Table 8: IPSec Terms and Abbreviations
(continued)
Description
Term or
Abbreviation
Certificate authority
CA
Data Encryption Standard encryption algorithm
DES
Dead peer detection, which enables router to detect when communication to
remote peer has been disconnected. Also known as IKE keepalive.
DPD
Digital Signature Standard authentication algorithm
DSS
Encapsulating Security Payload, which provides data integrity, data
confidentiality and, optionally, sender's authentication
ESP
Fully qualified domain name, which consists of the hostname and domain
name for a specific system
FQDN
Hashed Message Authentication Code
HMAC
Internet Key Exchange
IKE
IP address of the entity that is one of two endpoints in an IKE/ISAKMP SA.
IKE endpoint
In the context of a secure interface, already secured traffic arriving on that
interface (identified based on its SPI). This traffic is cleared and checked
against the security parameters set for that interface.
Inbound traffic
Internet Protocol Security
IPSec
IP address of the entity that is one of two endpoints in an IPSec SA
IPSec endpoint
Internet Security Association and Key Management Protocol
ISAKMP
Security associations used to secure control channels between security
gateways. These are negotiated via IKE phase 1.
ISAKMP SA
Message Digest hash algorithm
MDx
A random value used to detect and protect against replay attacks
Nonce
In the context of a secure interface, the clear traffic forwarded to the interface
(either by policy or by routing) that is typically secured according to security
parameters set for that interface.
Outbound traffic
Perfect forward secrecy
PFS
Rivest-Shamir-Adleman encryption algorithm
RSA
Security association. The set of security parameters that dictate how IPSec
processes a packet, including encapsulation protocol and session keys. A
single secure tunnel uses multiple SAs.
SA
A virtual connection between two security gateways used to exchange data
packets in a secure way. A secure tunnel is made up of a local SA and a remote
SA, where both are negotiated in the context of an ISAKMP SA.
Secure tunnel
126
■
Overview
JUNOSe 11.1.x IP Services Configuration Guide
Summary of Contents for IP SERVICES - CONFIGURATION GUIDE V 11.1.X
Page 6: ...vi...
Page 8: ...viii JUNOSe 11 1 x IP Services Configuration Guide...
Page 18: ...xviii Table of Contents JUNOSe 11 1 x IP Services Configuration Guide...
Page 20: ...xx List of Figures JUNOSe 11 1 x IP Services Configuration Guide...
Page 22: ...xxii List of Tables JUNOSe 11 1 x IP Services Configuration Guide...
Page 28: ...2 Chapters JUNOSe 11 1 x IP Services Configuration Guide...
Page 138: ...112 Monitoring J Flow Statistics JUNOSe 11 1 x IP Services Configuration Guide...
Page 286: ...260 Monitoring IP Tunnels JUNOSe 11 1 x IP Services Configuration Guide...
Page 312: ...286 Monitoring IP Reassembly JUNOSe 11 1 x IP Services Configuration Guide...
Page 357: ...Part 2 Index Index on page 333 Index 331...
Page 358: ...332 Index JUNOSe 11 1 x IP Services Configuration Guide...