Appendix A WiMAX Security
OX253P User
’
s Guide
187
the network. In addition to the shared key, password information exchanged is
also encrypted to protect the network from unauthorized access.
Diameter
Diameter (RFC 3588) is a type of AAA server that provides several improvements
over RADIUS in efficiency, security, and support for roaming.
Security Association
The set of information about user authentication and data encryption between two
computers is known as a security association (SA). In a WiMAX network, the
process of security association has three stages.
•
Authorization request and reply
The MS/SS presents its public certificate to the base station. The base station
verifies the certificate and sends an authentication key (AK) to the MS/SS.
•
Key request and reply
The MS/SS requests a transport encryption key (TEK) which the base station
generates and encrypts using the authentication key.
•
Encrypted traffic
The MS/SS decrypts the TEK (using the authentication key). Both stations can
now securely encrypt and decrypt the data flow.
CCMP
All traffic in a WiMAX network is encrypted using CCMP (Counter Mode with Cipher
Block Chaining Message Authentication Protocol). CCMP is based on the 128-bit
Advanced Encryption Standard (AES) algorithm.
‘
Counter mode
’
refers to the encryption of each block of plain text with an
arbitrary number, known as the counter. This number changes each time a block
of plain text is encrypted. Counter mode avoids the security weakness of repeated
identical blocks of encrypted text that makes encrypted data vulnerable to
pattern-spotting.
‘
Cipher Block Chaining Message Authentication
’
(also known as CBC-MAC) ensures
message integrity by encrypting each block of plain text in such a way that its
encryption is dependent on the block before it. This series of
‘
chained
’
blocks
creates a message authentication code (MAC or CMAC) that ensures the encrypted
data has not been tampered with.
Summary of Contents for OX253P
Page 9: ...Contents Overview OX253P User s Guide 10 ...
Page 16: ...17 PART I User s Guide ...
Page 17: ...18 ...
Page 21: ...Chapter 1 Getting Started OX253P User s Guide 22 ...
Page 27: ...Chapter 2 Introducing the Web Configurator OX253P User s Guide 28 ...
Page 44: ...45 PART II Technical Reference ...
Page 45: ...46 ...
Page 85: ...Chapter 8 The NAT Configuration Screens OX253P User s Guide 86 ...
Page 117: ...Chapter 10 The Certificates Screens OX253P User s Guide 118 ...
Page 127: ...Chapter 11 The Firewall Screens OX253P User s Guide 128 ...
Page 171: ...Chapter 16 The Status Screen OX253P User s Guide 172 ...
Page 179: ...Chapter 17 Troubleshooting OX253P User s Guide 180 ...
Page 183: ...Chapter 18 Product Specifications OX253P User s Guide 184 ...
Page 215: ...Appendix B Setting Up Your Computer s IP Address OX253P User s Guide 216 ...
Page 227: ...Appendix C Pop up Windows JavaScripts and Java Permissions OX253P User s Guide 228 ...
Page 278: ...Index OX253P User s Guide 279 ...
Page 279: ...Index OX253P User s Guide 280 ...