新进化论

道生一,一生二,二生三,三生万物。

  博客园 :: 首页 :: 博问 :: 闪存 :: 新随笔 :: 联系 :: 订阅 订阅 :: 管理 ::

2009年9月22日

摘要: How IPSec WorksIPSec involves many component technologies and encryption methods. Yet IPSec's operation can be broken down into five main steps:"Interesting traffic" initiates the IPSec process. Traff... 阅读全文
posted @ 2009-09-22 17:52 岌岌可危 阅读(361) 评论(0) 推荐(0) 编辑

摘要: Configuring IPsec/IKE on Solaris, Part OneIdo Dubrawsky 2002-08-15The IP Security Protocol (IPsec) and the Internet Key Exchange (IKE) protocol are designed to permit system and network administrators... 阅读全文
posted @ 2009-09-22 16:54 岌岌可危 阅读(1259) 评论(0) 推荐(0) 编辑

摘要: IPSec Key Exchange (IKE) (Page 1 of 2) IPSec, like many secure networking protocol sets, is based on the concept of a “shared secret”. Two devices that want to send information securely en... 阅读全文
posted @ 2009-09-22 16:08 岌岌可危 阅读(302) 评论(0) 推荐(0) 编辑

摘要: PIXIKE的两个阶段(2009-07-07 13:08:47)标签:3desdiffie-hellmanespfwname通道it 分类:Cisco&网络技术ESP、AH用来对IP报文进行加/解密、验证以达到保护IP报文的目的,而IKE则是通信双方用来协商加/解密算法及其密钥、密钥的生命期、验证算法的。IKE协议是Oakley和SKEME协议的一种混合,并在由ISAKMP规定的一个框架内... 阅读全文
posted @ 2009-09-22 15:44 岌岌可危 阅读(995) 评论(0) 推荐(0) 编辑