![ZyXEL Communications MAX218M2W Скачать руководство пользователя страница 168](http://html1.mh-extra.com/html/zyxel-communications/max218m2w/max218m2w_user-manual_944535168.webp)
Chapter 12 Maintenance
MAX208M2W Series User’s Guide
164
4
The server disconnects from the MAX208M2W Series once all of its management
operations have been carried out.
Figure 79
OMA-DM Data Management
OMA-DM Authentication
In order to ensure the integrity of the connection between an OMA-DM server and
the MAX208M2W Series, communication between the two is encoded using one of
three common algorithms. They are not intended to be used in lieu of proper
digital security, but instead as a means of transmitting multiple disparate types of
data over HTTP. Security encryption for communication is handled by different
processes configured elsewhere in the MAX208M2W Series’s web configurator
Basic Access Authentication
–
Sends a person’s user name and password in
Base64. This auhentication protocol is supported by all browsers that are HTTP
1.0/1.1 compliant. Although converted to Base64 for the sake of cross-
compatibility, credentials are nonetheless passed between the web browser and
the server in plaintext, making it extremely easy to intercept and read. As such, it
is rarely used anymore.
Digest Access Authentication
–
This protocol was designed to replace basic
access authentication. Instead of encoding a user name and password in plaintext,
this protocol uses what is known as an MD5 message authentication code. It
allows the server to issue a single-use, randomly generated number (known as a
‘nonce’) to the client (in this case, the web browser), which then uses the number
as the ‘public key’ for encrypting its data. When the server receives the encrypted
data, it unlocks it using the ‘key’ that was just provided. While stronger than basic
access authentication, this protocol is not as strong as, say, HMAC, or as secure as
the client using a client-side private key encryption scheme.
Hash Message Authentication Code
–
Also known as HMAC, this code relies on
cryptographic hash functions to bolster an existing protocol, such as MD5. It is a
method for generating a stronger, significantly higher encryption key.
A
B
1
2
3
4
Содержание MAX218M2W
Страница 2: ......
Страница 10: ...Contents Overview MAX208M2W Series User s Guide 10...
Страница 16: ...Table of Contents MAX208M2W Series User s Guide 16 Index 297...
Страница 17: ...17 PART I User s Guide...
Страница 18: ...18...
Страница 24: ...Chapter 1 Getting Started MAX208M2W Series User s Guide 24...
Страница 42: ...Chapter 3 Setup Wizard MAX208M2W Series User s Guide 40...
Страница 62: ...Chapter 4 Tutorials MAX208M2W Series User s Guide 60...
Страница 63: ...61 PART II Technical Reference...
Страница 64: ...62...
Страница 90: ...Chapter 6 WiMAX MAX208M2W Series User s Guide 88...
Страница 134: ...Chapter 8 Security MAX208M2W Series User s Guide 132...
Страница 158: ...Chapter 10 The VoIP Account Screens MAX208M2W Series User s Guide 156...
Страница 206: ...Chapter 14 Product Specifications MAX208M2W Series User s Guide 202...
Страница 238: ...Appendix B Setting Up Your Computer s IP Address MAX208M2W Series User s Guide 234...
Страница 248: ...Appendix C Pop up Windows JavaScript and Java Permissions MAX208M2W Series User s Guide 244...
Страница 292: ...Appendix E Importing Certificates MAX208M2W Series User s Guide 288...
Страница 306: ...Index MAX208M2W Series User s Guide 302...