HP Sa3110 - VPN Server Appliance Manual page 97

Hp vpn server appliance sa3110/sa3150/sa3400/sa3450 - virtual private networking concepts guide
Hide thumbs Also See for Sa3110 - VPN Server Appliance:
Table of Contents

Advertisement

Index
Index
Index
Index
Numerics
Numerics
Numerics
Numerics
...................................................
3DES
A A A A
.......................................
AH key length
............................................
algorithms
See also secure profiles
...................................
application ports
assymetric cryptographic systems
authentication headers
authentication methods
certificate authentication
challenge phrase authentication
Entrust authentication
RADIUS authentication
SecurID authentication
B B B B
.....................................
black networks
.......................................
black tunnels
...............................
brute force attacks
C C C C
CBC (outer cipher block chaining)
certificate authentication
challenge phrase authentication
crypto period length
.....................................
crypto periods
cryptographic systems
.............................................
3DES
....................................
asymmetric
......................................
symmetric
symmetric v. asymmetric
...............................
triple pass DES
D D D D
Data Encryption Standard (DES)
...................................
default gateways
DES (Data Encryption Standard)
Diffie-Hellman key exchange protocol
Index-1
2-7
3-4
3-2
1-9
..
,
2-9
2-10
..........................
3-4
.............
,
3-6
4-1
4-6
.................
4-2
.......
4-3
.....................
4-6
...................
4-5
....................
4-4
5-2
5-20
2-13
.........
2-8
.......................
4-2
.............
4-3
..............................
3-6
2-12
...................
2-1
2-10
2-7
2-9
2-3
................
2-10
2-5
............
2-4
1-8
............
2-4
...
2-11
E E E E
Encapsulating Security Payload (ESP)
.................................
AH key length
authentication headers
.........................................
iv length
See also encapsulation
.......................................
encapsulation
Encapsulating Security Payload (ESP) 3-1
Shiva Smart Tunneling (SST)
See also secure profiles
............................................
encryption
...........................
Entrust authentication
F F F F
...................................................
filters
firewall rules
and tunnel termination
...........................
multiuser tunnels
one-way in firewall rules
one-way out firewall rules
.........................
single-user tunnels
...........................................
stateful
.........................................
stateless
...............................................
firewalls
full access
...........................
multiuser tunnels
.........................
single-user tunnels
functions of
HP SA3000 Series VPN Client
HP SA3000 Series VPN Manager
.....................................
VPN device
I I I I
...................................
inbound proxies
.........................................
IP addresses
network address translation (NAT)
iv (initialization vector) length
K K K K
..............................................
keepalive
See also secure profiles
................................
key operations
3-4
....................
3-4
3-4
3-3
...........
3-1
2-1
4-6
5-6
...................
5-31
5-18
.................
5-22
...............
5-24
5-14
5-4
5-2
5-1
5-17
5-12
...........
1-3
.......
1-2
1-2
5-28
1-6
.
5-12
...............
3-4
3-2
,
1-3
2-9

Advertisement

Table of Contents
loading

Table of Contents