECURENETUserGuide
VersionDescriptionDate
•“SelectingthePasswordMaskingMode”
•“ManagingEncryptionKeys”
•“LoadingKeysintoTargetDevices”
•“KVL4000DisasterRecovery”
•“TroubleshootingKVLApplicationand/or
VPNSoftwareFailure”
•“MotorolaSystemSupportCenterandRadio
SupportCenter”
•“NorthAmericaPartsOrganization”
•“KVL4000–OrderableParts”
Updatedthefollowinggures:
•Figure1-1KVL4000KeyV ariableLoader
•Figure1-2PersonalDigitalAssistant(PDA)
•Figure1-12TodayScreen
6871018P35-EUpdatedthefollowingsections:
•“PersonalDigitalAssistant”
•“ApplyingEnhancedSecuritySettings
ThroughtheKVLSoftwareInstallation
Wizard”
•“ApplyingTransparentSecuritySettings
ThroughtheKVLSoftwareInstallation
Wizard”
•“LaunchingtheKVLApplication”
•“ExitingtheKVLApplication”
•“EnteringtheUser-DenedSystemKey”
•“ChangingtheUser-DenedSystemKey”
•“SettingUptheKVLtoUsetheDefault
SystemKey”
•“SettingthePDAUSBMode”
Updatedthefollowinggures:
•Figure1-2PersonalDigitalAssistant(PDA)
•Figure1-11TodayScreen
November2012
6871018P35-FUpdatedthefollowingsections:
•“ApplyingEnhancedSecuritySettings
ThroughtheKVLSoftwareInstallation
Wizard”
January2013
iv

DocumentHistory
VersionDescriptionDate
•“ApplyingTransparentSecuritySettings
ThroughtheKVLSoftwareInstallation
Wizard”
•“ExitingtheKVLApplication”
v


Contents
1Introduction..............................................................................................................................................1-1
1.1MC55A0PDAReference...................................................................................................................1-1
1.2OverviewoftheKVL4000................................................................................................................1-1
1.2.1KVL4000Components............................................................................................................1-1
1.2.1.1PersonalDigitalAssistant...................................................................................................1-2
1.2.1.2SecurityAdapter...............................................................................................................1-4
1.2.2KVL4000–KeyFeatures.........................................................................................................1-6
1.2.3KVL4000Sounds...................................................................................................................1-7
1.2.4UsingtheKVL4000................................................................................................................1-7
1.2.4.1TypesofKeys..................................................................................................................1-7
1.2.4.2EnteringandLoadingKeys–Overview................................................................................1-7
1.3KVLUserInterface...........................................................................................................................1-8
1.4GettingStarted.................................................................................................................................1-8
1.4.1ApplyingEnhancedSecuritySettingsThroughtheKVLSoftwareInstallationWizard..........................1-9
1.4.2ApplyingTransparentSecuritySettingsThroughtheKVLSoftwareInstallationWizard.....................1-11
1.4.3ConnectingthePDAandtheSecurityAdapter............................................................................1-12
1.4.4ConnectingtheKVLtoaTargetDevice.....................................................................................1-13
1.4.4.1ConnectingtheKVLtoaRadioorAnotherTargetDevice......................................................1-13
1.4.4.2ConnectingTwoKVLUnits..............................................................................................1-15
1.4.5ChargingtheKVL4000..........................................................................................................1-15
1.4.6LaunchingtheKVLApplication...............................................................................................1-16
1.4.7ExitingtheKVLApplication...................................................................................................1-19
2KVL4000–PerformingInitialProgramming..................................................................................................2-1
2.1KVL4000UserPreferenceParameters.................................................................................................2-1
2.1.1SettingtheKVLLogOffTime...................................................................................................2-1
2.1.2SettingtheKVLScreenColorScheme........................................................................................2-1
2.1.3TurningSharingOn/Off............................................................................................................2-3
2.1.4ManagingPasswords................................................................................................................2-3
2.1.4.1SettingUpPasswordsontheKVL.......................................................................................2-4
2.1.4.1.1SettingUptheOperatorPassword...............................................................................2-4
2.1.4.1.2SettingUptheAdministratorPassword........................................................................2-5
2.1.4.2ChangingPasswordsontheKVL.........................................................................................2-6
2.1.4.2.1ChangingtheOperatorPassword(OperatorAccessLevel)...............................................2-6
2.1.4.2.2ChangingtheOperatorPassword(AdministratorAccessLevel)........................................2-7
2.1.4.2.3ChangingtheAdministratorPassword.........................................................................2-8
2.1.4.3ClearingKVLPasswords.................................................................................................2-10
2.1.4.4SelectingthePasswordMaskingMode...............................................................................2-11
2.2KVL4000System-DependentParameters...........................................................................................2-11
2.2.1KVL4000–SwitchingBetweentheModesofOperation..............................................................2-11
2.2.2SettingtheBaudRateforRS-232Communication.......................................................................2-12
2.2.3ChangingtheFIPSMode........................................................................................................2-13
2.2.4ManagingtheSystemKey(DVI-XLOnly).................................................................................2-14
2.2.4.1EnteringtheUser-DenedSystemKey...............................................................................2-15
2.2.4.2ChangingtheUser-DenedSystemKey..............................................................................2-15
2.2.4.3SettingUptheKVLtoUsetheDefaultSystemKey..............................................................2-16
3ManagingEncryptionKeys..........................................................................................................................3-1
3.1EnteringEncryptionKeysManually.....................................................................................................3-1
3.2Auto-GeneratingEncryptionKeys.......................................................................................................3-2
3.3UsingMacros...................................................................................................................................3-4
3.3.1CreatingaMacro.....................................................................................................................3-4
3.4EditingKeys....................................................................................................................................3-8
3.5DeletingKeys................................................................................................................................3-10
vii

KVL4000KeyVariableLoaderAdvancedSECURENETUserGuide
4LoadingKeysintoTargetDevices.................................................................................................................4-1
4.1LoadingTrafcKeys.........................................................................................................................4-1
4.2LoadingShadowKeys.......................................................................................................................4-4
4.3LoadingaMacro..............................................................................................................................4-7
5ManagingKeysinTargetDevices.................................................................................................................5-1
5.1RemovingKeysfromTargetDevices....................................................................................................5-1
5.1.1RemovingTrafcKeysfromaTargetDevice................................................................................5-1
5.1.2RemovingShadowKeysfromaTargetDevice..............................................................................5-3
6SharingKeysBetweenKVLs.......................................................................................................................6-1
6.1SharingaSingleKey.........................................................................................................................6-1
6.2SharingaMacroandAssociatedKeys..................................................................................................6-3
6.3SharingAllKeysandAllMacros.........................................................................................................6-4
7ManagingLogRecords...............................................................................................................................7-1
7.1OrganizationofLogRecords..............................................................................................................7-1
7.2AccessingLogRecords......................................................................................................................7-1
7.3ClearingLogRecords........................................................................................................................7-2
7.4ExportingLogRecordstoaPC...........................................................................................................7-4
8ConvertingEncryptionKeys........................................................................................................................8-1
8.1WhentoConvertKeys.......................................................................................................................8-1
8.2KeyConvertingRestrictionsandGuidelines..........................................................................................8-1
8.3ConvertingaKeyfromASNtoASTRO25...........................................................................................8-1
8.4ConvertingaKeyfromASTRO25toASN...........................................................................................8-4
9Troubleshooting.........................................................................................................................................9-1
9.1ErrorMessages.................................................................................................................................9-1
9.1.1UserEntryErrors....................................................................................................................9-1
9.1.2OperationalErrors...................................................................................................................9-2
9.2PerformingaSystemReset.................................................................................................................9-4
9.3UnlockingtheOperatorAccount..........................................................................................................9-5
9.4SettingthePDAUSBMode................................................................................................................9-5
9.5KVL4000DisasterRecovery..............................................................................................................9-5
9.6TroubleshootingKVLApplicationand/orVPNSoftwareFailure...............................................................9-6
9.7DisassemblingtheSecurityAdapter.....................................................................................................9-6
9.8AssemblingtheSecurityAdapter.........................................................................................................9-8
9.9ContactingMotorola.......................................................................................................................9-13
9.9.1MotorolaSystemSupportCenterandRadioSupportCenter..........................................................9-14
9.9.2NorthAmericaPartsOrganization............................................................................................9-14
AppendixAKVL4000–PerformanceSpecications.........................................................................................A-1
AppendixBKVL4000–OrderableParts........................................................................................................B-1
AppendixCRadioFrequencyInterferenceRequirements....................................................................................C-1
C.1RadioFrequencyInterferenceRequirements–USA...............................................................................C-1
C.2RadioFrequencyInterferenceRequirements–Canada...........................................................................C-1
C.3RadioFrequencyInterferenceRequirements–EuropeanUnion–EMCDirective2004/108/EC.....................C-1
AppendixDAcronyms.................................................................................................................................D-1
viii

ListofFigures
Figure1-1KVL4000KeyV ariableLoader...................................................................................................1-2
Figure1-2PersonalDigitalAssistant(PDA).................................................................................................1-3
Figure1-3SecurityAdapter–PortsandInterfaces.........................................................................................1-5
Figure1-4KVLMainScreen.....................................................................................................................1-8
Figure1-5PDAandPC–Connected.........................................................................................................1-10
Figure1-6PDAandSecurityAdapter–Connecting.....................................................................................1-12
Figure1-7PDAandSecurityAdapter–Connected......................................................................................1-13
Figure1-8KVLandRadios–Connected(Example).....................................................................................1-14
Figure1-9TwoKVLUnits–Connected.....................................................................................................1-15
Figure1-10KVL4000-Charging..............................................................................................................1-16
Figure1-11TodayScreen..........................................................................................................................1-17
Figure1-12WelcomeScreen.....................................................................................................................1-18
Figure1-13ExitScreen............................................................................................................................1-20
Figure1-14LogOffScreen.......................................................................................................................1-20
Figure2-1KVLScreeninDayTimeColorScheme(Example).........................................................................2-2
Figure2-2KVLScreeninNightTimeColorScheme(Example).......................................................................2-2
Figure2-3ClearPasswordsScreen............................................................................................................2-10
Figure3-1ManageKeysScreen–EnteringaKey(Example)...........................................................................3-1
Figure3-2ManageKeysScreen–EnteringaKey(Example)...........................................................................3-3
Figure3-3MacrosScreen–CreatingaMacro(Example)................................................................................3-5
Figure3-4SlotOffsetScreen.....................................................................................................................3-6
Figure3-5SlotScreen–Example...............................................................................................................3-7
Figure3-6ManageKeysScreen–ModifyingaKey(Example)........................................................................3-8
Figure3-7KeyDetailsScreen–Example.....................................................................................................3-9
Figure3-8EnterKeyScreen–Example.....................................................................................................3-10
Figure3-9ManageKeysScreen–DeletingaKey(Example).........................................................................3-11
Figure4-1LoadKeysScreen–LoadingaTrafcKey(Example)......................................................................4-2
Figure4-2PIDEntryScreen–Example.......................................................................................................4-3
Figure4-3TrafcKeyLoaded–Example.....................................................................................................4-4
Figure4-4LoadKeysScreen–LoadingaShadowKey(Example)....................................................................4-5
Figure4-5LoadShadowKeyScreen–Example............................................................................................4-6
Figure4-6ShadowKeyLoaded–Example...................................................................................................4-7
Figure4-7LoadMacrosScreen–Example...................................................................................................4-8
Figure5-1RemoveKeysScreen.................................................................................................................5-1
Figure5-2RemoveTrafcKeyScreen.........................................................................................................5-2
Figure5-3RemoveKeysScreen–RemovingaShadowKey............................................................................5-3
Figure5-4RemoveCSKScreen.................................................................................................................5-4
Figure6-1LoadKeysScreen–SharingaKey(Example)................................................................................6-2
Figure6-2LoadMacrosScreen–SharingaMacro(Example)..........................................................................6-3
Figure7-1OperationsLog(Example)..........................................................................................................7-2
Figure7-2OperationsLog–Clear(Example)................................................................................................7-3
Figure7-3ClearingLogs–ConrmationScreen............................................................................................7-4
Figure8-1ManageKeysScreen–ConvertingASNKey(Example)..................................................................8-2
Figure8-2ConvertingtoASTRO25(Example).............................................................................................8-3
Figure8-3ManageKeysScreen–ConvertingASTRO25Key(Example)..........................................................8-4
Figure8-4ConvertingtoASN(Example).....................................................................................................8-5
Figure9-1KVLSystemResetSlider–SubsequentStates................................................................................9-4
Figure9-2SecurityAdapter–ExplodedView...............................................................................................9-6
Figure9-3RemovingBackHousing............................................................................................................9-7
Figure9-4RemovingDustCovers...............................................................................................................9-7
Figure9-5RemovingPCBAssembly...........................................................................................................9-8
Figure9-6RemovingUSBClipandFoamPad..............................................................................................9-8
ix

KVL4000KeyVariableLoaderAdvancedSECURENETUserGuide
Figure9-7AssemblingUSBClip................................................................................................................9-9
Figure9-8AssemblingFoamPad................................................................................................................9-9
Figure9-9AssemblingO-Ring.................................................................................................................9-10
Figure9-10AssemblingFrontHousing–PCB..............................................................................................9-10
Figure9-11AssemblingFrontHousing–Connectors.....................................................................................9-11
Figure9-12AssemblingFrontHousing–PCBPlaced....................................................................................9-11
Figure9-13AssemblingDustCovers..........................................................................................................9-12
Figure9-14AssemblingBackHousingtoFrontHousing................................................................................9-12
Figure9-15TighteningBackHousing.........................................................................................................9-13
Figure9-16PressingDustCovers...............................................................................................................9-13
x

ListofTables
Table1-1PDAControlsandPortsUsedintheKVLOperation........................................................................1-3
Table1-2SecurityAdapterPortsandInterfaces............................................................................................1-5
Table1-3SoundsPlayedbytheKVL4000..................................................................................................1-7
Table9-1UserEntryErrors......................................................................................................................9-1
Table9-2OperationalErrors.....................................................................................................................9-3
Table9-3KVL4000DisasterRecovery......................................................................................................9-5
Table9-4NorthAmericaPartsOrganizationTelephoneNumbers..................................................................9-14
TableA-1PhysicalCharacteristics.............................................................................................................A-1
TableA-2Encryption..............................................................................................................................A-1
TableA-3SupportedAlgorithms...............................................................................................................A-1
TableA-4ElectromagneticCompatibility....................................................................................................A-2
TableA-5RegulatoryComplianceandApprovals.........................................................................................A-2
TableB-1KVL4000Model.....................................................................................................................B-1
TableB-2MC55Kit...............................................................................................................................B-1
TableB-3SecurityAdapterSuperTanapa...................................................................................................B-1
TableB-4FrontHousingAssembly–OrderableParts...................................................................................B-1
TableB-5InterfaceCables.......................................................................................................................B-2
TableB-6OptionalAccessories................................................................................................................B-2
TableD-1Acronyms...............................................................................................................................D-1
xi


ListofProcedures
1.4.1—ApplyingEnhancedSecuritySettingsThroughtheKVLSoftwareInstallationWizard.............................................1-9
1.4.2—ApplyingTransparentSecuritySettingsThroughtheKVLSoftwareInstallationWizard........................................1-11
1.4.3—ConnectingthePDAandtheSecurityAdapter..........................................................................................................1-12
1.4.4.1—ConnectingtheKVLtoaRadioorAnotherTargetDevice.....................................................................................1-13
1.4.4.2—ConnectingTwoKVLUnits....................................................................................................................................1-15
1.4.5—ChargingtheKVL4000..............................................................................................................................................1-15
1.4.6—LaunchingtheKVLApplication................................................................................................................................1-16
1.4.7—ExitingtheKVLApplication......................................................................................................................................1-19
2.1.1—SettingtheKVLLogOffTime.....................................................................................................................................2-1
2.1.2—SettingtheKVLScreenColorScheme........................................................................................................................2-1
2.1.3—TurningSharingOn/Off................................................................................................................................................2-3
2.1.4.1.1—SettingUptheOperatorPassword..........................................................................................................................2-4
2.1.4.1.2—SettingUptheAdministratorPassword..................................................................................................................2-5
2.1.4.2.1—ChangingtheOperatorPassword(OperatorAccessLevel)...................................................................................2-6
2.1.4.2.2—ChangingtheOperatorPassword(AdministratorAccessLevel)...........................................................................2-7
2.1.4.2.3—ChangingtheAdministratorPassword...................................................................................................................2-8
2.1.4.3—ClearingKVLPasswords.........................................................................................................................................2-10
2.1.4.4—SelectingthePasswordMaskingMode...................................................................................................................2-11
2.2.1—KVL4000–SwitchingBetweentheModesofOperation.........................................................................................2-11
2.2.2—SettingtheBaudRateforRS-232Communication....................................................................................................2-12
2.2.3—ChangingtheFIPSMode............................................................................................................................................2-13
2.2.4.1—EnteringtheUser-DenedSystemKey...................................................................................................................2-15
2.2.4.2—ChangingtheUser-DenedSystemKey.................................................................................................................2-15
2.2.4.3—SettingUptheKVLtoUsetheDefaultSystemKey...............................................................................................2-16
3.1—EnteringEncryptionKeysManually...............................................................................................................................3-1
3.2—Auto-GeneratingEncryptionKeys..................................................................................................................................3-2
3.3.1—CreatingaMacro...........................................................................................................................................................3-4
3.4—EditingKeys....................................................................................................................................................................3-8
3.5—DeletingKeys.................................................................................................................................................................3-10
4.1—LoadingTrafcKeys.......................................................................................................................................................4-1
4.2—LoadingShadowKeys.....................................................................................................................................................4-4
4.3—LoadingaMacro..............................................................................................................................................................4-7
5.1.1—RemovingTrafcKeysfromaTargetDevice..............................................................................................................5-1
5.1.2—RemovingShadowKeysfromaTargetDevice............................................................................................................5-3
xiii

KVL4000KeyVariableLoaderAdvancedSECURENETUserGuide
6.1—SharingaSingleKey.......................................................................................................................................................6-1
6.2—SharingaMacroandAssociatedKeys............................................................................................................................6-3
6.3—SharingAllKeysandAllMacros....................................................................................................................................6-4
7.2—AccessingLogRecords....................................................................................................................................................7-1
7.3—ClearingLogRecords......................................................................................................................................................7-2
7.4—ExportingLogRecordstoaPC.......................................................................................................................................7-4
8.3—ConvertingaKeyfromASNtoASTRO25....................................................................................................................8-1
8.4—ConvertingaKeyfromASTRO25toASN....................................................................................................................8-4
9.2—PerformingaSystemReset..............................................................................................................................................9-4
9.3—UnlockingtheOperatorAccount.....................................................................................................................................9-5
9.4—SettingthePDAUSBMode............................................................................................................................................9-5
9.7—DisassemblingtheSecurityAdapter................................................................................................................................9-6
9.8—AssemblingtheSecurityAdapter....................................................................................................................................9-8
xiv

AbouttheKVL4000KeyVariableLoaderAdvanced
SECURENETUserGuide
Thismanualprovidesstep-by-stepinstructionsforusingtheKeyV ariableLoader(KVL)tocreateandstore
encryptionkeys,andthenloadthemintootherMotorolasecureequipment,suchasradios,xedencryptionunits,
digitalinterfaceunits(DIUs),andothers.
Thismanualisintendedforusebyexperiencedtechniciansfamiliarwithsimilartypesofequipment.Technicians
shouldunderstandencryptionconceptsandbefamiliarwithothertypesofMotorolaencryptionequipment.
Dependingontheoptionsordered,theKVLhasthecapabilityofbeingconguredtooperateintheAdvanced
SECURENET®(ASN)mode,ASTRO®25,and/orRadioAuthenticationmode.TheKVLmenusystem,
functionality,andoperatingcharacteristicsaredifferentdependingwhichoperatingmodeisactive.
ThismanualdescribestheAdvancedSECURENET®operatingmode.
TheAdvancedSECURENET®operatingmodeonlysupportsPhysicalID(PID)basedkeymanagement.
WhatIsCoveredinThisManual?
Thismanualconsistsofthefollowingchapters:
•Chapter1Introduction
•Chapter2KVL4000–PerformingInitialProgramming
•Chapter3ManagingEncryptionKeys
•Chapter4LoadingKeysintoTargetDevices
•Chapter5ManagingKeysinTargetDevices
•Chapter6SharingKeysBetweenKVLs
•Chapter7ManagingLogRecords
•Chapter8ConvertingEncryptionKeys
•Chapter9Troubleshooting
HelpfulBackgroundInformation
Motorolaoffersvariouscoursesdesignedtoassistinlearningaboutthesystem.Forinformation,goto
http://www.motorolasolutions.com/training
toviewthecurrentcourseofferingsandtechnologypaths.
RelatedInformation
Refertothefollowingdocumentsforassociatedinformation:
xv

KVL4000KeyVariableLoaderAdvancedSECURENETUserGuide
RelatedInformationPurpose
StandardsandGuidelinesfor
CommunicationSites
Providesstandardsandguidelinesthatshould
befollowedwhensettingupaMotorola
communicationssite.AlsoknownasR56manual.
ThismaybepurchasedonCD9880384V83,by
callingtheNorthAmericaPartsOrganization
at800-422-4210(ortheinternationalnumber:
302-444-9842).
SystemDocumentationOverviewForanoverviewoftheASTRO®25system
documentation,openthegraphicaluserinterface
fortheASTRO®25systemdocumentationsetand
selecttheSystemDocumentationOverviewlink.
Thisopensalethatincludes:
•ASTRO®25systemreleasedocumentation
descriptions
•ASTRO®25systemdiagrams
•ASTRO®25systemglossary
Foranadditionaloverviewofthesystem,review
thearchitectureanddescriptiveinformationinthe
manualsthatapplytoyoursystemconguration.
MC55EnterpriseDigitalAssistant
UserGuide(72E-108859)
DescribeshowtousetheMC55EDA.
MC55QuickStartGuide(72-127603)DescribeshowtogettheMC55EDAupand
running.
KVL4000QuickStartGuideProvidesbasicinformationontheKVL4000.
KVL4000KeyVariableLoader
ASTRO25UserGuide
Providesstep-by-stepinstructionsforusingthe
KeyVariableLoader(KVL)tocreateandstore
encryptionkeys,andthenloadthemintoother
Motorolasecureequipment,suchasradios,xed
encryptionunits,digitalinterfaceunits(DIUs),and
others.ThismanualdescribestheASTRO®25
modeofoperation.
KVL4000KeyV ariableLoaderRadio
AuthenticationUserGuide
Providesstep-by-stepinstructionsforusingthe
KeyVariableLoader(KVL)tocreateandstore
authenticationkeys,andthenloadtheminto
Motorolaradios.
KVL4000FLASHPortUpgradeUser
Guide
ProvidesinstructionsforupgradingtheKey
VariableLoader(KVL),radios,andothertarget
devices.Italsoprovidesinstructionsforapplying
securitysettingsontheKVL,installingand
activatingVPNsoftware,aswellasprovides
troubleshootinginformation.
KVL3000PlusKeyV ariableLoader
User'sGuide(6881132E29)
ProvidesinformationfortheKVL3000PlusKey
VariableLoader.
xvi

MOTOROLASOLUTIONS,INC.ENDUSERLICENSE
AGREEMENT
MotorolaSolutions,Inc.(“Motorola”)iswillingtolicensetheMotorolaPDAandSecurityAdapterSoftwareand
theaccompanyingdocumentationtoyou(“Licensee”or“you”)forusewithaMotorolaKVL4000onlyonthe
conditionthatyouacceptallthetermsinthisEndUserLicenseAgreement(“Agreement”).
IMPORTANT:READTHEFOLLOWINGTERMSANDCONDITIONSBEFOREUSINGTHE
ACCOMPANYINGPRODUCT.
IFYOUDONOTAGREETOTHISAGREEMENT,DONOTUSETHESOFTW AREORCOPYTHE
SOFTW ARE,INSTEAD,YOUMA Y ,FORAFULLREFUND,RETURNTHISPRODUCTTOTHELOCA TION
WHEREYOUACQUIREDITORPROVIDEWRITTENVERIFICATIONOFDELETIONOFALLCOPIES
OFTHESOFTW ARE.ANYUSEOFTHESOFTWARE,INCLUDINGBUTNOTLIMITEDTOUSEONA
KVL4000THATINCLUDESMOTOROLAPDAANDSECURITYADAPTER,WILLCONSTITUTEYOUR
AGREEMENTTOTHISENDUSERLICENSEAGREEMENT.
1.Denitions
InthisAgreement,theword“Software”referstothesetofinstructionsforcomputers,inexecutableformandinany
media,(whichmayincludediskette,CD-ROM,downloadableinternet,hardware,orrmware)licensedtoyou.The
word“Documentation”referstoelectronicorprintedmanualsandaccompanyinginstructionalaidslicensedtoyou.
Theword“Product”referstothespeciccombinationofSoftwareandDocumentationthatyouhavelicensedand
whichhasbeenprovidedtoyouunderthisAgreement.
2.GrantofLicense
Motorolagrantsyouapersonal,non-exclusive,non-assignable,nontransferablelicensetousetheProductssubject
totheConditionsofUsesetforthinSection2andthetermsandconditionsofthisAgreement.Anytermsor
conditionsappearingonthefaceorreversesideofanypurchaseorder,purchaseorderacknowledgmentorother
orderdocumentthataredifferentfrom,orinadditionto,thetermsofthisAgreementwillnotbebindingonthe
parties,evenifpaymentisaccepted.
3.ConditionsofUse
AnyuseoftheProductsoutsideoftheconditionssetforthinthisAgreementisstrictlyprohibitedandwillbe
deemedabreachofthisAgreement.
3.1Onlyyou,youremployeesoragentsmayusetheProducts.Youwilltakeallnecessarystepstoinsurethatyour
employeesandagentsabidebythetermsofthisAgreement.
3.2Y ouwillusetheProducts:(i)onlyforyourinternalbusinesspurposes;(ii)onlyasdescribedintheProducts;and
(iii)instrictaccordancewiththisAgreement.
3.3YoumayinstallandusetheProductsonasingleMotorolaPDAandKVL4000securityadapter,providedthat
theuseisinconformancewiththetermssetforthinthisAgreement.
3.4PortionsoftheProductsareprotectedbyUnitedStatescopyrightlaws,internationaltreatyprovisions,and
otherapplicablelaws.Therefore,youmusttreattheProductslikeanyothercopyrightedmaterial(e.g.,abookor
musicalrecording)exceptthatyoumayeither:(i)make1copyofthetransportablepartoftheProducts(which
typicallyissuppliedondiskette,CD-ROM,ordownloadableinternet),solelyforback-uppurposes;or(ii)copythe
xvii

KVL4000KeyVariableLoaderAdvancedSECURENETUserGuide
transportablepartoftheProductstoaPCharddisk,providedyoukeeptheoriginalsolelyforback-uppurposes.If
theDocumentationisinprintedform,itmaynotbecopied.IftheDocumentationisinelectronicform,youmay
printout1copy,whichthenmaynotbecopied.Withregardtothecopymadeforbackuporarchivalpurposes,you
agreetoreproduceanyMotorolacopyrightnotice,andotherproprietarylegendsappearingthereon.Suchcopyright
notice(s)mayappearinanyofseveralforms,includingmachine-readableform,andyouagreetoreproducesuch
noticeineachforminwhichitappears,totheextentitisphysicallypossibletodoso.Unauthorizedduplication
oftheSoftwareorDocumentationconstitutescopyrightinfringement,andintheUnitedStatesispunishablein
federalcourtbyneandimprisonment.
3.5Y ouwillnottransfer,directlyorindirectly,anyproduct,technicaldataorsoftwaretoanycountryforwhich
theUnitedStatesGovernmentrequiresanexportlicenseorothergovernmentalapprovalwithoutrstobtaining
suchlicenseorapproval.
4.Title;Restrictions
IfyoutransferpossessionofanycopyoftheProductstoanotherpartyoutsideofthetermsofthisagreement,your
licenseisautomaticallyterminated.TitleandcopyrightstotheProductsandanycopiesmadebyyouremainwith
Motorolaanditslicensors.Youwillnot,andwillnotpermitothersto:(i)modify,translate,decompile,bootleg,
reverseengineer,disassemble,orextracttheinnerworkingsoftheSoftwareorDocumentation,(ii)copythe
look-and-feelorfunctionalityoftheSoftwareorDocumentation;(iii)removeanyproprietarynotices,marks,labels,
orlogosfromtheSoftwareorDocumentation;(iv)rentortransferallorsomeoftheSoftwareorDocumentation
toanyotherpartywithoutMotorola'spriorwrittenconsent;or(v)utilizeanycomputersoftwareorhardware
whichisdesignedtodefeatanycopyprotectiondevice,shouldtheProductsbeequippedwithsuchaprotection
device.IftheProductsareprovidedonmultipletypesofmedia(suchasdiskette,CD-ROM,downloadable
internet),thenyouwillonlyusethemediumwhichbestmeetsyourspecicneeds,andwillnotloan,rent,lease,
ortransfertheothermediacontainedinthepackagewithoutMotorola'swrittenconsent.Unauthorizedcopying
oftheSoftwareorDocumentation,orfailuretocomplywithanyoftheprovisionsofthisAgreement,willresult
inautomaticterminationofthislicense.
5.Condentiality
YouacknowledgethatallProductscontainvaluableproprietaryinformationandtradesecretsandthatunauthorized
orimproperuseoftheProductswillresultinirreparableharmtoMotorolaforwhichmonetarydamageswould
beinadequateandforwhichMotorolawillbeentitledtoimmediateinjunctiverelief.Accordingly,youwilllimit
accesstotheProductstothoseofyouremployeesandagentswhoneedtousetheProductsforyourinternalbusiness
purposes,andyouwilltakeappropriateactionwiththoseemployeesandagentstopreservethecondentialityofthe
Products,usingthesamedegreeofcaretoavoidunauthorizedorimproperdisclosureasyouusefortheprotectionof
yourownproprietarysoftware,butinnoeventlessthanreasonablecare.
Youhavenoobligationtopreservethecondentialityofanyproprietaryinformationthat:(i)wasinthepublic
domainatthetimeofdisclosure;(ii)enteredthepublicdomainthroughnofaultofyours;(iii)wasgiventoyou
freeofanyobligationtokeepitcondential;(iv)isindependentlydevelopedbyyou;or(v)isdisclosedas
requiredbylawprovidedthatyounotifyMotorolapriortosuchdisclosureandprovideMotorolawithareasonable
opportunitytorespond.
6.RighttoUseMotorola'sName
ExceptasrequiredinSection3.4above,youwillnot,duringthetermofthisAgreementorthereafter,useany
trademarkofMotorola,oranywordorsymbollikelytobeconfusedwithanyMotorolatrademark,eitheralone
orinanycombinationwithanotherwordorwords.
xviii
Other Motorola solutions Receiver manuals