Справочник Пользователя для Nortel Networks 620

Скачать
Страница из 222
Chapter 1
IPSec: Concept for secure IP connections
E-DOC-CTC-20051017-0169 v1.0
11
1 IPSec: Concept for secure IP connections
 Policies
The introduction of network security mainly involves the application of traffic 
policies. Firstly, the policies need to be defined, then it should be whether the 
policies are correctly applied.
Security policies can apply to various levels. The IPSec protocol (Internet Protocol 
Security) applies to the IP layer. This location of the IPSec protocol within the 
layered network model makes it a generic solution for a wide range of applications.
Types of policies supported in the IPSec protocol:
user/entity authentication
level of encryption
validity time of the keys
...
 The Target of IPSec
The main goals for using the IPSec protocol suite are:
Integrity of data
It ensures that data has not been modified in transit.
Confidentiality of data
On non-trusted network sections, the data is encrypted. When this data is 
intercepted, it cannot be interpreted by the eavesdropper.
User authentication
Ensures that you know the party you are communicating with, and that they 
are who they say they are.
In this section
The following items are discussed in this section:
Topic
Page