Avaya Business Secure Router 252 Configuration - Basics Uživatelský manuál Strana 204

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 460
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 203
204 Chapter 13 VPN
NN47923-500
The Authentication Algorithms, HMAC-MD5 (RFC 2403) and HMAC-SHA-1
(RFC 2404), provide an authentication mechanism for the AH and ESP protocols.
The ESP and AH protocols are necessary to create a Security Association (SA),
the foundation of an IPSec VPN. An SA is built from the authentication provided
by the AH and ESP protocols. The primary function of key management is to
establish and maintain the SA between systems. After the SA is established, the
transport of data can commence.
AH (Authentication Header) protocol
AH protocol (RFC 2402) was designed for integrity, authentication, sequence
integrity (replay resistance), and nonrepudiation but not for confidentiality, for
which the ESP was designed.
In applications where confidentiality is not required or not sanctioned by
government encryption restrictions, an AH can be employed to ensure integrity.
This type of implementation does not protect the information from dissemination
but can be used for verification of the integrity of the information and
authentication of the originator.
ESP (Encapsulating Security Payload) protocol
The ESP protocol (RFC 2406) provides encryption, as well as the services offered
by AH. ESP authenticating properties are limited compared to the AH due to the
exclusion of the IP header information during the authentication process.
However, ESP is sufficient if only the upper layer protocols need to be
authenticated.
Zobrazit stránku 203
1 2 ... 199 200 201 202 203 204 205 206 207 208 209 ... 459 460

Komentáře k této Příručce

Žádné komentáře