Avaya Configuring Integrated IP Security Instrukcja Użytkownika Strona 6

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 72
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 5
vi 304111-A Rev 00
Security Policy Database (SPD) ..............................................................................2-6
Security Associations .....................................................................................................2-6
Security Associations for Bidirectional Traffic ...........................................................2-7
Security Parameter Index (SPI) ................................................................................2-7
Summarizing Security Policies and SAs .........................................................................2-8
Security Protocols ...........................................................................................................2-9
IPsec Services ..............................................................................................................2-10
Confidentiality .........................................................................................................2-10
Integrity ..................................................................................................................2-10
Authentication ........................................................................................................2-10
Installing IP Security (IPsec) Software .........................................................................2-11
Upgrading Software ...............................................................................................2-11
Installation Instructions ..........................................................................................2-11
Chapter 3
Configuring IPsec
Site Security ...................................................................................................................3-1
Configuration Security ....................................................................................................3-1
Encryption Keys .......................................................................................................3-2
Random Number Generator (RNG) .........................................................................3-2
Node Protection Key (NPK) ............................................................................................3-2
Generating and Using NPKs ....................................................................................3-3
Generating an NPK ...........................................................................................3-3
Entering the NPK on the Router ........................................................................3-4
Entering an NPK and a Seed for Encryption ..................................................................3-4
Changing NPKs ........................................................................................................3-5
Monitoring NPKs ......................................................................................................3-6
Enabling IPsec ................................................................................................................3-6
Creating Policies .............................................................................................................3-7
Criteria Specifications ..............................................................................................3-7
Action Specifications ................................................................................................3-7
Policy Considerations ...............................................................................................3-8
Creating Security Associations .....................................................................................3-11
Disabling IPsec .............................................................................................................3-13
Przeglądanie stron 5
1 2 3 4 5 6 7 8 9 10 11 ... 71 72

Komentarze do niniejszej Instrukcji

Brak uwag