Netopia 2200 manual 323

Models: 2200

1 351
Download 351 pages 59.91 Kb
Page 323
Image 323

route. Path through a network from one node to another. A large internet- work can have several alternate routes from a source to a destination.

routing table. Table stored in a router or other networking device that records available routes and distances for remote network destinations.

-----S-----

SA Encrypt Type. SA Encryption Type refers to the symmetric encryption type. This encryption algorithm will be used to encrypt each data packet. SA Encryption Type values supported include DES and 3DES.

SA Hash Type. SA Hash Type refers to the Authentication Hash algorithm used during SA negotiation. Values supported include MD5 SHA1. N/A will display if NONE is chose for Auth Protocol.

Security Association. From the IPSEC point of view, an SA is a data struc- ture that describes which transformation is to be applied to a datagram and how. The SA specifies:

The authentication algorithm for AH and ESP

The encryption algorithm for ESP

The encryption and authentication keys

Lifetime of encryption keys

The lifetime of the SA

Replay prevention sequence number and the replay bit table

An arbitrary 32-bit number called a Security Parameters Index (SPI), as well as the destination host’s address and the IPSEC protocol identifier, identify each SA. An SPI is assigned to an SA when the SA is negotiated. The SA can be referred to by using an SPI in AH and ESP transformations. SA is unidirec- tional. SAs are commonly setup as bundles, because typically two SAs are required for communications. SA management is always done on bundles (setup, delete, relay).

serial communication. Method of data transmission in which data bits are transmitted sequentially over a communication channel

SHA-1.An implementation of the U.S. Government Secure Hash Algorithm; a 160-bit authentication algorithm.

323

Page 323
Image 323
Netopia 2200 manual 323