
Chapter 15 The Certificates Screens
User’s Guide
199
people to verify whether data was signed by you, or by someone else. This
process works as follows.
1
Tim wants to send a message to Jenny. He needs her to be sure that it comes
from him, and that the message content has not been altered by anyone else
along the way. Tim generates a public key pair (one public key and one private
key).
2
Tim keeps the private key and makes the public key openly available. This means
that anyone who receives a message seeming to come from Tim can read it and
verify whether it is really from him or not.
3
Tim uses his private key to sign the message and sends it to Jenny.
4
Jenny receives the message and uses Tim’s public key to verify it. Jenny knows
that the message is from Tim, and she knows that although other people may
have been able to read the message, no-one can have altered it (because they
cannot re-sign the message with Tim’s private key).
5
Additionally, Jenny uses her own private key to sign a message and Tim uses
Jenny’s public key to verify the message.
The WiMAX Device uses certificates based on public-key cryptology to
authenticate users attempting to establish a connection, not to encrypt the data
that you send after establishing a connection. The method used to secure the data
that you send through an established connection depends on the type of
connection. For example, a VPN tunnel might use the triple DES encryption
algorithm.
The certification authority uses its private key to sign certificates. Anyone can
then use the certification authority’s public key to verify the certificates.
A certification path is the hierarchy of certification authority certificates that
validate a certificate. The WiMAX Device does not trust a certificate if any
certificate on its path has expired or been revoked.
Certification authorities maintain directory servers with databases of valid and
revoked certificates. A directory of certificates that have been revoked before the
scheduled expiration is called a CRL (Certificate Revocation List). The WiMAX
Device can check a peer’s certificate against a directory server’s list of revoked
certificates. The framework of servers, software, procedures and policies that
handles keys is called PKI (public-key infrastructure).
15.4.1.1 Advantages of Certificates
Certificates offer the following benefits.
Содержание MAX-306
Страница 2: ......
Страница 8: ...Safety Warnings User s Guide 8...
Страница 10: ...Contents Overview User s Guide 10...
Страница 30: ...30...
Страница 36: ...Chapter 1 Getting Started User s Guide 36...
Страница 46: ...Chapter 2 Introducing the Web Configurator User s Guide 46...
Страница 64: ...Chapter 4 VoIP Connection Wizard User s Guide 64...
Страница 65: ...65 PART II Basic Screens The Main Screen 40 The Setup Screens 67...
Страница 66: ...66...
Страница 74: ...74...
Страница 88: ...Chapter 6 The LAN Configuration Screens User s Guide 88...
Страница 112: ...Chapter 8 The Wi Fi Configuration Screens User s Guide 112...
Страница 134: ...Chapter 10 The NAT Configuration Screens User s Guide 134...
Страница 145: ...145 PART IV Voice Screens The Service Configuration Screens 147 The Phone Screens 165 The Phone Book Screens 175...
Страница 146: ...146...
Страница 164: ...Chapter 12 The Service Configuration Screens User s Guide 164...
Страница 180: ...Chapter 14 The Phone Book Screens User s Guide 180...
Страница 182: ...182...
Страница 202: ...Chapter 15 The Certificates Screens User s Guide 202...
Страница 212: ...Chapter 16 The Firewall Screens User s Guide 212...
Страница 226: ...Chapter 18 The Remote Management Screens User s Guide 226...
Страница 242: ...Chapter 19 The Logs Screens User s Guide 242...
Страница 252: ...Chapter 20 The UPnP Screen User s Guide 252...
Страница 265: ...265 PART VI Troubleshooting and Specifications Troubleshooting 267 Product Specifications 275...
Страница 266: ...266...
Страница 274: ...Chapter 22 Troubleshooting User s Guide 274...
Страница 278: ...278...
Страница 310: ...Appendix B Setting Up Your Computer s IP Address User s Guide 310...
Страница 336: ...Appendix D Pop up Windows JavaScripts and Java Permissions User s Guide 336...
Страница 380: ...Appendix F Importing Certificates User s Guide 380...
Страница 382: ...Appendix G SIP Passthrough User s Guide 382...
Страница 398: ...Appendix J Customer Support User s Guide 398...
Страница 405: ...Index User s Guide 405...