Laserfiche WebLink
ECHILY _ f <br /> Ir <br /> a The Capacity 10 De CrEat Things. <br /> Over- view <br /> .. -. .. ....-, L .. <br /> .'.�ti�f' ti..' Fr•, .!.. ,,,f.f ., <br /> Tsunami"" Mbit System Surly Capabilities <br /> Wireless communications devices provide considerable flexibility by sending signals over airwaves instead of <br /> over wires or fiber: However, sending signals over airwaves creates an opportunity for new security risks for <br /> data interception. This document examines five methods employed by Tsunami Multipoint to ensure highly <br /> secure wireless communications. <br /> Proprietary Wireless and Data Formats <br /> Unlike a Wireless LAN life 802.11b or 502.1 la where the standard is "open," Tsunami 4ultipoint uses a <br /> proprietary communications signaling and data-link protocol. Unless a customer has a Tsunami Multipoint Base <br /> Station Unit or Subscriber Unit, it would be almost impossible to intercept or spoof the wireless data streams. <br /> Pseudo-random Transmission Scrambling <br /> The proprietary signaling scherne pseudo-randomly scrambles the'transmissions with one of over 500,000 <br /> scrambling sequences, thus increasing the difficulty of intercepting a transmission. Using another Subscriber <br /> Unit, it would tape more than one year to search through all scrambling codes. <br /> MAC Address Authentication <br /> The Base Station Unit maintains a user-configurable and password controlled table of acrd-lori ed subscriber unit <br /> MAC addresses. Subscriber units cannot talk to the network unless the Base Station Unit authenticates its 1 IA <br /> address and "adds" it to the-network. <br /> k. <br /> MAC Address Filtering <br /> The Subscriber Units can be configured to filter the downlink traffic stream to prevent a Subscriber Unit from � <br /> outputting traffic that is destined to another Subscriber Unit. The filtering restrictions may be based upon <br /> Ethernet addresses, ILA 'addr-esse-s, or IP addresses. Only the network operator can configure the filtering <br /> controls. This prevents unauthorized access of another user's data. <br /> Theft Protection <br /> Base Station Units measure the distance of the connection to each Subscriber Unit. If one of the Subscriber Units <br /> is physically moved to another location, the Base Station Unit will detect that the distance is different and will <br /> signal an alarm to the network administrator. This protects against someone stealing a Subscriber Unit and <br /> using its valid MAC --address to enter the network.Subscriber Units will not listen to a Bas: Station U-1-iii u nile s <br /> they are "added" to the network aria the Base Station Unit. <br /> Summary <br /> Using these five techniques, which provide protection at the physical, network and application layers of the <br /> network, Tsunami Multipoint provides bath a highly secure and robust system to keep out wifeless <br /> eavesdropping and malicious user attacks. <br /> Ar Proxim Corporation tel: 800.229.1630 <br /> ��e Cu acffy- ro DG gent Things. 935 Stewart give tel: 408.71, 70D <br /> Sunnyvale, California 94085 fax: 408.731.3675 <br /> 02002 Proxim Corporation,Ail ri9htr,reserved,Lynx is a registered trademark,and Tsunarni,3traLurn,Harmony..Symphony.Skyline.Proxim and ihe Proxim logo are <br /> trademarks of Proxim Corporation.Specifications are subject to change without notice, TT9.0602 <br />