ZyXEL MAX318M User Guide - Page 186

Server Auth Type, Table 87, LABEL, DESCRIPTION, Basic, Digest MD5, Server Auth, Client Auth Type

Page 186 highlights

Chapter 12 Maintenance Table 87 OMA-DM (continued) LABEL Server Port Server Auth Type DESCRIPTION Enter the port number for the IP address of the OMA-DM server set up in the preceding field. Select the encryption algorithm scheme used by the OMA-DM server to communicate with client devices. If the scheme selected here does not match the actual scheme used by the server, then server will challenge the WiMAX Device to automatically update its settings. Server ID Server Password Server Nonce • None - No authentication. • Basic - Server ID and Password are encoded using a Basic Access Authentication Code. • Digest (MD5) - Server ID and Password are encoded using a Digest Access Authentication Code. • HMAC - Server ID and Password are encoded using a keyed Hash Message Authentication Code. Enter the identification code for the server. This is used by the WiMAX Device during the communication handshake process to identify the server. Enter the password for the server's identification code. This shared public key is used by the WiMAX Device during the communication handshake process to identify the server. The WiMAX Device and the OMA-DM server use nonces to authenticate each other if you select MD5 as the authentication algorithm in the Server Auth Type field. Nonce is an abbreviation of 'number used once'. It is normally a random or pseudo-random number applied in an authentication protocol to protect existing communications from being reused in 'replay attacks'. Client Auth Type Type up to 20 digits for the OMA-DM server nonce. Select the encryption algorithm scheme used by the OMA-DM server to communicate with client devices. If the scheme selected here does not match the actual scheme used by the server, then server will challenge the WiMAX Device to automatically update its settings. • None - No authentication. • Basic - Server ID and Password are encoded using a Basic Access Authentication Code. • Digest (MD5) - Server ID and Password are encoded using a Digest Access Authentication Code. • HMAC - Server ID and Password are encoded using a keyed Hash Message Authentication Code. Client ID Client Password Client Nonce Periodical ClientInitiated Enable Periodical ClientInitiated Interval Note: Make sure that the scheme selected here matches the Server Auth Type. Enter the client name for the WiMAX Device. Enter the password for the WiMAX Device's client name. The WiMAX Device and the OMA-DM server use nonces to authenticate each other if you select MD5 as the authentication algorithm in the Client Auth Type field. Type up to 20 digits for the OMA-DM client nonce. Select this to allow the WiMAX Device to periodically connect to the OMA-DM server and check for configuration updates. If you do not enable this feature then the WiMAX Device can only be updated automatically when the OM-DM server initiates contact with it and if you selected the checkbox on this screen. Enter the time interval (in seconds) at which the WiMAX Device connects to the OMA-DM server. 186 WiMAX Device Configuration User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290

Chapter 12 Maintenance
WiMAX Device Configuration User’s Guide
186
Server Port
Enter the port number for the IP address of the OMA-DM server set up in the
preceding field.
Server Auth Type
Select the encryption algorithm scheme used by the OMA-DM server to
communicate with client devices. If the scheme selected here does not match
the actual scheme used by the server, then server will challenge the WiMAX
Device to automatically update its settings.
None
- No authentication.
Basic
- Server ID and Password are encoded using a Basic Access
Authentication Code.
Digest (MD5)
- Server ID and Password are encoded using a Digest Access
Authentication Code.
HMAC
- Server ID and Password are encoded using a keyed Hash Message
Authentication Code.
Server ID
Enter the identification code for the server. This is used by the WiMAX Device
during the communication handshake process to identify the server.
Server Password
Enter the password for the server’s identification code. This shared public key is
used by the WiMAX Device during the communication handshake process to
identify the server.
Server Nonce
The WiMAX Device and the OMA-DM server use nonces to authenticate each
other if you select
MD5
as the authentication algorithm in the
Server Auth
Type
field. Nonce is an abbreviation of 'number used once'. It is normally a
random or pseudo-random number applied in an authentication protocol to
protect existing communications from being reused in ‘replay attacks’.
Type up to 20 digits for the OMA-DM server nonce.
Client Auth Type
Select the encryption algorithm scheme used by the OMA-DM server to
communicate with client devices. If the scheme selected here does not match
the actual scheme used by the server, then server will challenge the WiMAX
Device to automatically update its settings.
None
- No authentication.
Basic
- Server ID and Password are encoded using a Basic Access
Authentication Code.
Digest (MD5)
- Server ID and Password are encoded using a Digest Access
Authentication Code.
HMAC
- Server ID and Password are encoded using a keyed Hash Message
Authentication Code.
Note:
Make sure that the scheme selected here matches the
Server Auth Type
.
Client ID
Enter the client name for the WiMAX Device.
Client Password
Enter the password for the WiMAX Device’s client name.
Client Nonce
The WiMAX Device and the OMA-DM server use nonces to authenticate each
other if you select
MD5
as the authentication algorithm in the
Client Auth Type
field.
Type up to 20 digits for the OMA-DM client nonce.
Periodical Client-
Initiated Enable
Select this
to allow the WiMAX Device to periodically connect to the OMA-DM
server and check for configuration updates.
If you do not enable this feature then the WiMAX Device can only be updated
automatically when the OM-DM server initiates contact with it and if you selected
the checkbox on this screen.
Periodical Client-
Initiated Interval
Enter the time interval (in seconds) at which the WiMAX Device connects to the
OMA-DM server.
Table 87
OMA-DM (continued)
LABEL
DESCRIPTION