
System Administrator’s Guide
127
IPSec
Internet Protocol Security. IPSec provides
interoperable, high quality,
cryptographically-based security at the IP layer
and offers protection for network
communications.
IPSec tunnel
The IPSec connection to securely link two
private parties across insecure and public
channels.
IPSec with Dynamic DNS
Dynamic DNS can be run on the IPSec
endpoints thereby creating an IPSec tunnel
using dynamic IP addresses.
IKE
IKE is a profile of ISAKMP that is for use by
IPsec. It is often called simply IKE. IKE creates a
private, authenticated key management
channel. Using that channel, two peers can
communicate, arranging for sessions keys to be
generated for AH, ESP or IPcomp. The channel
is used for the peers to agree on the encryption,
authentication and compression algorithms that
will be used. The traffic to which the policies will
applied is also agreed upon.
ISAKMP
ISAKMP is a framework for doing Security
Association Key Management. It can, in theory,
be used to produce session keys for many
different systems, not just IPsec.
Key lifetimes
The length of time before keys are renegotiated.
LAN
Local Area Network.
LED
Light-Emitting Diode.
Local Private Key Certificate &
Passphrase
The private part of the public/private key pair of
the certificate resides on the Shiva VPN
Gateway. The passphrase is a key that can be
used to lock and unlock the information in the
private key certificate.
Local Public Key Certificate
The public part of the public/private key pair of
the certificate resides on the Shiva VPN
Gateway and is used to authenticate against the
CA certificate.
MAC address
The hardware address of an Ethernet interface.
It is a 48-bit number usually written as a series of
6 hexadecimal octets, e.g. 00:d0:cf:00:5b:da. A
Shiva VPN Gateway has a MAC address for
each Ethernet interface. These are listed on a
label on the underneath of the device.
Term
Description
Summary of Contents for SHIVA 1100
Page 38: ...QoS traffic shaping 38 System Administrator s Guide...
Page 44: ...DHCP relay 44 System Administrator s Guide...
Page 66: ...Access control 66 System Administrator s Guide...
Page 122: ...Technical Support 122 System Administrator s Guide...
Page 132: ...132 System Administrator s Guide...