Nokia D211 Cell Phone User Manual


 
Nokia D211 features
42
© Nokia Corporation 2004. All rights reserved.
Transferring files from the computer to the SIM card and vice versa is done by
using a drag-and-drop operation or by using the Copy, Move, and Delete buttons
on the SIM Card tab.
For the changes to take effect, click Apply. Note that the button is inactive if there
is not enough free space on the SIM card. If you have made changes but wish to
restore the previous state, click Restore.
Distributing profiles
The system administrator can create profiles and then distribute them to end users
within a corporation. There are different ways for delivering profiles:
Installation disks: the system administrator can create installation disks which
contain all the software and necessary settings needed for accessing networks
– including profiles. See “Creating installation disks” on page 41.
Network: profiles can be saved to a folder on a network drive from which the
end user can import the profile. See “Importing and exporting profiles” on
page 32.
SIM card: the system administrator can store profiles on SIM cards which can
then be distributed to end users. See “Managing SIM card contents” above.
Text messages: profiles can be distributed by sending a text message that
includes a profile. See “Sending a profile as a text message” on page 32.
WEP security
To increase the security of communication over the wireless local area network,
the Nokia D211 offers the Wired Equivalent Privacy (WEP) security feature. WEP
uses the RC4 algorithm with an up to 152-bit key. The algorithm provides for
security via two methods: authentication and encryption. Authentication is the
means by which one wireless station is verified to have authorisation to
communicate with a second station in a given coverage area.
In the infrastructure operating mode, authentication is established between a
WLAN access point and each wireless station. If a wireless station receives a
packet that has not been scrambled with a correct key, the packet is discarded.
Encrypted messages can be opened by other radio cards only if they all use the
same encryption key. In the ad hoc operating mode, authentication is established
between each wireless station.
The level of security is dependent on the length of the key: the more bits there are
in the key, the longer it takes to decrypt the information sent and the higher the
level of security.
WEP keys consist of a secret key and a 24-bit Initialization Vector. For example,
the 128-bit WEP key has a 104-bit secret key that the user can set, and a 24-bit
Initialization Vector that cannot be controlled by the user. Many manufacturers