
Index-2
308630-14.00 Rev 00
I
IKE
description, 1-12
enabling, 3-1
security associations, 3-8
Image Builder, 2-2
inbound security policies, 1-5, 1-9
initialization vectors (IVs), 2-5
installation, 2-2
integrity algorithm, considerations, 3-10
integrity key, 2-4
integrity service, 1-4
Internet Assigned Numbers Authority (IANA), 1-11,
D-1
Internet Engineering Task Force (IETF), role in IPsec
development, 1-2
Internet Key Exchange (IKE)
description, 1-12
explained, 1-17
negotiating security associations, 1-13
using, 3-9
IP destination address, 1-11
IP interface, 1-5
IP Security
about, 1-2
enabling, A-2
IPsec
about, 1-2
disabling, 11
enabling, 3-1
installating, 2-2
key constructs, 1-7
ISAKMP/Oakley, 1-12
K
k commands, 2-6, B-1
L
log
policy criterion, 3-3
router log NPK confirmation, 2-8
M
management information base (MIB), 2-5, 2-8
Message Digest 5 (MD5), 1-4, 1-16, A-7
N
Node Protection Key (NPK)
configuration considerations, 2-4
Site Manager parameters, A-1
usage, 2-5
O
outbound security policies, 1-5, 1-10
P
perfect-forward secrecy, 1-17
policies
See security policy
policy template
creating inbound, 3-6
creating outbound, 3-4
defined, 1-9
usage, 3-2
PPP support, 1-3
pre-shared key, IKE use, 1-17
product support, xvii
protocol policy criterion, 1-11
protocols supported, 1-3
public data network, tunnel mode use, 1-6
publications
hard copy, xvii
Comentários a estes Manuais