Troubleshooting guide

Connecting to GSM Networks
55
Messaging Button
Click this button to read and write text messages using the Text Messaging
client.
GSM Security
Cingular maintains a comprehensive security policy that dictates the
requirements and procedures to help maintain the security of Cingular
networks. Any network security architecture must take into account end-
to-end communications, as well as all the individual links and nodes that
make up the network. The primary security components of an application
that uses the Cingular GSM
network are:
User Authentication
A device can be configured so that a user is prompted to enter a personal
identification number (PIN) before being able to use the device.
Network access authentication
The network authenticates a user device against information stored in the
SIM.
Encryption
The radio link is protected by further encrypting information between the
mobile device and the infrastructure node called the Serving GPRS Node
(SGSN).
Protection of IP addresses
IP addresses are encrypted, never transmitted in the clear.
Customer Supplied VPN
VPNs work across the Cingular network and VPN launch can be integrated
into Cingular Communication Manager connectivity application.