OX253P User
’
s Guide
185
A
P P E N D I X
A
WiMAX Security
Wireless security is vital to protect your wireless communications. Without it,
information transmitted over the wireless network would be accessible to any
networking device within range.
User Authentication and Data Encryption
The WiMAX (IEEE 802.16) standard employs user authentication and encryption to
ensure secured communication at all times.
User authentication is the process of confirming a user
’
s identity and level of
authorization. Data encryption is the process of encoding information so that it
cannot be read by anyone who does not know the code.
WiMAX uses PKMv2 (Privacy Key Management version 2) for authentication, and
CCMP (Counter Mode with Cipher Block Chaining Message Authentication Protocol)
for data encryption.
WiMAX supports EAP (Extensible Authentication Protocol, RFC 2486) which allows
additional authentication methods to be deployed with no changes to the base
station or the mobile or subscriber stations.
PKMv2
PKMv2 is a procedure that allows authentication of a mobile or subscriber station
and negotiation of a public key to encrypt traffic between the MS/SS and the base
station. PKMv2 uses standard EAP methods such as Transport Layer Security
(EAP-TLS) or Tunneled TLS (EAP-TTLS) for secure communication.
In cryptography, a
‘
key
’
is a piece of information, typically a string of random
numbers and letters, that can be used to
‘
lock
’
(encrypt) or
‘
unlock
’
(decrypt) a
message. Public key encryption uses key pairs, which consist of a public (freely
available) key and a private (secret) key. The public key is used for encryption and
the private key is used for decryption. You can decrypt a message only if you have
the private key. Public key certificates (or
‘
digital IDs
’
) allow users to verify each
other
’
s identity.
Summary of Contents for OX253P
Page 9: ...Contents Overview OX253P User s Guide 10 ...
Page 16: ...17 PART I User s Guide ...
Page 17: ...18 ...
Page 21: ...Chapter 1 Getting Started OX253P User s Guide 22 ...
Page 27: ...Chapter 2 Introducing the Web Configurator OX253P User s Guide 28 ...
Page 44: ...45 PART II Technical Reference ...
Page 45: ...46 ...
Page 85: ...Chapter 8 The NAT Configuration Screens OX253P User s Guide 86 ...
Page 117: ...Chapter 10 The Certificates Screens OX253P User s Guide 118 ...
Page 127: ...Chapter 11 The Firewall Screens OX253P User s Guide 128 ...
Page 171: ...Chapter 16 The Status Screen OX253P User s Guide 172 ...
Page 179: ...Chapter 17 Troubleshooting OX253P User s Guide 180 ...
Page 183: ...Chapter 18 Product Specifications OX253P User s Guide 184 ...
Page 215: ...Appendix B Setting Up Your Computer s IP Address OX253P User s Guide 216 ...
Page 227: ...Appendix C Pop up Windows JavaScripts and Java Permissions OX253P User s Guide 228 ...
Page 278: ...Index OX253P User s Guide 279 ...
Page 279: ...Index OX253P User s Guide 280 ...