Avaya Configuring Data Encryption Services Instrukcja Użytkownika Strona 5

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 62
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 4
117386-A Rev. A
v
Contents
About This Guide
Before You Begin .............................................................................................................. xi
Conventions ......................................................................................................................xii
Acronyms .........................................................................................................................xiii
Ordering Bay Networks Publications ...............................................................................xiii
Bay Networks Customer Service ..............................................................................xiv
How to Get Help ..............................................................................................................xiv
Chapter 1
Data Encryption Overview
Data Encryption Architecture ..........................................................................................1-1
Data Encryption Standard (DES) .............................................................................1-2
40-Bit and 56-Bit Encryption Strengths .............................................................1-2
Message Digest 5 (MD5) .........................................................................................1-3
WAN Encryption Protocol (WEP) .............................................................................1-3
Security and Data Encryption .........................................................................................1-3
Site Security .............................................................................................................1-4
Configuration Security ..............................................................................................1-4
Encryption Keys ..............................................................................................................1-4
Random Number Generators (RNGs) ......................................................................1-5
Node Protection Key (NPK) ......................................................................................1-6
Generating an NPK ...........................................................................................1-6
Entering the NPK on the Router ........................................................................1-6
Choosing a Secure Shell Password ...................................................................1-7
Entering the NPK into Site Manager ..................................................................1-7
Long-Term Shared Secret (LTSS) ............................................................................1-7
Master Encryption Key (MEK) ..................................................................................1-8
Traffic Encryption Key (TEK) ....................................................................................1-8
Przeglądanie stron 4
1 2 3 4 5 6 7 8 9 10 ... 61 62

Komentarze do niniejszej Instrukcji

Brak uwag