Avaya Configuring IP Security Services Manual de usuario Pagina 21

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 100
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 20
Overview of IPsec
304111-B Rev 00
1-3
Integrity
Integrity determines whether the data has been altered during transit. The ESP
protocol ensures that data has not been modified as it passes between the security
gateways. The ESP protocol uses the HMAC MD5 (RFC 2403) or HMAC SHA-1
(RFC 2404) transform.
You set integrity with the integrity algorithm and integrity key parameters. The
integrity algorithm and integrity key must be identical on both ends of an IPsec
SA.
Authentication
Authentication ensures that data has been transmitted by the identified source.
Additional IPsec Services
Within the IPsec framework, additional security services are provided. An access
control service ensures authorized use of the network, and an auditing service
tracks all actions and events.
IPsec services can be configured on an interface-by-interface basis. Up to 127
inbound and 127 outbound security policies (customized) are supported on each
IPsec interface.
How IPsec Works
IPsec services are bundled as an Internet Protocol (IP) encryption packet. The
packets resemble ordinary IP packets to Internet routing nodes; only the sending
and receiving devices are involved in the encryption. IPsec packets are delivered
over the Internet like ordinary IP packets to branch offices, corporate partners, or
other remote organizations in a secure, encrypted, and private manner.
Several well-established technologies provide encryption and authentication at the
application layer. IPsec adds security at the underlying network layer, providing a
higher degree of security for all applications, including those without any security
features of their own.
Vista de pagina 20
1 2 ... 16 17 18 19 20 21 22 23 24 25 26 ... 99 100

Comentarios a estos manuales

Sin comentarios