Solwise SAR715PVW ADSL Ethernet Router User’s Guide
Chapter
6
. VPN Configuration
103
•
Security Associations (SA)
: An SA defines the kinds of security
measures that should be applied to packets based on who is
sending the packets, where they are going, and what type of
payload they are carrying. bye
•
L2TP (Layer 2 Tunneling Protocol)
: L2TP is refinement of PPTP
and Cisco’s L2F protocol. L2Tp was designed to combine the best
features of both PPTP and L2F. L2TP operates, as its name
suggests, at Layer 2 in the International Organization for
Standardization (ISO) model, and it is a network protocol that
creates a tunnel between an L2TP client and an L2TP server, and
then encapsulates PPP frames to be sent over tunnel. When using
IP as the transport protocol, L2TP can be used as a VPN protocol
over the Internet. L2TP has been designed so that it can be used
directly over various wide area network (WAN) media (such as
Frame Relay) without an IP transport layer, which can extend its
usefulness in setting up corporate networks.
•
PKCS #10
: Certificate Request Syntax Standard
•
PKCS #7
: Cryptographic Message Syntax Standard
•
PKCS #11
: Cryptographic Token Interface Standard
•
SCEP
: Simple Certificate Enrollment Protocol
•
Encryption
: Is a mathematical operation that transforms data from
“clear text” (something that a human or a program can interpret) to
“cipher test” (something that cannot be interpreted). Usually the
mathematical operation requires that an alphanumeric “key” be
supplied along with the clear text. The key and clear text are
processed by the encryption operation which leads to the data
scrambling that makes encryption secure. Decryption is the
opposite of encryption: it is the mathematical operation that
transforms cipher text to clear text. Decryption also requires a key.