using the repeaters in the system. It also offers some protection to prevent unauthorized subscribers from listening to any repeater outbound voice/data transmission.
RAS provides two methods to prevent a subscriber from accessing the system:
- RAS Key Authentication
- Radio ID Range Check
These two methods are independent of each other and may be enabled/disabled separately or together. When used together, they provide a robust and flexible way to control the users access to the system.
|In the repeater|
|In the radio|