Avaya Configuring Data Encryption Services Instrukcja Użytkownika Strona 21

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 62
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 20
Data Encryption Overview
117386-A Rev. A
1-5
Figure 1-1. Hierarchy of Encryption Keys
The keys are the
Node Protection Key (NPK). It encrypts the LTSS.
Long-Term Shared Secret (LTSS). It is the sourcefor the Master Encryption
Key.
Master Encryption Key (MEK). It encrypts the Traffic Encryption Key.
Traffic Encryption Key (TEK). The TEK encrypts the data that travels across
the network.
Random Number Generators (RNGs)
RNGs generate values for the keys. These values are statistically random. An
RNG uses as its source a
seed
that you supply. Refer to
Creating Seeds” in
Cha
pter 3 for instructions.
Site Manager uses two of the RNGs to generate NPKs and LTSSs. The router uses
the third RNG to generate TEKs.
WEP0001A
Billerica: NPK
Santa Clara: NPK
Billerica-SC: LTSS
Billerica-NY: LTSS
.....
1
2
12
12
23
24
13
FR or PPP
Site Manager
Santa Clara
Billerica
2
NPK
1
NPK
LTSS
LTSS
LTSS
12
12
13
14
LTSS
LTSS
LTSS
TEK Data
KEK=(LTSS , TIME)
Przeglądanie stron 20
1 2 ... 16 17 18 19 20 21 22 23 24 25 26 ... 61 62

Komentarze do niniejszej Instrukcji

Brak uwag