|
|
|
|
|
|
|
|
|
|
Implementation of Link Layer Authentication Within P25 -Webinar #72290
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
May 30, 2024 - May 30, 2024
2:00 PM - 3:00 PM
P25 Link Layer Authentication (LLA) is being heard more and more frequently within the public safety communications community, but there is confusion around what it is, what it does and how it can be implemented in land mobile radio (LMR) systems. With increasing examples of criminals accessing LMR networks to monitor communications and disrupt law enforcement activities, LMR system security is critically important for both system owners and the public safety users they support. P25 LLA is an additional option to restrict system access
Join this session to learn what P25 LLA is – and is not – and how it can limit access to P25 trunked radio systems and provide an extra layer of system security and protection for critical communications networks. Panelists will share their expertise on how to protect P25 LMR networks, describe how P25 LLA can offer additional system security by verifying subscriber units before granting system access, provide real world incident use case of it working and examples of why P25 LLA is needed, and offer best practices as well as lessons learned for successful P25 LLA implementation.
Key Takeaways:
- Understand how P25 Link Layer Authentication (LLA) can provide additional system security.
- Types of P25 LLA.
- Potential benefits and impacts of adopting P25 LLA
- Lessons learned and best practices for implementing P25 LLA, particularly across multiple networks and disparate manufacturer systems.
Presenters:
- Hermina “Nina” Koshinski, Chief of Radio Operations Engineering & Support for the Pennsylvania State Police
- Scott Wright, Senior Telecommunications Engineer 2 with the Connecticut Department of Emergency Service and Public Protection
- Don Root, Project 25 Manager, APCO International
|
|
|
|