
Data Encryption Overview
303520-A Rev. 00
1-9
The TEK automatically changes according to the values in the TEK Change
Seconds and TEK Change Bytes parameters. A sending router generates a new
TEK, and WEP encrypts it. The receiving router notes the change, decrypts it,
replaces the old TEK with the new one, and uses the new one to decrypt current
and future data until the TEK changes again.
Each router has its own TEK and TEK Change attributes that it uses to protect
data that it sends. A link therefore has two TEKs which are different, and which
change independently of each other. For more information on configuring key
change attributes, refer to Appendix A, “
Encryption Parameters.”
Komentarze do niniejszej Instrukcji