User guide
Appendix A: Advanced Settings
A.2.1 Introduction A.2.7 Configuring the Authentication Feature
A.2.2 Security Issues in Tactical Software Products
A.2.8 Configuring the Certificate Feature
A.2.3 SSL/TLS Security Features A.2.9 Troubleshooting
A.2.4 What You Need to Get Started A.2.10 COM/IP AT Commands
A.2.5 Enabling SSL/TLS Security Features A.2.11 Certificate Authorities
A.2.6 Configuring the Encryption Feature
A.2.2 Security Issues in Tactical Software Products
Background
A PC application making a modem connection relies on the telephone line for security, as depicted in the
following diagram:
The modem connection is considered secure in three respects:
1. Data security is provided by the telephone line. Unauthorized wiretapping is considered difficult or
unlikely.
2. The identity of the destination is determined by the telephone number dialed to reach it. It is assumed
that the telephone company always connects to the number dialed.
3. The server receiving the call could verify the identity of the caller by caller ID information or by a call-
back. Neither of these measures is common in real-world applications.
A.2. SSL/TLS Security