HP 7000 dl Router Series Guida Utente Pagina 400

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 941
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 399
SROS Command Line Interface Reference Guide Crypto Map IKE Command Set
5991-2114 © Copyright 2005 Hewlett-Packard Development Company, L.P. 400
Technology Review
A crypto map entry is a single policy that describes how certain traffic is to be secured. There are two
types of crypto map entries: ipsec-manual and ipsec-ike. Each entry is given an index, which is used to sort
the ordered list.
When a non-secured packet arrives on an interface, the crypto map set associated with that interface is
processed in order. If a crypto map entry matches the non-secured traffic, the traffic is discarded.
When a packet is to be transmitted on an interface, the crypto map set associated with that interface is
processed in order. The first crypto map entry that matches the packet will be used to secure the packet.
If a suitable SA exists, that is used for transmission. Otherwise, IKE is used to establish an SA with the
peer. If no SA exists, and the crypto map entry is “respond only”, the packet is discarded.
When a secured packet arrives on an interface, its SPI is used to look up an SA. If an SA does not exist,
or if the packet fails any of the security checks (bad authentication, traffic does not match SA selectors,
etc.), it is discarded. If all checks pass, the packet is forwarded normally.
Vedere la pagina 399
1 2 ... 395 396 397 398 399 400 401 402 403 404 405 ... 940 941

Commenti su questo manuale

Nessun commento