Demystifying the IPsec puzzle
- 作者: Frankel, Sheila.
- 出版: Boston, MA : Artech House 2001.
- 稽核項: 1 online resource (273 pages) :illustrations.
- 叢書名: Artech House computer security series
- 標題: IPSec (Computer network protocol) , COMPUTERS , IPSec (Protocole de réseaux d'ordinateurs) , COMPUTERS Networking -- Network Protocols. , Electronic books. , Protocoles de réseaux d'ordinateurs. , NetworkingNetwork Protocols.
- ISBN: 158053399X , 9781580533997
- ISBN: 1580530796
- 試查全文@TNUA:
- 附註: Includes bibliographical references and index. ""Contents vii""; ""Preface xvii""; ""1 Introduction 1""; ""1.1 The TCP/IP Protocol Stack 5""; ""1.2 Introducing IPsec 12""; ""1.3 Summary 13""; ""1.4 Further Reading 14""; ""References 14""; ""2 The First Puzzle Piece: The Authentication Header 15""; ""2.1 Protections Provided by AH 15""; ""2.2 Security Associations and the Security Parameters Index 16""; ""2.3 AH Format 19""; ""2.4 AH Location 20""; ""2.5 AH Modes 21""; ""2.6 Nested Headers 22""; ""2.7 Implementing IPsec Header Processing 23""; ""2.8 AH Processing for Outbound Messages 25"" ""2.9 AH Processing for Inbound Messages 30""""2.10 Complications 32""; ""2.11 Auditing 35""; ""2.12 Threat Mitigation 37""; ""2.13 Summary 37""; ""2.14 Further Reading 38""; ""References 38""; ""3 The Second Puzzle Piece: The Encapsulating Security Payload 41""; ""3.1 Protections Provided by ESP 41""; ""3.2 Security Associations and the Security Parameters Index 42""; ""3.3 ESP Header Format 43""; ""3.4 ESP Header Location and Modes 45""; ""3.5 Nested and Adjacent Headers 46""; ""3.6 ESP Header Processing for Outbound Messages 48"" ""3.7 ESP Header Processing for Inbound Messages 49""""3.8 Complications 52""; ""3.9 Criticisms and Counterclaims 52""; ""3.10 Threat Mitigation 54""; ""3.11 Why Two Security Headers? 55""; ""3.12 Summary 56""; ""3.13 Further Reading 56""; ""References 57""; ""4 The Third Puzzle Piece: The Cryptographic Algorithms 59""; ""4.1 Underlying Principles 60""; ""4.2 Authentication Algorithms 62""; ""4.3 The ESP Header Encryption Algorithms 68""; ""4.4 Complications 78""; ""4.5 Public Key Cryptography 79""; ""4.6 Conclusion 82""; ""4.7 Further Reading 82"" ""5.14 Lifetimes 101""""5.15 Vendor IDs 101""; ""5.16 The Phase 1 Negotiation 101""; ""5.17 The Phase 2 Negotiation 112""; ""5.18 New Group Mode 117""; ""5.19 Informational Exchanges 118""; ""5.20 The ISAKMP Header 119""; ""5.21 The Generic Payload Header 120""; ""5.22 The IKE State Machine 121""; ""5.23 The Origins of IKE 122""; ""5.24 An Example 122""; ""5.25 Criticisms and Counterclaims 123""; ""5.26 Threat Mitigation 125""; ""5.27 Summary 125""; ""5.28 Further Reading 126""; ""References 127""; ""6 The Fifth Puzzle Piece: IKE and the Road Warrior 129""
- 電子資源: https://dbs.tnua.edu.tw/login?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=67422
- 系統號: 005297536
- 資料類型: 電子書
- 讀者標籤: 需登入
- 引用網址: 複製連結