STE User’s Manual
8510 Capabilities
Rel. 2.6
9-13
method calls for you to start a non-secure voice call and then when you press the SECDATA Soft Key,
you initiate your secure data call.
Using auto-secure call initiation ensures your connection will have highest data rate possible between the
two STEs. Data rates between two STE-8510 terminals can be as high as 128 Kbps synchronous or 115
Kbps asynchronous when using STE signaling. If data bearers are available between two STEs, your
STE signaling is guaranteed, and your secure data call will use one of the two data-bearer call
appearances. If data bearers are not available, the STE will attempt to perform STE signaling over voice
bearers and your call will be automatically transferred to a voice-bearer call appearance with an LED. If
the STE signaling attempt is good, a secure call will still result in a secure data call but the maximum data
rate will be reduced to 38.4 Kbps, synchronous or asynchronous, because the call is on a voice bearer. If
the attempt fails, the call will revert to SCIP signaling and, if the receiving terminal is SCIP capable, the
call will result in a maximum data rate of 9.6 Kbps, asynchronous only. If the receiving terminal is not
SCIP capable, the STE will revert to STU signaling with the same maximum data rate of 9.6 Kbps,
synchronous or asynchronous.
NOTE
You can disable the signaling modes to select STU signaling directly.
All secure data calls are terminated by pressing the DROP button.
9-5.2.2 Receiving Secure Data Calls on 5ESS with STE-8510
Data calls on 5ESS STE-8510 work the same way as voice calls. For STE signaling, both terminals must
be set to the same data rate to achieve data rates higher than 38.4 Kbps. Incoming secure data calls on
voice bearers are subject to the same ring/idle preference setting as secure voice calls.
When a STE data bearer secure data call is answered, the call automatically transfers to a data bearer
call appearance and acts as if ring preference has been set. Otherwise, the call appearance handling will
happen as described above and the call will reside on a regular call appearance. Calls on normal call
appearances will negotiate to a signaling type compatible with the call initiator.
All secure data calls are terminated by pressing the DROP button.
9-6. DEFINITY SECURE CALLING
Placing your secure calls from the STE-8510 on the DEFINITY is similar to placing secure calls on the
5ESS switch.
However, receiving your secure voice calls on the DEFINITY is very different when using the STE-8510
switch type setting. The DEFINITY assigns two directory numbers to the STE, one directory number for
the voice station and the other for the data module associated with that station. This is because the
Lucent® 8510 terminal has capabilities to handle your voice calls on the station number, and also has
capabilities to handle your data calls on the data module. Your STE uses the data module very differently
than does the Lucent® 8510 terminal. The STE uses the data module to perform STE signaling for both
secure voice and secure data calls. The data module is an ISDN data module and does not work with a
normal voice channel modem, like that used for SCIP or STU signaling.
Thus, this means that when working with someone using the STE-8510 capability on the DEFINITY, you
must take care when you give out a phone number for a DEFINITY STE-8510. We identify which phone
number is used, and for what type of call, in the following (
Table 9-1. DEFINITY STE-8510 Directory Number Usage
STE-8510 Incoming Call Type
Number to Call
Comments
Non-Secure Voice
Station
STE Secure Voice & Data
Data Module
If End-to-End ISDN connection to data
module is not available, reorder tone will
be heard. STE signaling is not available
and Station number should be called.
SCIP Secure Voice & Data
Station
STU Secure Voice & Data
Station
Summary of Contents for CEU
Page 2: ...Copyright 2006 L 3 Communications Corporation ...
Page 26: ...List of Tables STE User s Manual xiv Rel 2 6 This page intentionally left blank ...
Page 32: ...Introduction STE User s Manual 1 6 Rel 2 6 This page intentionally left blank ...
Page 132: ......
Page 181: ...STE User s Manual Crypto Card Management Rel 2 6 6 25 ...
Page 182: ......
Page 210: ...Calls STE User s Manual 7 28 Rel 2 6 This page intentionally left blank ...
Page 234: ...Remote Control Operations STE User s Manual 8 24 Rel 2 6 This page intentionally left blank ...
Page 258: ...8510 Capabilities STE User s Manual 9 24 Rel 2 6 This page intentionally left blank ...
Page 284: ...User Maintenance STE User s Manual 11 6 Rel 2 6 This page intentionally left blank ...
Page 288: ...Notes STE User s Manual 12 4 Rel 2 6 12 4 CE DECLARATION OF CONFORMITY ...
Page 306: ...Index STE User s Manual Index 18 Rel 2 6 This page intentionally left blank ...
Page 308: ...Rel 2 6 FP 2 FO 2 User Tree ...
Page 311: ......