
Index-2
304111-B Rev 00
I
IKE
description, 1-11
enabling, 3-1
security associations, 3-8
Image Builder, 2-2
inbound security policies, 1-3, 1-9
initialization vectors (IVs), 2-5
installation, 2-2
integrity algorithm, considerations, 3-8
integrity key, 2-4
integrity service, 1-2, 1-3
Internet Assigned Numbers Authority (IANA), 1-10,
D-1
Internet Engineering Task Force (IETF), role in IPsec
development, 1-2
Internet Key Exchange (IKE)
description, 1-11
explained, 1-17
negotiating security associations, 1-13
using, 3-9, 3-10
IP destination address, 1-11
IP interface, 1-4
IP Security
about, 1-2
enabling, A-2
IPsec
about, 1-2
disabling, 3-13
enabling, 3-1
installating, 2-2
key constructs, 1-5
ISAKMP/Oakley, 1-11
K
k commands, 2-6, B-1
L
log
policy criterion, 3-3
router log NPK confirmation, 2-8
M
management information base (MIB), 2-5, 2-8
Message Digest 5 (MD5), 1-3, 1-16, A-7
N
Node Protection Key (NPK)
configuration considerations, 2-4
Site Manager parameters, A-1
usage, 2-5
O
outbound security policies, 1-3, 1-9
P
perfect-forward secrecy, 1-17
policies
See security policy
policy template
creating inbound, 3-6
creating outbound, 3-4
defined, 1-8
usage, 3-2
PPP support, 1-18
pre-shared key, IKE use, 1-17
product support, xvii
protocol policy criterion, 1-10
protocols supported, 1-18
public data network, tunnel mode use, 1-5
publications, Bay Networks, xvii
Kommentare zu diesen Handbüchern