User's Manual
BTW Configuration & User’s Guide
November 27, 2001 WIDCOMM Inc. Confidential and Proprietary
iii
(Continued from the previous page)
6
Security ................................................................................................................ 28
6.1 INTRODUCTION .................................................................................................................28
6.2 A
UTHENTICATION .............................................................................................................28
6.3 A
UTHORIZATION ...............................................................................................................28
6.4 E
NCRYPTION ....................................................................................................................29
6.5 L
EVELS OF SECURITY .......................................................................................................29
6.6 L
INK KEY .........................................................................................................................29
6.7 P
AIRING DEVICES.............................................................................................................30
6.8 P
ASSKEY .........................................................................................................................30
6.9 S
ECURITY REQUEST DIALOG BOX.....................................................................................31
6.10 S
ECURITY REQUEST DIALOG BOX, ADVANCED BUTTON ....................................................31
7 Technical Support................................................................................................ 32
8 Troubleshooting .................................................................................................. 33
9 Glossary ............................................................................................................... 35