Avaya Configuring IPsec Services Bedienungsanleitung Seite 8

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 122
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 7
viii 308630-14.00 Rev 00
Security Associations .............................................................................................1-11
Automated Security Associations Using Internet Key Exchange (IKE) ...........1-12
Manual Security Associations ..........................................................................1-12
Security Associations for Bidirectional Traffic ..................................................1-12
How IKE Negotiates Security Associations .....................................................1-13
Security Parameter Index (SPI) .......................................................................1-13
Summarizing Security Policies and SAs ................................................................1-14
Security Protocols .........................................................................................................1-15
Encapsulating Security Payload .............................................................................1-15
Authentication Header ............................................................................................1-16
Internet Key Exchange (IKE) Protocol ..........................................................................1-17
Perfect Forward Secrecy ........................................................................................1-17
Chapter 2
Installing IPsec
Upgrading Router Software ............................................................................................2-2
Installing the IPsec Software ..........................................................................................2-2
Completing the Installation Process .........................................................................2-3
Installing Triple DES Encryption ...............................................................................2-3
Securing Your Site ..........................................................................................................2-4
Securing Your Configuration ...........................................................................................2-4
Encryption Keys .......................................................................................................2-4
Random Number Generator (RNG) .........................................................................2-5
Creating and Using Node Protection Keys (NPKs) .........................................................2-5
Generating NPKs .....................................................................................................2-5
Entering an Initial NPK and a Seed for Encryption ..................................................2-6
Changing an NPK ....................................................................................................2-8
Monitoring NPKs ......................................................................................................2-8
Chapter 3
Starting IPsec
Enabling IPsec and IKE ..................................................................................................3-1
Creating Policies .............................................................................................................3-2
Specifying Criteria ....................................................................................................3-2
Specifying an Action .................................................................................................3-3
Policy Considerations ...............................................................................................3-3
Seitenansicht 7
1 2 3 4 5 6 7 8 9 10 11 12 13 ... 121 122

Kommentare zu diesen Handbüchern

Keine Kommentare