Avaya Configuring Data Encryption Services Manuel d'utilisateur Page 20

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 62
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 19
Configuring Data Encryption Services
1-4
117386-A Rev. A
Site Security
Carefully restrict access to routers that encrypt data and the workstations you use
to configure encryption. Because DES is a public standard, data is secure only if
you properly protect the encryption keys. The configuration files that contain
these keys include safeguards to prevent unauthorized access. However, the best
strategy is to physically protect your equipment.
Configuration Security
Bay Networks recommends that you store the key management files that our
encryption services use on removable media, such as floppy disks, and that you
store this media in a secure place. This is the easiest way to prevent unauthorized
persons from gaining access to these files.
You should always configure the NPKs locally, not over a network. When you
connect a computer to a router’s console port to configure encryption, use a
computer that is not connected to any other equipment.
You can configure LTSSs remotely because LTSSs are encrypted.
Note further recommendations about network security in the following sections of
this guide.
Encryption Keys
F
igure 1-1 illustrates the hierarchy of secret keys that Bay Networks encryption
uses to protect and transmit data.
Vue de la page 19
1 2 ... 15 16 17 18 19 20 21 22 23 24 25 ... 61 62

Commentaires sur ces manuels

Pas de commentaire