Troubleshooting guide

Cingular Communication Manager Help
54
GSM Security
Cingular maintains a comprehensive security policy that dictates the
requirements and procedures to help maintain the security of Cingular
networks. Any network security architecture must take into account end-
to-end communications, as well as all the individual links and nodes that
make up the network. The primary security components of an application
that uses the Cingular GSM network are:
User Authentication
A device can be configured so that a user is prompted to enter a personal
identification number (PIN) before being able to use the device.
Network access authentication
The network authenticates a user device against information stored in the
SIM.
Encryption
The radio link is protected by further encrypting information between the
mobile device and the infrastructure node called the Serving GPRS Node
(SGSN).
Protection of IP addresses
IP addresses are encrypted, never transmitted in the clear.
Customer Supplied VPN
VPNs work across the Cingular network and VPN launch can be integrated
into Cingular Communication Manager connectivity application.