STE User’s Manual
8510 Capabilities
Rel. 2.6
9-3
A voice bearer may contain analog links, it is terminated on a digital switch, it will support STU and SCIP
signaling and it also may support STE signaling if the bearer passes a voice bearer secure capabilities
test during security negotiation. Passing the capabilities test confirms that the connection is digital end-
to-end and can support STE signaling.
A data bearer between two STEs provides an end-to-end digital connection that can support STU, SCIP,
and STE signaling. The data bearer support of STE signaling, provides the highest level of voice quality
and the highest available data rates. A voice-bearer call-appearance will illuminate one of the LEDs
associated with the call appearance buttons on the face of the STE.
A data-bearer call appearance activates a special character in the lower left corner of the STE display.
Data-bearer call appearances are controlled by the first two buttons on the left side of the STE as shown
in
. The upper button is associated with the first data-bearer call appearance. The special
character “
”
is associated with the first data bearer call appearance and has been given the
designation of “Cy”. The second button on the left side of the STE is associated with the second data-
bearer call appearance. The special character “
”
is associated with the second data bearer call
appearance and has been given the designation of “Clops”. When both calls appearances are active the
indicator appears as one big “
”, hence the reason for the nickname “Cy Clops”.
9-2.1.4 Data
Number/Voice Number for DEFINITY
The DEFINITY switch must be provisioned with both a voice station and data module to allow the STE to
use the high quality voice and high speed data capabilities of STE signaling. If a data module is not
provided the STE may be limited to SCIP and STU signaling using the voice module. Each module has a
specific extension, the voice station will have one extension number and the data number a separate
extension number. What this means is for normal non-secure voice calls, calling parties will use the
number of the voice station. For calling parties attempting SCIP or STU calls, the voice station number
must also be used. For STE signaling (voice or data calls, including secure casual conferencing) the
calling party must call the data module number. If the data module number is called for a non-STE call,
the calling party will get a busy signal.
9-2.1.5 No Directory, Call Log or Clock Capabilities
The STE does not support Personal Directory storage, a local clock, or the capability to Log calls..
However, the STE does provide the capability to store Speed Dial” numbers and access abbreviated
dialing lists.
9-2.1.6 No Remote Control
When configured for operation with the STE-8510 switch type, the STE does not support any remote
control operations.
9-2.1.7 No Adjunct Control Permitted
The STE does not permit the switch to control the STE speakerphone using adjunct control messages.
Due to the secure nature of the STE, it does not respond to any adjunct control messages from the
switch..
9-2.1.8 Bridging and Exclusion Specifics – Failed Auto-Secure Can Not Be Excluded
Manually
Since the STE-8510 feature allows shared or bridged call appearances with other extensions, secure
calls on voice bearers can also be bridged. Bridging onto a secure call is not a security issue since all
classified information is encrypted before getting to the switch. The bridging extension will only hear
modem signaling on an SCIP or STU call. If the bridged call is a STE call on a voice bearer, the secure
call typically fails. Bridging is a switch function and is not under the control of the STE. If you typically
place secure voice calls, you may request that the switch administrator provision your extension with the
auto-exclusion feature. This feature will prevent other shared call appearances from bridging onto calls at
your terminal. The exclusion and auto-exclusion switch features are discussed in a later section of this
chapter.
Summary of Contents for Office STE
Page 2: ...Copyright 2006 L 3 Communications Corporation ...
Page 26: ...List of Tables STE User s Manual xiv Rel 2 6 This page intentionally left blank ...
Page 32: ...Introduction STE User s Manual 1 6 Rel 2 6 This page intentionally left blank ...
Page 132: ......
Page 181: ...STE User s Manual Crypto Card Management Rel 2 6 6 25 ...
Page 182: ......
Page 210: ...Calls STE User s Manual 7 28 Rel 2 6 This page intentionally left blank ...
Page 234: ...Remote Control Operations STE User s Manual 8 24 Rel 2 6 This page intentionally left blank ...
Page 258: ...8510 Capabilities STE User s Manual 9 24 Rel 2 6 This page intentionally left blank ...
Page 284: ...User Maintenance STE User s Manual 11 6 Rel 2 6 This page intentionally left blank ...
Page 288: ...Notes STE User s Manual 12 4 Rel 2 6 12 4 CE DECLARATION OF CONFORMITY ...
Page 306: ...Index STE User s Manual Index 18 Rel 2 6 This page intentionally left blank ...
Page 308: ...Rel 2 6 FP 2 FO 2 User Tree ...
Page 311: ......