Avaya Configuring IP Security Services Manual de usuario Pagina 6

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 100
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 5
vi 304111-B Rev 00
How IKE Negotiates Security Associations ............................................................1-13
Security Parameter Index (SPI) ..............................................................................1-13
Summarizing Security Policies and SAs .......................................................................1-14
Security Protocols .........................................................................................................1-15
Encapsulating Security Payload .............................................................................1-15
Authentication Header ............................................................................................1-16
Internet Key Exchange (IKE) Protocol ..........................................................................1-17
Perfect Forward Secrecy ........................................................................................1-17
Network Requirements for Bay Networks Routers .......................................................1-18
Supported Routers .................................................................................................1-18
Supported WAN Protocols .....................................................................................1-18
Chapter 2
Getting Started With IPsec
Upgrading Router Software ............................................................................................2-2
Installing the IPsec Software ..........................................................................................2-2
Completing the Installation Process ..................................................................2-3
Installing Triple DES Encryption ...............................................................................2-3
Securing Your Site ..........................................................................................................2-4
Securing Your Configuration ...........................................................................................2-4
Encryption Keys .......................................................................................................2-4
Random Number Generator (RNG) .........................................................................2-5
Creating a Node Protection Key (NPK) ..........................................................................2-5
Generating NPKs .....................................................................................................2-5
Entering an Initial NPK and a Seed for Encryption .........................................................2-6
Changing an NPK ....................................................................................................2-8
Monitoring NPKs ......................................................................................................2-8
Chapter 3
Configuring IPsec
Enabling IPsec and IKE ..................................................................................................3-1
Creating Policies .............................................................................................................3-2
Specifying Criteria ....................................................................................................3-2
Specifying an Action .................................................................................................3-3
Policy Considerations ...............................................................................................3-3
Creating an Outbound Policy ...................................................................................3-4
Vista de pagina 5
1 2 3 4 5 6 7 8 9 10 11 ... 99 100

Comentarios a estos manuales

Sin comentarios