
User’s Guide
279
A
P P E N D I X
A
WiMAX Security
Wireless security is vital to protect your wireless communications. Without it,
information transmitted over the wireless network would be accessible to any
networking device within range.
User Authentication and Data Encryption
The WiMAX (IEEE 802.16) standard employs user authentication and encryption to
ensure secured communication at all times.
User authentication is the process of confirming a user’s identity and level of
authorization. Data encryption is the process of encoding information so that it
cannot be read by anyone who does not know the code.
WiMAX uses PKMv2 (Privacy Key Management version 2) for authentication, and
CCMP (Counter Mode with Cipher Block Chaining Message Authentication Protocol)
for data encryption.
WiMAX supports EAP (Extensible Authentication Protocol, RFC 2486) which allows
additional authentication methods to be deployed with no changes to the base
station or the mobile or subscriber stations.
PKMv2
PKMv2 is a procedure that allows authentication of a mobile or subscriber station
and negotiation of a public key to encrypt traffic between the MS/SS and the base
station. PKMv2 uses standard EAP methods such as Transport Layer Security
(EAP-TLS) or Tunneled TLS (EAP-TTLS) for secure communication.
In cryptography, a ‘key’ is a piece of information, typically a string of random
numbers and letters, that can be used to ‘lock’ (encrypt) or ‘unlock’ (decrypt) a
message. Public key encryption uses key pairs, which consist of a public (freely
available) key and a private (secret) key. The public key is used for encryption
and the private key is used for decryption. You can decrypt a message only if you
have the private key. Public key certificates (or ‘digital IDs’) allow users to verify
each other’s identity.
Содержание MAX-306
Страница 2: ......
Страница 8: ...Safety Warnings User s Guide 8...
Страница 10: ...Contents Overview User s Guide 10...
Страница 30: ...30...
Страница 36: ...Chapter 1 Getting Started User s Guide 36...
Страница 46: ...Chapter 2 Introducing the Web Configurator User s Guide 46...
Страница 64: ...Chapter 4 VoIP Connection Wizard User s Guide 64...
Страница 65: ...65 PART II Basic Screens The Main Screen 40 The Setup Screens 67...
Страница 66: ...66...
Страница 74: ...74...
Страница 88: ...Chapter 6 The LAN Configuration Screens User s Guide 88...
Страница 112: ...Chapter 8 The Wi Fi Configuration Screens User s Guide 112...
Страница 134: ...Chapter 10 The NAT Configuration Screens User s Guide 134...
Страница 145: ...145 PART IV Voice Screens The Service Configuration Screens 147 The Phone Screens 165 The Phone Book Screens 175...
Страница 146: ...146...
Страница 164: ...Chapter 12 The Service Configuration Screens User s Guide 164...
Страница 180: ...Chapter 14 The Phone Book Screens User s Guide 180...
Страница 182: ...182...
Страница 202: ...Chapter 15 The Certificates Screens User s Guide 202...
Страница 212: ...Chapter 16 The Firewall Screens User s Guide 212...
Страница 226: ...Chapter 18 The Remote Management Screens User s Guide 226...
Страница 242: ...Chapter 19 The Logs Screens User s Guide 242...
Страница 252: ...Chapter 20 The UPnP Screen User s Guide 252...
Страница 265: ...265 PART VI Troubleshooting and Specifications Troubleshooting 267 Product Specifications 275...
Страница 266: ...266...
Страница 274: ...Chapter 22 Troubleshooting User s Guide 274...
Страница 278: ...278...
Страница 310: ...Appendix B Setting Up Your Computer s IP Address User s Guide 310...
Страница 336: ...Appendix D Pop up Windows JavaScripts and Java Permissions User s Guide 336...
Страница 380: ...Appendix F Importing Certificates User s Guide 380...
Страница 382: ...Appendix G SIP Passthrough User s Guide 382...
Страница 398: ...Appendix J Customer Support User s Guide 398...
Страница 405: ...Index User s Guide 405...