Netopia 2200 User Manual

Page 323

Advertising
background image

323

route. Path through a network from one node to another. A large internet-
work can have several alternate routes from a source to a destination.

routing table. Table stored in a router or other networking device that
records available routes and distances for remote network destinations.

-----S-----

SA Encrypt Type. SA Encryption Type refers to the symmetric encryption
type. This encr yption algorithm will be used to encr ypt each data packet. SA
Encr yption Type values suppor ted include

DES and 3DES.

SA Hash Type. SA Hash Type refers to the Authentication Hash algorithm
used during SA negotiation. Values suppor ted include

MD5 SHA1. N/A will

display if NONE is chose for Auth Protocol.

Security Association. From the IPSEC point of view, an SA is a data struc-
ture that describes which transformation is to be applied to a datagram and
how. The SA specifies:

The authentication algorithm for AH and ESP

The encr yption algorithm for ESP

The encr yption and authentication keys

Lifetime of encr yption keys

The lifetime of the SA

Replay prevention sequence number and the replay bit table

An arbitrar y 32-bit number called a Security Parameters Index (SPI), as well
as the destination host’s address and the IPSEC protocol identifier, identify
each SA. An SPI is assigned to an SA when the SA is negotiated. The SA can
be referred to by using an SPI in AH and ESP transformations. SA is unidirec-
tional. SAs are commonly setup as bundles, because typically two SAs are
required for communications. SA management is always done on bundles
(setup, delete, relay).

serial communication. Method of data transmission in which data bits are
transmitted sequentially over a communication channel

SHA-1. An implementation of the U.S. Government Secure Hash Algorithm;
a 160-bit authentication algorithm.

Advertising