TPA Functions
STE User’s Manual
4-28
Rel. 2.6
Press
CHANGE
as often as necessary to set minimum level.
Press
SCROLL
if no change is required, or after level is set.
Figure 4-48. Secure Voice Maximum Security Level Menu
Press: Result:
CHANGE
Toggles between security levels (NONE, PROTECTED, UNCLASSIFIED,
CONFIDENTIAL, SECRET, TOP SECRET)
SCROLL
Advances display to SECDATA MAX SEC:/SECDATA MN SEC: menu
(Paragraph
BACK
Returns display to SECDATA MAX SEC:/SECDATA MN SEC: menu
(Paragraph
Press
CHANGE
as often as necessary to set maximum level.
Press
SCROLL
if no change is required, or after level is set.
At the SECDATA MAX SEC:/SECDATA MN SEC: menu, press
ACL
if changes are required in the ACL
menus.
4-5.2.2 ACL
The ACL menu (
) allows or disallows the STE to automatically make secure connections with
far-end terminals. The ACL contain the Key Material Identifiers (KMID) and/or Department-Agency-
Organization (DAO) lists stored within the STE. These are used to validate the identity of connected far
end terminals. The ACL is empty when shipped from the factory, or after the STE is zeroized. It is
managed (installed, edited, removed) by the TPA and can be viewed by all users. The TPA can
independently enable or disable the ACL for voice and data communications.
Figure 4-49. Access Control List Menu
Press: Result:
VIEW
Advances display to VIEW ACCESS CONTROL LIST menu
If “ACL Empty” is displayed, no action available – press
BACK
EDIT
Advances display to EDIT ACCESS CONTROL LIST menu (Paragraph
BACK
Returns display to SECURE ACCESS CONTROL SYSTEM menu (Paragraph
Press
EDIT
.
4-5.2.2.1 Edit ACL
The EDIT ACCESS CONTROL LIST menu (
) provides access to three edit menus:
ADD,
REMOVE,
and
FROM PC
. Contents of the ACL can be edited by pressing
EDIT
while in the ACCESS
CONTROL LIST menu (
SECVOICE MAXIMUM SECURITY LEVEL
CHANGE
BACK
NONE
SCROLL
ACCESS CONTROL LIST
BACK
VIEW
EDIT
ACCESS CONTROL LIST
BACK
VIEW
ACL Empty
EDIT
Summary of Contents for Office STE
Page 2: ...Copyright 2006 L 3 Communications Corporation ...
Page 26: ...List of Tables STE User s Manual xiv Rel 2 6 This page intentionally left blank ...
Page 32: ...Introduction STE User s Manual 1 6 Rel 2 6 This page intentionally left blank ...
Page 132: ......
Page 181: ...STE User s Manual Crypto Card Management Rel 2 6 6 25 ...
Page 182: ......
Page 210: ...Calls STE User s Manual 7 28 Rel 2 6 This page intentionally left blank ...
Page 234: ...Remote Control Operations STE User s Manual 8 24 Rel 2 6 This page intentionally left blank ...
Page 258: ...8510 Capabilities STE User s Manual 9 24 Rel 2 6 This page intentionally left blank ...
Page 284: ...User Maintenance STE User s Manual 11 6 Rel 2 6 This page intentionally left blank ...
Page 288: ...Notes STE User s Manual 12 4 Rel 2 6 12 4 CE DECLARATION OF CONFORMITY ...
Page 306: ...Index STE User s Manual Index 18 Rel 2 6 This page intentionally left blank ...
Page 308: ...Rel 2 6 FP 2 FO 2 User Tree ...
Page 311: ......