Chapter 8 The WAN Configuration Screens
User’s Guide
89
PKM
This field displays the Privacy Key Management version number.
PKM provides security between the WiMAX Modem and the base
station. At the time of writing, the WiMAX Modem supports PKMv2
only. See the WiMAX security appendix for more information.
Authentication
This field displays the user authentication method. Authentication is
the process of confirming the identity of a mobile station (by means
of a username and password, for example).
Check with your service provider if you are unsure of the correct
setting for your account.
Choose from the following user authentication methods:
• TTLS (Tunnelled Transport Layer Security)
• TLS (Transport Layer Security)
Note: Not all WiMAX Modems support TLS authentication.
Check with your service provider for details.
TTLS Inner EAP
This field displays the type of secondary authentication method.
Once a secure EAP-TTLS connection is established, the inner EAP is
the protocol used to exchange security information between the
mobile station, the base station and the AAA server to authenticate
the mobile station. See the WiMAX security appendix for more
details.
This field is available only when TTLS is selected in the
Authentication field.
The WiMAX Modem supports the following inner authentication
types:
• CHAP (Challenge Handshake Authentication Protocol)
• MSCHAP (Microsoft CHAP)
• MSCHAPV2 (Microsoft CHAP version 2)
• PAP (Password Authentication Protocol)
Auth Mode
Select the authentication mode from the drop-down list box.
This field is not available in all WiMAX Modems. Check with your
service provider for details.
The WiMAX Modem supports the following authentication modes:
• User Only
• Device Only with Cert
• Certs and User Authentication
Certificate
This is the security certificate the WiMAX Modem uses to
authenticate the AAA server. Use the TOOLS > > Trusted CAs
screen to import certificates to the WiMAX Modem.
WAN IP Address Assignment
Table 19
ADVANCED > WAN Configuration > Internet Connection > ISP
Parameters for Internet Access (continued)
LABEL
DESCRIPTION
Summary of Contents for MAX-306M1
Page 2: ......
Page 8: ...Safety Warnings User s Guide 8...
Page 10: ...Contents Overview User s Guide 10...
Page 24: ...List of Figures User s Guide 24...
Page 30: ...30...
Page 63: ...63 PART II Basic Screens The Main Screen 38 The Setup Screens 65...
Page 64: ...64...
Page 72: ...72...
Page 84: ...Chapter 7 The LAN Configuration Screens User s Guide 84...
Page 96: ...Chapter 8 The WAN Configuration Screens User s Guide 96...
Page 108: ...Chapter 9 The VPN Transport Screens User s Guide 108...
Page 118: ...Chapter 10 The NAT Configuration Screens User s Guide 118...
Page 130: ...130...
Page 148: ...Chapter 12 The Service Configuration Screens User s Guide 148...
Page 158: ...Chapter 13 The Phone Screens User s Guide 158...
Page 164: ...Chapter 14 The Phone Book Screens User s Guide 164...
Page 166: ...166...
Page 188: ...Chapter 15 The Certificates Screens User s Guide 188...
Page 198: ...Chapter 16 The Firewall Screens User s Guide 198...
Page 218: ...Chapter 19 QoS User s Guide 218...
Page 234: ...Chapter 20 The Logs Screens User s Guide 234...
Page 247: ...247 PART VI Troubleshooting and Specifications Troubleshooting 249 Product Specifications 257...
Page 248: ...248...
Page 256: ...Chapter 22 Troubleshooting User s Guide 256...
Page 264: ...Chapter 23 Product Specifications User s Guide 264...
Page 266: ...266...
Page 298: ...Appendix B Setting Up Your Computer s IP Address User s Guide 298...
Page 308: ...Appendix C Pop up Windows JavaScripts and Java Permissions User s Guide 308...
Page 352: ...Appendix E Importing Certificates User s Guide 352...
Page 354: ...Appendix F SIP Passthrough User s Guide 354...
Page 370: ...Appendix I Customer Support User s Guide 370...
Page 376: ...Index User s Guide 376...