R -----s – Motorola Netopia 3342N User Manual

Page 339

Advertising
background image

339

-----R-----

repeater. Device that regenerates and propagates electrical signals between two network segments. Also
known as a hub.

RFC. Request for Comment. Set of documents that specify the conventions and standards for TCP/IP net-
working.

RIP. Routing Information Protocol. Protocol responsible for distributing information about available routes
and networks from one router to another.

RJ-11. Four-pin connector used for telephones.

RJ-45. Eight-pin connector used for 10BaseT (twisted pair Ethernet) networks.

route. Path through a network from one node to another. A large internetwork can have several alternate
routes from a source to a destination.

routing table. Table stored in a router or other networking device that records available routes and dis-
tances for remote network destinations.

-----S-----

SA Encrypt Type. SA Encryption Type refers to the symmetric encryption type. This encryption algorithm
will be used to encr ypt each data packet. SA Encr yption Type values suppor ted include

DES and 3DES.

SA Hash Type. SA Hash Type refers to the Authentication Hash algorithm used during SA negotiation. Val-
ues suppor ted include

MD5 SHA1. N/A will display if NONE is chose for Auth Protocol.

Security Association. From the IPSEC point of view, an SA is a data structure that describes which trans-
formation is to be applied to a datagram and how. The SA specifies:

The authentication algorithm for AH and ESP

The encr yption algorithm for ESP

The encr yption and authentication keys

Lifetime of encr yption keys

The lifetime of the SA

Replay prevention sequence number and the replay bit table

An arbitrar y 32-bit number called a Security Parameters Index (SPI), as well as the destination host’s
address and the IPSEC protocol identifier, identify each SA. An SPI is assigned to an SA when the SA is
negotiated. The SA can be referred to by using an SPI in AH and ESP transformations. SA is unidirectional.
SAs are commonly setup as bundles, because typically two SAs are required for communications. SA man-
agement is always done on bundles (setup, delete, relay).

serial communication. Method of data transmission in which data bits are transmitted sequentially over a
communication channel

SHA-1. An implementation of the U.S. Government Secure Hash Algorithm; a 160-bit authentication algo-
rithm.

Advertising
This manual is related to the following products: