Motorola 2200, 7000, 3352N, 3342 manual 339

Models: 2200 3342 3352N 3352 7000

1 368
Download 368 pages 62.68 Kb
Page 339
Image 339

-----R-----

repeater. Device that regenerates and propagates electrical signals between two network segments. Also known as a hub.

RFC. Request for Comment. Set of documents that specify the conventions and standards for TCP/IP net- working.

RIP. Routing Information Protocol. Protocol responsible for distributing information about available routes and networks from one router to another.

RJ-11.Four-pin connector used for telephones.

RJ-45.Eight-pin connector used for 10BaseT (twisted pair Ethernet) networks.

route. Path through a network from one node to another. A large internetwork can have several alternate routes from a source to a destination.

routing table. Table stored in a router or other networking device that records available routes and dis- tances for remote network destinations.

-----S-----

SA Encrypt Type. SA Encryption Type refers to the symmetric encryption type. This encryption algorithm will be used to encrypt each data packet. SA Encryption Type values supported include DES and 3DES.

SA Hash Type. SA Hash Type refers to the Authentication Hash algorithm used during SA negotiation. Val- ues supported include MD5 SHA1. N/A will display if NONE is chose for Auth Protocol.

Security Association. From the IPSEC point of view, an SA is a data structure that describes which trans- formation is to be applied to a datagram and how. The SA specifies:

The authentication algorithm for AH and ESP

The encryption algorithm for ESP

The encryption and authentication keys

Lifetime of encryption keys

The lifetime of the SA

Replay prevention sequence number and the replay bit table

An arbitrary 32-bit number called a Security Parameters Index (SPI), as well as the destination host’s address and the IPSEC protocol identifier, identify each SA. An SPI is assigned to an SA when the SA is negotiated. The SA can be referred to by using an SPI in AH and ESP transformations. SA is unidirectional. SAs are commonly setup as bundles, because typically two SAs are required for communications. SA man- agement is always done on bundles (setup, delete, relay).

serial communication. Method of data transmission in which data bits are transmitted sequentially over a communication channel

SHA-1.An implementation of the U.S. Government Secure Hash Algorithm; a 160-bit authentication algo- rithm.

339

Page 339
Image 339
Motorola 2200, 7000, 3352N, 3342 manual 339