Добавил:
AAA1
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз:
Предмет:
Файл:4-1 Електрона комерція / IPsec_eng.ppt
X
- •Chapter 13 IPsec
- •IPsec (IP Security)
- •Types of IPsec VPNs
- •LAN-to-LAN and Site-to-Site
- •Remote-Access IPsec
- •IPsec Protocol Suite
- •IKE’s Responsibilities
- •Composition of IKE
- •IPsec Tunnel Creation
- •IKE Main Mode, Aggressive
- •Goals of Main Mode and
- •Types of Negotiations by IKE
- •Goals of Quick Mode
- •IKE Main Mode Message 1
- •IKE Main Mode Message 2
- •Diffie-Hellman Algorithm
- •Diffie-Hellman Algorithm (cont.)
- •IKE Main Mode Message 3
- •IKE Main Mode Message 4
- •Session Keys Generated by the Initiator
- •Session Keys Generated
- •IKE Main Mode Message 5
- •IKE Main Mode Message 6
- •Completion of IKE Phase I (Main Mode) using Preshared Key
- •IKE Phase 2 (Quick Mode)
- •IKE Quick Mode Message 1
- •IKE and IPsec Lifetime
- •IKE Quick Mode Message 2
- •Generation of IPsec
- •IKE Quick Mode Message 3
- •Main Mode Using
- •Session Keys Generated
- •Session Keys Generated
- •IKE Main Mode Message 5
- •IKE Main Mode Message 6
- •Aggressive Mode of IKE Phase 1 using Preshared Key Authentication
- •IKE Aggressive Mode Message 1
- •IKE Aggressive Mode Message 2
- •IKE Aggressive Mode Message 3
- •IKE Device Authentication
- •Contents of a Digital Certificate
- •Using Digital Certificates
- •IKE Main Mode Using
- •Encryption Methods in IPsec
- •DES Encryption using
- •3DES Encryption
- •Integrity Checking Mechanism
- •Integrity Checking Using Hashes
- •Use of Hashes in ESP and AH
- •Packet Encapsulation in IPsec
- •Packet Format Using AH in
- •Packet Format Using ESP in
- •ESP Header Format
- •AH Header Format
- •IKE Enhancements for Remote-Access Client IPsec
- •Extended Authentication and
- •Negotiation of X-Auth During
- •Start of X-Auth with Exchange of Attribute Payloads Using ISAKMP Messages
- •Completion of X-Auth with Exchange of Attribute Payloads Using ISAKMP
- •Mode Configuration During
- •Exchanging Attribute Payloads Between
- •NAT Transparency
- •Tagging on a UDP Header to Traverse PAT
Соседние файлы в папке 4-1 Електрона комерція