3/15/2018
@
MOTOROLA
SOLUTIONS
PELL EPELTT TTA ELL TEAL err ee 1D vee eeaaar erence cee ergqddTTaL big cae s Tid
* Router Access Control Lists (ACLs) — Motorola Solutions employs ACLs te filter traffic at core, exit, gateway,
and site routers to ensure that only authorized traffic can transverse the network.
¢ Ethernet Switch Port Security — Ethernet Switch Port Security provides an additional layer of security at the
physical location of the equipment by preventing unauthorized access to the system through the ports ona
network switch.
° Secure Network Management — Secure Network Management utilizes the inherent authentication and
encryption capabilities of SNMPv3 to secure the traffic between the network managers and SNMPV3
enabled elements.
* Secure Software Download (SWDL)-— Secure SWDL ensures that transfer operations are authenticated
and encrypted, based on the Secure File-Transfer Protocol (SFTP), making it difficult for transmission to be
intercepted through unauthorized access.
1.3 PROTECTING YOUR COMMUNICATIONS
When secure communications are critical, radio systems can be configured with encryption. Encryption ensures only
authorized units in the system can listen to transmissions being made. Encrypted calls are protected end-to-end
throughout the network.
Secure Voice gives customers the security of end-to-end audio encryption for
conventional calls. Secure Voice provides two-level security for radios or consoles
to transmit and receive digitally protected (encrypted) audio. Both a standard or
proprietary encryption algorithm and a Common Key Reference (CKR) combine to
protect your communications.
Secure Voice offers the flexibility of manual or automatic selection of CKRs, as well as individual CKR or group CKR
(keyset) activation. Use of keysets allows console operators to switch between two keysets to enhance security
without disrupting communications.
From the console position, the Momentary Override feature allows the operator to quickly, but temporarily, override
the current transmission mode (clear or secure) and the currently selected encryption key of a channel resource.
1.4 ENSURING FAST, RELIABLE ALERTS
Through the Emergency Alarm and Emergency Call features, a user can quickly inform dispatch personnel of a life-
threatening situation. A simple press of the radio's emergency alarm button sends an audible and visible alarm and
the user's ID to the dispatcher and, potentially, other talkgroup members. The dispatch center receives immediate
notification, even when the system is busy, and an available channel is assigned immediately to the emergency call.
By using the control channel, the Call Alert feature allows a dispatcher or radio user to page another dispatch
position or individual radio without affecting voice channel capacity. Call Alert sounds a tone on the receiving radio,
if not in a voice call, and returns an acknowledgement to the initiating radio. A receiving unit with a display shows
and siores the sending unit's ID.
1.5 EMPOWERING CONSOLE OPERATORS
The ASTRO 25 conventional system empowers the console operator with the capabilities needed to control and
improve communications, as well as command base stations or other devices. The console operator's abilities
include the following actions:
e Choose mode or channel.
e Control the squelch on conventicnal resources so that all voice activity is heard.
® — Enable communications with a subset of radios on a frequency.
* Mute talkaround conversations from being heard at the console.
POPEATER EEE ETERS E TEE RO ae POMOC ET TTA T PEPER AR RAs aaa
Use or disclosure of this proposal is subject
to the restrictions on the disclosure page.
Page 6
