HP ProCurve 7000dl Series Basic Management And Configuration Manual page 860

Procurve 7000dl series secure router
Hide thumbs Also See for ProCurve 7000dl Series:
Table of Contents

Advertisement

Appendix B: Glossary
Router A device that forwards data packets from one network to another. A router
RPS Redundant Power Source. A power source that becomes active should the
RSA Rivest-Shamir-Adleman. A public-key, or digital signature, encryption technol-
RSVP Resource reSerVation Protocol. An NCP in the PPP protocol suite that enables
S-interface The connection from the TE1 or TA to the NT2 in an ISDN network. The S-
SA Security Association. In IPSec, the SA defines the tunnel, or secure VPN
SAPI Service Access Point Identifier. A standardized value in LAPD frames that
SC-connector A square-like fiber optic connector with a push-pull latching mechanism that
B-46
connects at least two different networks. A WAN router often connects LANs
to WANs or to an ISP. A router uses a packet's Layer 3 header to determine the
route over which it should send it. The router uses its routing table, which can
be configured manually or generated using routing protocols, to determine
the best routes for forwarding packets.
primary power source fail. The RPS ensures the router's continued operation
during a power outage or other power service interruption.
ogy developed by RSA Data Security, Inc. The RSA algorithm is based on the
fact that there is no efficient way to factor very large numbers. Deducing an
RSA key, therefore, requires an extraordinary amount of computer processing
power and time. RSA supports keys between 1024 and 2048 bits in length. RSA
keys can be used for signing digital certificates.
Internet applications to request differing QoS for various data flows. RSVP
works with routing protocols to provide IP networks with the capability to
support differing application types. For more information on RSVP, see RFC
2205 (at http://www.ietf.org/rfc/rfc2205.txt).
S
interface uses a four-wire/two twisted pair connection. The S- and T-interfaces
are often combined into the S/T-interface.
connection, between two peers. The SA includes information for managing
the tunnel, such as encryption and authentication keys for securing data and
an SPI for identifying the SA. If IKE is used to negotiate the SA, then a
preliminary SA, called the IKE SA, is established so that the permanent SA,
called the IPSec SA, can be negotiated securely. If both AH and ESP are used
to secure IPSec packets, then each protocol must use a separate SA.
identifies the ISDN service associated with the signaling frame.
provides quick insertion and removal while also ensuring a positive
connection.

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Procurve 7102dlProcurve 7103dlJ8752aJ8753a

Table of Contents