R5
SUPREME Secure W-AIS System
OPERATION
7000 118-524, C1
Page 41
4
OPERATION
This chapter consists of a few examples of use cases and describes how to operate the R5
SUPREME W-AIS transponder system.
The following use cases assumes that the all R5 SUPREME Transponder systems has been
installed and configured as normal Class A systems in accordance with R5 SUPREME AIS
Transponder System Manual (p/n 7000 118-300). The systems must have valid MMSI set in
order to transmit.
All systems should also have the latest software and correct W-AIS licenses, see chapter 2
for information about software and license upgrades.
4.1
Start encrypted link on a third dedicated channel
To start an encrypted link on a dedicated third channel between two or more R5
SUPREME W-AIS transponder systems, perform the following for each system:
1. Navigate to
Link Settings
view,
Main Menu
Maintenance
Configuration
W-AIS
Link Settings.
In the
Link Settings
view, the following parameters
MUST
be set to the same values on all R5 SUPREME W-AIS systems:
Link Type = “Secure”
Cipher
Secure Channel
2. Navigate to
W-AIS Static Data
view,
Main Menu
Maintenance
Configuration
W-AIS
Static Data.
Configure the following parameters:
Secure ID
– Must be UNIQUE for each system
Secure Organization ID
– Must be SAME for all systems.
3. The systems are now configured and must now have the
SAME
encryption key in
order to communicate in Tactical Operational Mode. An encryption key can be
created as described in chapter 3.5
“Encryption Keys” and distributed to all R5
SUPREME W-AIS systems. The key can then be loaded in each transponder by
manual input or via USB as described further in chapter 3.5.2 and 3.5.3.
NOTE: An encryption key can override the settings for Secure Channel,
Secure Org. ID, Cipher and Reporting Rate. The settings of the key are
displayed in the Key List view as described in chapter 0.
4. When all systems are configured and have the SAME valid encryption key, the
operational mode can be changed to Tactical and thus starting encrypted
communication on the secure channel.
Th
e “Tactical Mode” icon and a key symbol should be visible in the status bar in
the R5 CDU, see chapter 0.
Confirm in
Target List
view and
Plot
view that secure targets are received, see
chapter 3.10.