
Index-2 117386-A Rev. A
encryption strength, selecting 40-bit or 56-bit,
2-1, 3-18
entering an NPK on a router, 3-9
F
floppy disks, for storing key files, 1-7, 2-4
G
generating
a TEK, 3-11
an LTSS, 3-8
an NPK, 3-7
K
key files
security, 1-7
setting a path to (UNIX), 3-5
keys, 1-2
integrity of, 1-3
LTSS, 1-7
MEK, 1-8
NPK, 1-6
summary, 1-4
TEK, 1-8
L
LTSS
changing, 3-11
creating a seed for
on a PC, 3-3
on a UNIX platform, 3-5
function, A-3
generating, 3-8
storing on removable media, 3-3
LTSS Name, 1-7, 3-17
LTSS Value, 3-17
LTSS, defined, 1-7
M
Management Encryption Key (MEK), 1-8
MEK Change parameter, 3-15, 3-17
Message Digest 5 (MD5), 1-3
N
Node Protection Key (NPK), defined, 1-6
NPK
changing, 3-10
creating a seed for
on a PC, 3-3
on a UNIX platform, 3-5
entering in MIB, 1-7
entering on router, 1-6, 3-9
function, A-1
generating, 3-7
in nonvolatile RAM, 3-9
overwriting, 3-10
selecting, 2-3
storing on removable media, 3-3
O
opening Site Manager, 3-7, 3-8
overwriting an NPK, 3-10
P
password, secure shell, 1-6, 1-7
pcfs utility, 2-4
performance, effect of encryption on, 2-2
publications
ordering, xiii
R
Random Number Generators (RNGs), 1-5
removable media, for storing key files, 1-7, 3-3
routers, syncronizing dates and times, 2-2
Komentarze do niniejszej Instrukcji