Avaya Configuring Data Encryption Services Manual do Utilizador

Consulte online ou descarregue Manual do Utilizador para Manuais de software Avaya Configuring Data Encryption Services. Avaya Configuring Data Encryption Services User's Manual Manual do Utilizador

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 62
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 0
Part No. 117386-A Rev. A
September 1997
BayRS Version 12.00
Site Manager Software Version 6.00
Configuring Data
Encryption Services
Vista de página 0
1 2 3 4 5 6 ... 61 62

Resumo do Conteúdo

Página 1 - Encryption Services

Part No. 117386-A Rev. ASeptember 1997BayRS Version 12.00Site Manager Software Version 6.00 Configuring Data Encryption Services

Página 3

117386-A Rev. A xi About This Guide If you are responsible for configuring and managing Bay Networks ® routers, read this guide to learn how to confi

Página 4

Configuring Data Encryption Servicesxii 117386-A Rev. A Conventions angle brackets (< >) Indicate that you choose the text to enter based on th

Página 5 - Contents

About This Guide 117386-A Rev. A xiii Acronyms ANSI American National Standards InstituteBRI Basic Rate InterfaceDES Data Encryption StandardDLCI da

Página 6

Configuring Data Encryption Servicesxiv 117386-A Rev. A The Bay Networks Press catalog is available on the World Wide Web at support.baynetworks.com

Página 7

About This Guide 117386-A Rev. A xv If you purchased a Bay Networks service program, call one of the following Bay Networks Technical Solutions Cent

Página 9

117386-A Rev. A 1-1 Chapter 1Data Encryption Overview Bay Networks data encryption services enable you to protect sensitive traffic on your network.

Página 10

Configuring Data Encryption Services1-2 117386-A Rev. A Data Encryption Standard (DES) Bay Networks bases encryption services on DES, which the Unite

Página 11 - About This Guide

Data Encryption Overview 117386-A Rev. A 1-3 Message Digest 5 (MD5) MD5 is a secure hash algorithm, and is a component in a number of IETF standard

Página 12 - Conventions

ii 117386-A Rev. A 4401 Great America Parkway 8 Federal StreetSanta Clara, CA 95054 Billerica, MA 01821 Copyright © 1997 Bay Networks, Inc. All right

Página 13 - Acronyms

Configuring Data Encryption Services1-4 117386-A Rev. A Site Security Carefully restrict access to routers that encrypt data and the workstations you

Página 14 - How to Get Help

Data Encryption Overview 117386-A Rev. A 1-5 Figure 1-1. Hierarchy of Encryption Keys The keys are the• Node Protection Key (NPK). It encrypts the L

Página 15

Configuring Data Encryption Services1-6 117386-A Rev. ANode Protection Key (NPK) The NPK encrypts and decrypts LTSSs.The NPK is stored in the router’s

Página 16

Data Encryption Overview117386-A Rev. A 1-7 The easiest way to enter the NPK is to use a text editor in read-only mode to display the contents of the

Página 17 - Data Encryption Overview

Configuring Data Encryption Services1-8 117386-A Rev. AMaster Encryption Key (MEK)The MEK encrypts the Traffic Encryption Key (TEK). The LTSS for a cir

Página 18 - 117386-A Rev. A

117386-A Rev. A 2-1 Chapter 2Implementation NotesThis chapter describes special issues that you may encounter in configuring and running encryption.Req

Página 19 - Security and Data Encryption

Configuring Data Encryption Services2-2 117386-A Rev. ASynchronizing Router ClocksThe Master Encryption Key must be the same at both ends of a link. T

Página 20 - Encryption Keys

Implementation Notes117386-A Rev. A 2-3 Using Data Compression with EncryptionYou can configure both hardware- and software-based data compression over

Página 21

Configuring Data Encryption Services2-4 117386-A Rev. AUsing Floppy Disks to Store Key FilesFor security reasons, Bay Networks recommends that you use

Página 22 - Node Protection Key (NPK)

117386-A Rev. A 3-1 Chapter 3Enabling EncryptionThis chapter describes how to configure data encryption.Before You BeginBefore you can start data encry

Página 23

117386-A Rev. A iii Bay Networks, Inc. Software License Agreement NOTICE: Please carefully read this license agreement before copying or using the

Página 24 - Traffic Encryption Key (TEK)

Configuring Data Encryption Services3-2 117386-A Rev. AStarting EncryptionTo use Bay Networks data encryption on your network, you must1. Create the s

Página 25 - Implementation Notes

Enabling Encryption117386-A Rev. A 3-3 Creating Seeds on a PCTo use a PC to create seeds that the WEP software uses to generate NPKs and LTSSs, issue

Página 26 - Encryption and Performance

Configuring Data Encryption Services3-4 117386-A Rev. A2. Press Return to create the LTSS key file.WEP displays this message:Enter the path of the key

Página 27 - Using an NPK

Enabling Encryption117386-A Rev. A 3-5 Creating Seeds on a UNIX PlatformTo create a seed on a UNIX platform:1. Set the environment variable for the pa

Página 28

Configuring Data Encryption Services3-6 117386-A Rev. ARunning the WEP wfkseed CommandThe wfkseed command creates the seed that enables you to generat

Página 29 - Enabling Encryption

Enabling Encryption117386-A Rev. A 3-7 Creating NPKs and LTSSsAfter you generate the NPK and LTSS seeds, you open Site Manager and use the WEP Key Man

Página 30 - Creating Seeds

Configuring Data Encryption Services3-8 117386-A Rev. ACreating LTSSsTo generate an LTSS:1. Start Site Manager. Note that you open Site Manager after

Página 31 - Creating Seeds on a PC

Enabling Encryption117386-A Rev. A 3-9 Entering an NPK on a RouterThe router stores its NPK in nonvolatile RAM. To enter the NPK, you work in the secu

Página 32

Configuring Data Encryption Services3-10 117386-A Rev. A6. Save the configuration file.7. Exit the secure shell by enteringkexitYou return to the regula

Página 33 - 117386-A Rev. A 3-5

Enabling Encryption117386-A Rev. A 3-11 Changing an NPK in the MIBTo change the MIB NPK value:1. At any shell prompt on a UNIX platform, or at the DOS

Página 34

iv 117386-A Rev. A its own data and information and for maintaining adequate procedures apart from the Software to reconstruct lost or altered files,

Página 35 - Creating NPKs and LTSSs

Configuring Data Encryption Services3-12 117386-A Rev. AThe kseed command creates the seed that enables WEP to generate random numbers. To create a TE

Página 36 - Creating LTSSs

Enabling Encryption117386-A Rev. A 3-13 5.Exit the Secure Shell by enteringkexitYou return to the regular prompt.Starting Encryption for PPPTo configur

Página 37 - Entering an NPK on a Router

Configuring Data Encryption Services3-14 117386-A Rev. A3. Enter the NPK.You need to do this once for each router or configuration file.After you enter

Página 38 - Monitoring NPKs

Enabling Encryption117386-A Rev. A 3-15 The Encrypt Enable parameter defaults to Disable. Both the PPP Encrypt Enable parameter and the WEP Enable par

Página 39 - Creating TEKs

Configuring Data Encryption Services3-16 117386-A Rev. A2. Select the WEP protocol.3. Enter the NPK.You need to do this once for each router or configu

Página 40

Enabling Encryption117386-A Rev. A 3-17 4.Enter the LTSS Value and LTSS Name.5. Enable Encryption.The Encrypt Enable parameter defaults to Disable. Bo

Página 41 - Starting Encryption for PPP

Configuring Data Encryption Services3-18 117386-A Rev. AConfiguring WEP ParametersWEP has both line and circuit interface parameters. WEP parameters ha

Página 42 - 3. Enter the NPK

Enabling Encryption117386-A Rev. A 3-19 TEK Change BytesThe TEK Change Bytes parameter sets the number of bytes between changes in the value of the TE

Página 43 - 117386-A Rev. A 3-15

Configuring Data Encryption Services3-20 117386-A Rev. ADeleting Encryption from a RouterTo delete encryption from all circuits on which it is current

Página 44 - 2. Select the WEP protocol

117386-A Rev. A A-1 Appendix AEncryption ParametersThis appendix contains parameter descriptions for Frame Relay and PPP encryption parameters, and fo

Página 45

117386-A Rev. A v Contents About This Guide Before You Begin ...

Página 46 - Configuring WEP Parameters

Configuring Data Encryption ServicesA-2 117386-A Rev. AParameter: Encrypt EnablePath: PPP: Configuration Manager > Protocols > PPP > PPP Inter

Página 47 - Disabling Encryption

Encryption Parameters117386-A Rev. A A-3 Parameter: LTSS ValuePath: PPP: Configuration Manager > Protocols > PPP > PPP Interface Lists windowF

Página 48 - 2. Click on OK

Configuring Data Encryption ServicesA-4 117386-A Rev. AWEP Line ParametersParameter: EnablePath: Configuration Manager > Protocols > WEP > Lin

Página 49 - Encryption Parameters

Encryption Parameters117386-A Rev. A A-5 WEP Circuit Interface ParametersParameter: TEK Change (Bytes)Path: Configuration Manager > Protocols > W

Página 50 -

Configuring Data Encryption ServicesA-6 117386-A Rev. AParameter: Cipher Mode MaskPath: Configuration Manager > Protocols > WEP > Circuit Inte

Página 51

Encryption Parameters117386-A Rev. A A-7 Parameter: TEK Change (Seconds)Path: Configuration Manager > Protocols > WEP > LinesDefault: 10 secon

Página 53

117386-A Rev. A B-1 Appendix BDefinitions of k CommandsThis appendix contains definitions of the k commands that you use to work in the secure shell of

Página 55

117386-A Rev. A Index-1Numbers40-bit and 56-bit encryption, 1-2, 2-1AAN routers, using encryption, 2-2authentication, 1-3BBay Networks Press, xiiiCcha

Página 56

vi 117386-A Rev. A Chapter 2 Implementation Notes Requirements for Enabling Encryption ...

Página 57 - Definitions of k Commands

Index-2 117386-A Rev. Aencryption strength, selecting 40-bit or 56-bit, 2-1, 3-18entering an NPK on a router, 3-9Ffloppy disks, for storing key files, 1

Página 58

117386-A Rev. A Index-3Ssecure shell, 3-9secure shell password, 1-6, 1-7, 3-12security, 1-2, 1-3, 1-7seedscreating, 3-2 to 3-6seeds, defined, 1-5SEO so

Página 60

117386-A Rev. A viiStarting Encryption for PPP ...3-13Starting

Página 62

117386-A Rev. A ix Figure Figure 1-1. Hierarchy of Encryption Keys ..................1-5

Comentários a estes Manuais

Sem comentários