Avaya BCM 4.0 Networking Przewodnik Konfiguracji Strona 652

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 758
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 651
652 Chapter 68 Virtual Private Networks (VPN)
N0060606N0060606
Encryption
All of the following encryption methods ensure that the packets have come from the original
source at the secure end of the tunnel.
Table 160 shows a comparison of the security provided by the available encryption and
authentication methods.
The encryption level you choose is made of three components:
the protocol
the encryption method
the authentication method
Protocol
The protocol can be ESP or AH.
Table 160 Comparing Encryption and Authentication Methods
Method
(strongest to weakest)
Encryption of IP
Packet Payload
Authentication of
IP Packet Payload
Authentication of
Entire IP Packet
ESP-AES128-SHA1 Ye s Ye s No
ESP-3DES-SHA1 Ye s Ye s No
ESP-3DES-MD5 Ye s Ye s No
ESP-DES56-SHA1 Ye s Ye s No
ESP-DES56-MD5 Ye s Ye s No
AH HMAC SHA1 No No Ye s
AH HMAC MD5 No No Ye s
Note: Using higher-level encryption, such as AES-128, requires more system resources
and increases packet latency. You need to consider this when designing your overall
network.
Note: If two devices have different encryption settings, the two devices will negotiate
downward until they agree on a compatible encryption capability. For example, if
Switch A attempts to negotiate Triple DES encryption with Switch B that is using 56-bit
DES, then the Switch B will reject Triple DES encryption in favor of the 56-bit DES.
Each of the systems must have at least one encryption setting in common. If they do not, a
tunnel will not be negotiated. In the example above, both systems must have 56-bit DES
enabled.
Przeglądanie stron 651
1 2 ... 647 648 649 650 651 652 653 654 655 656 657 ... 757 758

Komentarze do niniejszej Instrukcji

Brak uwag