NOTICE:
A KMF may be inside or outside the ASTRO
®
25 RNI. If outside the ASTRO
®
25 RNI,
see
Configuring the Local Hosts File for Consoles in Conventional K Core Systems or Outside
for details.
A CRYPTR micro must also be pre-configured to accept updates from a particular KMF. A crypto-
administrator configures the CRYPTR micro, using a KVL: Individual RSI is the ID of the CRYPTR
micro itself, KMF Radio Set Identifier (RSI) is the ID of the KMF that manages keys on the CRYPTR
micro. See the
Key Management Facility
manual.
A crypto-administrator can perform initial key provisioning using the Store and Forward procedure on
the CRYPTR micro as follows:
1
Connect a KVL 4000 to the KMF and download encryption keys for a CRYPTR micro to the KVL
4000.
2
Insert a CRYPTR micro into the KVL 4000 with the CRYPTR micro keyloading cable.
3
Initiate a Store and Forward procedure from the KVL 4000. See the
KVL 4000 ASTRO 25 User
Guide
.
4
Reconnect the KVL 4000 back to the KMF and upload responses from the CRYPTR micro back to
the KMF.
After this provisioning is configured and the CRYPTR micro is inserted in the MCC 7100 IP Dispatch
Console, the CRYPTR micro can accept Over the Ethernet Keying (OTEK). OTEK can take place
when the MCC 7100 IP Dispatch Console is operational, no Elite restart necessary.
For security reasons, the MCC 7100 IP Dispatch Console software logs in to the CRYPTR micro every
time the dispatch application is started. During normal operation, the login process takes place without
user intervention.
Manual password reset is required when the CRYPTR micro is newly programmed and its password is
defaulted. The default password for the User account is
CryptrAdmin12345
. The default password
for the Admin account is also
CryptrAdmin12345
.
To change the passwords, use the
CRYPTRManagement
application. After you use
CRYPTRManagement
to update the password on the CRYPTR micro, it also securely writes in the
new password, so that from that point on, automatic log ons in to the CRYPTR micro can take place.
For status of the CRYPTR micro, see the
Encryption/Licensing
tab of the
Console Dispatch Status
application. Specifically, mismatched and default passwords errors are reported in the
Console
Dispatch Status
application. For more information, see
Console Dispatch Status (MCC 7100 IP
.
Software Keyfiles-Based Encryption
In this mode of operation, the encryption keys are stored in one or more files on the MCC 7100 IP
Dispatch Console. The key files format is XML. The Key Management Facility (KMF) can generate key
files and transfer them manually to the MCC 7100 IP Dispatch Console. Or, you can generate them by
the Keyfile Generation tool right on the MCC 7100 IP Dispatch Console or another computer, and
manually transfer them to the MCC 7100 IP Dispatch Console.
Encryption keys stored on software keyfiles have the following information:
• Common Key Reference (CKR)
• Keyset
• Key ID
• Algorithm ID
• Key Material
NOTICE:
The Key Management Facility does not support ADP keys.
MN000672A01-E
Chapter 2: MCC 7100 IP Dispatch Console Setup and Installation
58
Содержание MCC 7100 IP
Страница 2: ......
Страница 4: ...This page intentionally left blank...
Страница 6: ...This page intentionally left blank...
Страница 8: ...This page intentionally left blank...
Страница 16: ...Other System Updates and Considerations 168 MN000672A01 E Contents 16 Send Feedback...
Страница 18: ...This page intentionally left blank...
Страница 20: ...This page intentionally left blank...
Страница 22: ...This page intentionally left blank...
Страница 26: ...This page intentionally left blank...
Страница 150: ...This page intentionally left blank...
Страница 158: ...This page intentionally left blank...
Страница 164: ...This page intentionally left blank...
Страница 170: ...This page intentionally left blank...