4 DTMF COMMANDS

This chapter covers the commands that can be entered via any standard DTMF source and discusses the security structure for the control and configuration commands. The FF-800 utilizes a two-tiered security system that segregates "control" and "configuration" commands. A control command can turn items on or off, re-assign an existing parameter, or perform basic "house keeping" functions. Configuration commands are those which modify some basic aspect of the FF-800's operation. As an example, the command to force the FF-800 to send an ID is a control command, but the command to program the repeater call sign is a configuration command. Appendix C lists all of the available commands along with a synopsis of their syntax.

In this chapter, all DTMF commands will be presented. The presentation format is designed to localize specific information about each command. Command names are shown in bold print. The security access level is also listed, along with the function code and the syntax for any parameters that might be associated with the command. Parameters that follow a semi-colon (;) can be omitted to allow the user to interrogate the current status of the function. General level commands will have their function id# listed in braces {} -- this number is used in the Prefix Assign function to change the prefix for that function. Any command response that results is also listed. Following this "introduction" is a discussion of what the function does and some examples of how to enter the function with various parameters.

4.1 Security and Function management

Control Prefix Access level: CONTROL
{#01} (CC) (command)
Configuration Prefix Access level: CONFIGURATION
{#02} (DD) (command)

The two secured command groups (control and configuration) each have their own prefix that is user defined. The prefixes are attached to the begining of the appropriate command to tell the FF-800 which type of command is being entered. Even if an operator knows how to operate an FF-800, they can not enter control or configuration commands unless they know the respective prefix. This provides an additional level of security to the FF-800 system. The prefixes must be between 1 and 4 digits in length and can be comprised of any of the 16 DTMF digits (see Prefix Set, below, for restrictions on these or any other user defined codes).

Control Unlock Access level: GENERAL
{#03} (AA0)
Response: "O K"

This command activates a 15 minute timer which allows acceptance of control commands by the FF-800. Most Control commands are identified by the control prefix -- However, there are some general level commands that require Control Unlock: Any TR Control command for a MAIN port, and the Configuration Unlock command. Each successful control command entry resets the timer to 15 minutes. Thus, if at least one control command is entered every 15 minutes, the security access will remain in effect indefinitely. Security unlock commands do not need to be entered into macros because the Macro-processor automatically unlocks configuration and control prefixes during macro execution.

Configuration Unlock Access level: GENERAL
{#27} (AD9)
Response: "O K"

The Configuration Unlock command behaves in similar fashion as the Control Unlock command except that it applies to configuration level commands. A separate timer is set to 15 minutes -- valid configuration commands reset both the configuration security timer and the control security timer.

Lock Security Access level: CONTROL
(cntl)(439)
Response: "O K"

Once a control or configuration session is complete, the user will want to re-lock the security system of the FF-800. This command locks both the control and configuration security levels thus securing the FF-800 for normal operation.

Prefix Assign Access level: CONFIGURATION
(cnfg)(520) (function#) (new prefix code)
Response: "P S" if prefix accepted, or "Abort" if prefix rejected

Each of the functions in the general command level have prefixes that can be set by the user. The user must know the function number of the desired command before this command can be executed (indicated in this document in braces {} under the function name).

The FF-800 allows a great deal of flexibility in assigning prefixes -- however, there are a few restrictions that apply to the entry process. The first restriction involves the "#" digit. Since this digit is used by the FF-800 to signal the DTMF un- mute feature (this causes the FF-800 to pass all following DTMF digits) it is not generally suitable as the first digit of a prefix. If this digit is the first digit in a command, then the remaining digits will be ignored and the command will never be recognized. However, the "#" may be used as a single digit prefix for any command that does not require parameters (like the autopatch hang-up code).

Also, prefixes may not be replicated -- the FF-800 performs a search for the new prefix before it will accept the change of assignment. If the prefix already exists in whole or in part, the FF-800 will reject the assignment.

The default prefixes are provided to allow the user with a starting point in getting their controller on the air. In the interest of security, the user should endeavor to modify all the general prefixes to prevent unauthorized tampering.

User Function Control Access level: CONFIGURATION
(cnfg)(525) (on/off)
Response: "U F N On" or "U F N Off"

The User Function Control command is used to disable the General level commands. Control Unlock, Configuration Unlock, Repeater On, Repeater Off, Autopatch Cancel, and Emergency Speed Dial are exempt from this feature. This provides a quick means for disabling user access to commands while still leaving the repeater system on the air. When general level commands are OFF, the FF-800 will still respond to control and configuration level commands.

Machine Alert Access level: CONTROL
(cntl) (455) ; (0)
Response: "Machine Alert ,"
"Power Failure"indicates system reset
"C O P"firmware watchdog failure
"R A M"memory corruption
"C T"courtesy tone corruption
"Cancel"alert has been cleared
The Machine Alert function is used to signal the user that a possible system malfunction has occurred. There are several "watch dog" systems in place to insure that the FF-800 firmware is operating properly. If one of these "watch dog" systems detects an error, the FF-800 will be reset, and the type of error will be logged for later retrieval. This error type is of primary importance to FF-Systems and special attention should be paid to this function should it ever come to activate on your FF-800 system. The alert is indicated by the phrase "MACHINE ALERT" as the tail message for the controller. If this message is discovered, then the Machine Alert command must be used to interrogate the source(s) of the alert. The user should note the response(s) that the FF-800 gives as well as the conditions that may have precipitated the alert (providing that these conditions were witnessed). The command can be repeated as often as necessary until the entire response can be noted. The user may then clear the alert to remove the annunciator from the system.

The following list of examples illustrates the use of the preceding commands (NOTE: all examples in this manual assume that the default prefixes are in place):

PREFIX ENTRY:
AA0			control security unlock
"O K"			FF-800 response
AD9			configuration unlock
"O K"
DD5200287		set new configuration prefix = 87
"P S"
875200287#		attempt to set new control prefix
"Abort"			new prefix not accepted
8752002DD		set configuration prefix back to "DD"
"P S"

TURN OFF USER FUNCTIONS:
AA0			control unlock
"O K"
AD9			configuration unlock
"O K"
CC5250			turn off commands
"Set U F N Off"
CC525			interrogate status
"U F N Off"
CC5251			turn them back on
"Set U F N On"

 ALERT  Command:
AA0			control unlock
"O K"
CC455			interrogate status
"Machine Alert, COP, Power Failure, RAM, CT"
CC4550			clear alert
"Machine Alert, Cancel"
NOTE: The unlock commands at the start of each example are only required at the begining of a session, they are not required before each command unless the security timers have timed-out or been locked. Note that all remaining examples in this manual will assume that the user has previously unlocked the appropriate security level.


To: Table of Contents Next Section