Avaya Configuring Data Encryption Services Manuel d'utilisateur Page 68

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 70
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 67
Index-2
117386-B Rev 00
F
floppy disks, for storing key files, 1-8, 2-3
G
generating
a TEK, 3-11
an LTSS, 3-8
an NPK, 3-7
K
k commands, B-1
key files
security, 1-8
setting a path to (UNIX), 3-5
keys, 1-2
integrity of, 1-3
LTSS, 1-7
MEK, 1-8
NPK, 1-6
summary, 1-4
TEK, 1-8
L
LTSS
changing, 3-11
creating a seed for
on a PC, 3-3
on a UNIX platform, 3-5
defined, 1-7
function, A-3
generating, 3-8
storing on removable media, 3-3
LTSS Name parameter, 1-8, 3-17, A-2
LTSS Value parameter, 3-17, A-3
M
Management Encryption Key (MEK), 1-8
MEK Change parameter, 3-15, 3-18, A-3
Message Digest 5 (MD5), 1-3
N
Node Protection Key (NPK), defined, 1-6
Node Protection Key parameter, A-1
NPK
changing, 3-10
creating a seed for
on a PC, 3-3
on a UNIX platform, 3-5
entering in MIB, 1-7
entering on router, 1-6, 3-9
function, A-1
generating, 3-7
in nonvolatile RAM, 3-9
overwriting, 3-10
selecting, 2-3
storing on removable media, 3-3
O
opening Site Manager, 3-7, 3-8
overwriting an NPK, 3-10
P
password, secure shell, 1-7
pcfs utility, 2-3
performance, effect of encryption on, 2-2
R
Random Number Generator (RNG), 1-5
removable media, for storing key files, 1-8, 3-3
routers, synchronizing dates and times, 2-2
S
secure shell, 3-9
secure shell password, 1-7, 3-12
security, 1-2, 1-3, 1-8
seeds
creating, 3-2 to 3-6
seeds, defined, 1-5
SEO software license agreement, 1-2
Vue de la page 67
1 2 ... 63 64 65 66 67 68 69 70

Commentaires sur ces manuels

Pas de commentaire