User guide
Creating two-factor authentication methods..................................................................................................................... 98
Two-factor content protection...................................................................................................................................................... 99
Unbinding a smart card from a BlackBerry device..................................................................................................................... 99
Protecting Bluetooth connections on a BlackBerry device........................................................................................................ 100
Using CHAP to open a Bluetooth connection between the BlackBerry Desktop Software and a BlackBerry device
.................................................................................................................................................................................................. 100
16 Wi-Fi enabled BlackBerry devices............................................................................................................................................. 101
Types of Wi-Fi networks................................................................................................................................................................. 101
Security features of a Wi-Fi enabled BlackBerry device............................................................................................................. 102
Protecting a connection between a Wi-Fi enabled BlackBerry device and an enterprise Wi-Fi network............................ 104
How a Wi-Fi enabled BlackBerry device can connect to the BlackBerry Infrastructure......................................................... 104
How an SSL connection between a Wi-Fi enabled BlackBerry device and the BlackBerry Infrastructure protects
data.......................................................................................................................................................................................... 105
Process flow: Opening an SSL connection between the BlackBerry Infrastructure and a Wi-Fi enabled BlackBerry
device....................................................................................................................................................................................... 105
Cipher suites that a Wi-Fi enabled BlackBerry device supports for opening SSL connections and TLS connections
.................................................................................................................................................................................................. 105
Managing how a BlackBerry device connects to an enterprise Wi-Fi network....................................................................... 107
How the BlackBerry Enterprise Solution protects sensitive Wi-Fi information....................................................................... 107
Using a VPN with a Wi-Fi enabled BlackBerry device................................................................................................................ 107
Permitting a Wi-Fi enabled BlackBerry device to log in to a VPN concentrator............................................................ 108
Using a segmented network to reduce the spread of malware on an enterprise Wi-Fi network that uses a VPN
.................................................................................................................................................................................................. 108
Using a captive portal to connect to an enterprise Wi-Fi network or Wi-Fi hotspot.............................................................. 109
Protecting a connection between a Wi-Fi enabled BlackBerry device and an enterprise Wi-Fi network using RSA
authentication................................................................................................................................................................................. 109
Process flow: Generating a token code for a software token............................................................................................ 109
17 Layer 2 security methods that a Wi-Fi enabled BlackBerry device supports..................................................................... 111
WEP encryption............................................................................................................................................................................... 111
PSK protocol.................................................................................................................................................................................... 112
IEEE 802.1X standard..................................................................................................................................................................... 112
Caching a PMK when using the IEEE 802.1X standard..................................................................................................... 112
Process flow: Authenticating a Wi-Fi enabled BlackBerry device with an enterprise Wi-Fi network using the IEEE
802.1X standard...................................................................................................................................................................... 113