2000 DODGE NEON key

[x] Cancel search: key

Page 365 of 1285

DODGE NEON 2000  Service Repair Manual first turn) will cause all vehicle doors to unlock elec-
trically. When this feature is disabled, all vehicle
doors will be unlocked electrically upon the first turn
of a key cylinder to the UNLOCK po

Page 366 of 1285

DODGE NEON 2000  Service Repair Manual SERVICE PROCEDURES
DOUBLE ACTIVATION UNLOCK
The toggling of the double activation unlock fea-
ture (between enabled and disabled) can be per-
formed with the use of the DRB IIItscan tool, or by
the cu

Page 367 of 1285

DODGE NEON 2000  Service Repair Manual REMOTE KEYLESS ENTRY (RKE)
TABLE OF CONTENTS
page page
DESCRIPTION AND OPERATION
INTRODUCTION..........................4
REMOTE KEYLESS ENTRY SYSTEM..........5
REMOTE KEYLESS ENTRY TRANSMITTER.....5
H

Page 368 of 1285

DODGE NEON 2000  Service Repair Manual NOTE: The dealer must remove the module from
ªShip Modeº and place the RKE Module into either
the ªDealer Lotº storage or ªCustomer Usageº
modes of operation after receiving the vehicle from
the

Page 369 of 1285

DODGE NEON 2000  Service Repair Manual (1) With the ignition switch in RUN position, press
and hold the transmitter Unlock button (Fig. 1) for a
minimum of 4 seconds to a maximum of 10 seconds.
(2) Within the 4-10 second range, depress the

Page 372 of 1285

DODGE NEON 2000  Service Repair Manual VEHICLE THEFT/SECURITY SYSTEM
TABLE OF CONTENTS
page page
DESCRIPTION AND OPERATION
INTRODUCTION..........................1
VEHICLE THEFT/SECURITY SYSTEM (VTSS)...1
SENTRY KEY IMMOBILIZER SYSTEM (SKIS

Page 373 of 1285

DODGE NEON 2000  Service Repair Manual VTSS disarming occurs upon normal vehicle entry
by unlocking either door via the key cylinders or
RKE transmitter, or by starting the vehicle with a
valid Sentry Key. This disarming will also halt the

Page 374 of 1285

DODGE NEON 2000  Service Repair Manual disarming. The rolling code algorithm ensures secu-
rity by preventing an override of the SKIS through
the unauthorized substitution of the SKIM or the
PCM. However, the use of this strategy also mean