
Appendix A WiMAX Security
User’s Guide
281
the network. In addition to the shared key, password information exchanged is
also encrypted to protect the network from unauthorized access.
Diameter
Diameter (RFC 3588) is a type of AAA server that provides several improvements
over RADIUS in efficiency, security, and support for roaming.
Security Association
The set of information about user authentication and data encryption between two
computers is known as a security association (SA). In a WiMAX network, the
process of security association has three stages.
• Authorization request and reply
The MS/SS presents its public certificate to the base station. The base station
verifies the certificate and sends an authentication key (AK) to the MS/SS.
• Key request and reply
The MS/SS requests a transport encryption key (TEK) which the base station
generates and encrypts using the authentication key.
• Encrypted traffic
The MS/SS decrypts the TEK (using the authentication key). Both stations can
now securely encrypt and decrypt the data flow.
CCMP
All traffic in a WiMAX network is encrypted using CCMP (Counter Mode with Cipher
Block Chaining Message Authentication Protocol). CCMP is based on the 128-bit
Advanced Encryption Standard (AES) algorithm.
‘Counter mode’ refers to the encryption of each block of plain text with an
arbitrary number, known as the counter. This number changes each time a block
of plain text is encrypted. Counter mode avoids the security weakness of repeated
identical blocks of encrypted text that makes encrypted data vulnerable to
pattern-spotting.
‘Cipher Block Chaining Message Authentication’ (also known as CBC-MAC) ensures
message integrity by encrypting each block of plain text in such a way that its
encryption is dependent on the block before it. This series of ‘chained’ blocks
creates a message authentication code (MAC or CMAC) that ensures the encrypted
data has not been tampered with.
Summary of Contents for MAX-306
Page 2: ......
Page 8: ...Safety Warnings User s Guide 8...
Page 10: ...Contents Overview User s Guide 10...
Page 30: ...30...
Page 36: ...Chapter 1 Getting Started User s Guide 36...
Page 46: ...Chapter 2 Introducing the Web Configurator User s Guide 46...
Page 64: ...Chapter 4 VoIP Connection Wizard User s Guide 64...
Page 65: ...65 PART II Basic Screens The Main Screen 40 The Setup Screens 67...
Page 66: ...66...
Page 74: ...74...
Page 88: ...Chapter 6 The LAN Configuration Screens User s Guide 88...
Page 112: ...Chapter 8 The Wi Fi Configuration Screens User s Guide 112...
Page 134: ...Chapter 10 The NAT Configuration Screens User s Guide 134...
Page 146: ...146...
Page 164: ...Chapter 12 The Service Configuration Screens User s Guide 164...
Page 180: ...Chapter 14 The Phone Book Screens User s Guide 180...
Page 182: ...182...
Page 202: ...Chapter 15 The Certificates Screens User s Guide 202...
Page 212: ...Chapter 16 The Firewall Screens User s Guide 212...
Page 226: ...Chapter 18 The Remote Management Screens User s Guide 226...
Page 242: ...Chapter 19 The Logs Screens User s Guide 242...
Page 252: ...Chapter 20 The UPnP Screen User s Guide 252...
Page 265: ...265 PART VI Troubleshooting and Specifications Troubleshooting 267 Product Specifications 275...
Page 266: ...266...
Page 274: ...Chapter 22 Troubleshooting User s Guide 274...
Page 278: ...278...
Page 310: ...Appendix B Setting Up Your Computer s IP Address User s Guide 310...
Page 336: ...Appendix D Pop up Windows JavaScripts and Java Permissions User s Guide 336...
Page 380: ...Appendix F Importing Certificates User s Guide 380...
Page 382: ...Appendix G SIP Passthrough User s Guide 382...
Page 398: ...Appendix J Customer Support User s Guide 398...
Page 405: ...Index User s Guide 405...