Index
Index
Index
Index
Numerics
Numerics
Numerics
Numerics
...................................................
3DES
A A A A
.......................................
AH key length
............................................
algorithms
See also secure profiles
...................................
application ports
assymetric cryptographic systems
authentication headers
authentication methods
certificate authentication
challenge phrase authentication
Entrust authentication
RADIUS authentication
SecurID authentication
B B B B
.....................................
black networks
.......................................
black tunnels
...............................
brute force attacks
C C C C
CBC (outer cipher block chaining)
certificate authentication
challenge phrase authentication
crypto period length
.....................................
crypto periods
cryptographic systems
.............................................
3DES
....................................
asymmetric
......................................
symmetric
symmetric v. asymmetric
...............................
triple pass DES
D D D D
Data Encryption Standard (DES)
...................................
default gateways
DES (Data Encryption Standard)
Diffie-Hellman key exchange protocol
Index-1
2-7
3-4
3-2
1-9
..
,
2-9
2-10
..........................
3-4
.............
,
–
3-6
4-1
4-6
.................
4-2
.......
4-3
.....................
4-6
...................
4-5
....................
4-4
5-2
5-20
2-13
.........
2-8
.......................
4-2
.............
4-3
..............................
3-6
2-12
...................
–
2-1
2-10
2-7
2-9
2-3
................
2-10
2-5
............
2-4
1-8
............
2-4
...
2-11
E E E E
Encapsulating Security Payload (ESP)
.................................
AH key length
authentication headers
.........................................
iv length
See also encapsulation
.......................................
encapsulation
Encapsulating Security Payload (ESP) 3-1
Shiva Smart Tunneling (SST)
See also secure profiles
............................................
encryption
...........................
Entrust authentication
F F F F
...................................................
filters
firewall rules
and tunnel termination
...........................
multiuser tunnels
one-way in firewall rules
one-way out firewall rules
.........................
single-user tunnels
...........................................
stateful
.........................................
stateless
...............................................
firewalls
full access
...........................
multiuser tunnels
.........................
single-user tunnels
functions of
HP SA3000 Series VPN Client
HP SA3000 Series VPN Manager
.....................................
VPN device
I I I I
...................................
inbound proxies
.........................................
IP addresses
network address translation (NAT)
iv (initialization vector) length
K K K K
..............................................
keepalive
See also secure profiles
................................
key operations
3-4
....................
3-4
3-4
3-3
...........
3-1
2-1
4-6
5-6
...................
5-31
5-18
.................
5-22
...............
5-24
5-14
5-4
5-2
5-1
5-17
5-12
...........
1-3
.......
1-2
1-2
5-28
1-6
.
5-12
...............
3-4
3-2
,
1-3
2-9