Motorola Wireless Broadband Platform User Manual

Security and the Motorola
Canopy™ Wireless Broadband
Platform
(Advanced Security Techniques)
Introduction......................................................................................................................... 1
Why Are Security Measures Necessary?............................................................................ 1
Clear Text Transmissions ............................................................................................... 1
Passive Monitoring ......................................................................................................... 2
End-to-End Security........................................................................................................ 2
Security Features of the Canopy System ............................................................................ 2
Canopy’s Proprietary Protocol........................................................................................ 3
Authentication................................................................................................................. 3
Key Management............................................................................................................ 4
Encryption....................................................................................................................... 5
Data Encryption Standard (DES)................................................................................ 5
Advanced Encryption Standard (AES) ....................................................................... 6
Summary............................................................................................................................. 8
List of Tables
Table 1. The Authentication Process ................................................................................. 4
Table 2. Canopy Key Management.................................................................................... 4
Table 3. Methods of Encryption and Their Associated Keys............................................. 7
List of Acronyms
AES...................................................................Advanced Encryption Standard
AP.....................................................................Access Point
BAM .................................................................Bandwidth and Authentication Manager
BH.....................................................................Backhaul Module
CMM................................................................Cluster Management Module
DES ..................................................................Data Encryption Standard
DHCP ..............................................................Dynamic Host Configuration Protocol
FIPS........................................................Federal Information Processing Standards
IP ......................................................................Internet Protocol
LAN ..................................................................Local Area Network
NAT ..................................................................Network Address Translation
QoS...................................................................Quality of Service
SM.....................................................................Subscriber Module
SNMP...............................................................Simple Network Management Protocol
SQL...................................................................Structured Queary Language
TIA....................................................................Telecommunications Industry Association
NOTICE
The information in this publication is subject to change without notice. Motorola shall not be liable for technical or editorial errors or omissions nor for any damages resulting from the use of this material.
Each configuration tested or described may or may not be the only available solution. This test is not a determination of product quality or correctness, nor does it ensure compliance with any federal, state or local requirements. Motorola does not warrant products other than its own strictly as stated in Motorola’s product warranties.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. Canopy is a trademark of Motorola, Inc. All other product or service names are the property of their respective owners. © Motorola, Inc. 2003.
Loading...
+ 9 hidden pages