Netopia 6.3 User Manual

Page 152

Advertising
background image

152

Appendix B

-----I-----

IKE

Internet Key Exchange protocol provides automated key management
and is a preferred alternative to manual key management as it pro-
vides better security. Manual key management is practical in a small,
static environment of two or three sites. Exchanging the key is done
through manual means. Because IKE provides automated key
exchange, it is good for larger, more dynamic environments.

INSPECTION

The best option for Internet communications security is to have an
SMLI firewall constantly inspecting the flow of traffic: determining
direction, limiting or eliminating inbound access, and verifying down
to the packet level that the network traffic is only what the customer
chooses. The Cayman Gateway works like a network super traffic cop,
inspecting and filtering out undesired traffic based on your security
policy and resulting configuration.

interface

A connection between two devices or networks.

internet address

IP address. A 32-bit address used to route packets on a TCP/IP net-
work. In dotted decimal notation, each eight bits of the 32-bit number
are presented as a decimal number, with the four octets separated by
periods.

IPCP

Internet Protocol Control Protocol. A network control protocol in PPP
specifying how IP communications will be configured and operated
over a PPP link.

IPSEC

A protocol suite defined by the Internet Engineering Task Force to
protect IP traffic at packet level. It can be used for protecting the data
transmitted by any service or application that is based on IP, but is
commonly used for VPNs.

ISAKMP

Internet Security Association and Key Management Protocol is a
framework for creating connection specific parameters. It is a protocol
for establishing, negotiating, modifying, and deleting SAs and pro-
vides a framework for authentication and key exchange. ISAKMP is a
part of the IKE protocol.

ISDN

Integrated Services Digital Network. A digital network with circuit and
packet switching for voice and data communications at data rates up
to 1.544 or 2.048 Mbps over telephone networks.

-----K-----

Key Management

The Key Management algorithm manages the exchange of security
keys in the IPSec protocol architecture. SafeHarbour supports the
standard

Internet Key Exchange (IKE)

-----L-----

LCP

Link Control Protocol. Protocol responsible for negotiating connection
configuration parameters, authenticating peers on the link, determin-
ing whether a link is functioning properly, and terminating the link.
Documented in RFC 1331.

LQM Link Quality
Monitoring

Optional facility that lets PPP make policy decisions based on the
observed quality of the link between peers. Documented in RFC 1333.

loopback test

Diagnostic procedure in which data is sent from a devices's output
channel and directed back to its input channel so that what was sent
can be compared to what was received.

Advertising