Avaya Configuring Data Encryption Services Manuel d'utilisateur Page 6

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 62
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 5
vi
117386-A Rev. A
Chapter 2
Implementation Notes
Requirements for Enabling Encryption ...........................................................................2-1
Selecting Encryption Strength ........................................................................................2-1
Synchronizing Router Clocks .........................................................................................2-2
Using Encryption with AN Routers ...........................................................................2-2
Encryption and Performance ..........................................................................................2-2
Using Data Compression with Encryption ......................................................................2-3
Using an NPK .................................................................................................................2-3
Using Floppy Disks to Store Key Files ............................................................................2-4
Configuring Encryption with Dial Backup .......................................................................2-4
Chapter 3
Enabling Encryption
Before You Begin ............................................................................................................3-1
Using the MIB Object ID .................................................................................................3-1
Starting Encryption .........................................................................................................3-2
Creating Seeds ...............................................................................................................3-2
Creating Seeds on a PC ..........................................................................................3-3
Changing the Path to the Key Files ...................................................................3-3
Changing the Length of the LTSS Key Generator .............................................3-3
Running the
wfkseed
Command ......................................................................3-3
Creating Seeds on a UNIX Platform ........................................................................3-5
Setting a Path to the Key Files ...........................................................................3-5
Changing the Length of the LTSS Key Generator .............................................3-5
Running the WEP
wfkseed
Command .............................................................3-6
Creating NPKs and LTSSs .............................................................................................3-7
Creating NPKs .........................................................................................................3-7
Creating LTSSs ........................................................................................................3-8
Entering an NPK on a Router .........................................................................................3-9
Changing NPKs ............................................................................................................3-10
Monitoring NPKs ...........................................................................................................3-10
Changing an NPK on a Router ...............................................................................3-10
Changing an NPK in the MIB .................................................................................3-11
Changing LTSSs ...........................................................................................................3-11
Creating TEKs ..............................................................................................................3-11
Vue de la page 5
1 2 3 4 5 6 7 8 9 10 11 ... 61 62

Commentaires sur ces manuels

Pas de commentaire