Motorola 2200 Administrator's Handbook page 339

Motorola gateways administrator's handbook
Hide thumbs Also See for 2200:
Table of Contents

Advertisement

-----R-----
repeater. Device that regenerates and propagates electrical signals between two network segments. Also
known as a hub.
RFC. Request for Comment. Set of documents that specify the conventions and standards for TCP/IP net-
working.
RIP. Routing Information Protocol. Protocol responsible for distributing information about available routes
and networks from one router to another.
RJ-11. Four-pin connector used for telephones.
RJ-45. Eight-pin connector used for 10BaseT (twisted pair Ethernet) networks.
route. Path through a network from one node to another. A large internetwork can have several alternate
routes from a source to a destination.
routing table. Table stored in a router or other networking device that records available routes and dis-
tances for remote network destinations.
-----S-----
SA Encrypt Type. SA Encryption Type refers to the symmetric encryption type. This encryption algorithm
will be used to encrypt each data packet. SA Encryption Type values supported include DES and 3DES .
SA Hash Type. SA Hash Type refers to the Authentication Hash algorithm used during SA negotiation. Val-
ues supported include MD5 SHA1 . N/A will display if NONE is chose for Auth Protocol.
Security Association. From the IPSEC point of view, an SA is a data structure that describes which trans-
formation is to be applied to a datagram and how. The SA specifies:
The authentication algorithm for AH and ESP
The encryption algorithm for ESP
The encryption and authentication keys
Lifetime of encryption keys
The lifetime of the SA
Replay prevention sequence number and the replay bit table
An arbitrary 32-bit number called a Security Parameters Index (SPI), as well as the destination host's
address and the IPSEC protocol identifier, identify each SA. An SPI is assigned to an SA when the SA is
negotiated. The SA can be referred to by using an SPI in AH and ESP transformations. SA is unidirectional.
SAs are commonly setup as bundles, because typically two SAs are required for communications. SA man-
agement is always done on bundles (setup, delete, relay).
serial communication. Method of data transmission in which data bits are transmitted sequentially over a
communication channel
SHA-1. An implementation of the U.S. Government Secure Hash Algorithm; a 160-bit authentication algo-
rithm.
339

Advertisement

Table of Contents
loading

Table of Contents