新进化论

道生一,一生二,二生三,三生万物。

  博客园 :: 首页 :: 博问 :: 闪存 :: 新随笔 :: 联系 :: 订阅 订阅 :: 管理 ::
  1021 随笔 :: 34 文章 :: 76 评论 :: 85万 阅读

09 2009 档案

摘要:Cisco PIX – TCP, UDP, NAT, PAT and Port RedirectionTuesday, June 9, 2009, 16:07 cisco tutorials 1,496 views 2 comments ORIGINALLY POSTED BY NOKIA FOR THETAZZONE/TAZFORUM HEREDo not use, republis... 阅读全文
posted @ 2009-09-26 21:57 岌岌可危 阅读(530) 评论(0) 推荐(0) 编辑

摘要:How IPSec WorksIPSec involves many component technologies and encryption methods. Yet IPSec's operation can be broken down into five main steps:"Interesting traffic" initiates the IPSec process. Traff... 阅读全文
posted @ 2009-09-22 17:52 岌岌可危 阅读(371) 评论(0) 推荐(0) 编辑

摘要:Configuring IPsec/IKE on Solaris, Part OneIdo Dubrawsky 2002-08-15The IP Security Protocol (IPsec) and the Internet Key Exchange (IKE) protocol are designed to permit system and network administrators... 阅读全文
posted @ 2009-09-22 16:54 岌岌可危 阅读(1263) 评论(0) 推荐(0) 编辑

摘要:IPSec Key Exchange (IKE) (Page 1 of 2) IPSec, like many secure networking protocol sets, is based on the concept of a “shared secret”. Two devices that want to send information securely en... 阅读全文
posted @ 2009-09-22 16:08 岌岌可危 阅读(305) 评论(0) 推荐(0) 编辑

摘要:PIXIKE的两个阶段(2009-07-07 13:08:47)标签:3desdiffie-hellmanespfwname通道it 分类:Cisco&网络技术ESP、AH用来对IP报文进行加/解密、验证以达到保护IP报文的目的,而IKE则是通信双方用来协商加/解密算法及其密钥、密钥的生命期、验证算法的。IKE协议是Oakley和SKEME协议的一种混合,并在由ISAKMP规定的一个框架内... 阅读全文
posted @ 2009-09-22 15:44 岌岌可危 阅读(1048) 评论(0) 推荐(0) 编辑

摘要:see:http://book.soundonair.ru/cisco/ch13lev1sec4.htmlIPsec Negotiation Using the IKE ProtocolIKE negotiates IPsec tunnels between two IPsec peers. This negotiation can be done using a combination of m... 阅读全文
posted @ 2009-09-21 23:24 岌岌可危 阅读(1375) 评论(0) 推荐(0) 编辑

摘要:IPSec IntroductionIPSec OverviewIP Security (IPSec) refers to a series of protocols defined by IETF to provide high quality, interoperable, and cryptology-based security for IP packets. By means of fa... 阅读全文
posted @ 2009-09-21 21:14 岌岌可危 阅读(1905) 评论(0) 推荐(0) 编辑

摘要:IPsec: a basis for IPv6 security (Part 2)tags: 投稿者:admin 日付:木, 2004-07-22 00:00--2004-07-22 00:00 Mitsuru KandaToshiba Research and Development CenterIn Part 2, we will discusses Internet Key Exchang... 阅读全文
posted @ 2009-09-21 20:59 岌岌可危 阅读(317) 评论(0) 推荐(0) 编辑

摘要:转:PIX的精彩 --- IKE的两个阶段2008-05-05 14:24ESP、AH用来对IP报文进行加/解密、验证以达到保护IP报文的目的,而IKE则是通信双方用来协商加/解密算法及其密钥、密钥的生命期、验证算法的。IKE协议是Oakley和SKEME协议的一种混合,并在由ISAKMP规定的一个框架内运作。IKE阶段1,IKE 在两个IKE对等体间创建一个认证过的安全通道,IKE SA。安全关... 阅读全文
posted @ 2009-09-21 15:25 岌岌可危 阅读(279) 评论(0) 推荐(0) 编辑

点击右上角即可分享
微信分享提示