Avaya Configuring IPsec Services Manual de usuario Pagina 8

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 122
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 7
viii 308630-14.00 Rev 00
Security Associations .............................................................................................1-11
Automated Security Associations Using Internet Key Exchange (IKE) ...........1-12
Manual Security Associations ..........................................................................1-12
Security Associations for Bidirectional Traffic ..................................................1-12
How IKE Negotiates Security Associations .....................................................1-13
Security Parameter Index (SPI) .......................................................................1-13
Summarizing Security Policies and SAs ................................................................1-14
Security Protocols .........................................................................................................1-15
Encapsulating Security Payload .............................................................................1-15
Authentication Header ............................................................................................1-16
Internet Key Exchange (IKE) Protocol ..........................................................................1-17
Perfect Forward Secrecy ........................................................................................1-17
Chapter 2
Installing IPsec
Upgrading Router Software ............................................................................................2-2
Installing the IPsec Software ..........................................................................................2-2
Completing the Installation Process .........................................................................2-3
Installing Triple DES Encryption ...............................................................................2-3
Securing Your Site ..........................................................................................................2-4
Securing Your Configuration ...........................................................................................2-4
Encryption Keys .......................................................................................................2-4
Random Number Generator (RNG) .........................................................................2-5
Creating and Using Node Protection Keys (NPKs) .........................................................2-5
Generating NPKs .....................................................................................................2-5
Entering an Initial NPK and a Seed for Encryption ..................................................2-6
Changing an NPK ....................................................................................................2-8
Monitoring NPKs ......................................................................................................2-8
Chapter 3
Starting IPsec
Enabling IPsec and IKE ..................................................................................................3-1
Creating Policies .............................................................................................................3-2
Specifying Criteria ....................................................................................................3-2
Specifying an Action .................................................................................................3-3
Policy Considerations ...............................................................................................3-3
Vista de pagina 7
1 2 3 4 5 6 7 8 9 10 11 12 13 ... 121 122

Comentarios a estos manuales

Sin comentarios