Virtual Private Network Services
187
communications can range in length, but are typically 16 or 32
characters. The longer the key, the more difficult it is to break the
encryption. The reason for this is most methods used to break
encryption involve trying every possible combination of characters,
similar to trying to open a safe when the combination is not known.
■
Asymmetric vs. Symmetric Cryptography
Asymmetric and symmetric cryptography refer to the keys used to
authenticate, or encrypt and decrypt the data.
Asymmetric cryptography does not use the same key to verify the
data. Asymmetric cryptography is often referred to as public key
cryptography. With public key, each user gets a pair of keys, one called
the public key and the other called the private key. The private key is
always linked mathematically to the public key to be kept secret. All
communications involve only public keys; the private key is never
transmitted or shared, but used to decrypt the message. A user can
generate their own keys using key generation software, or have keys
generated by trusted organizations. Once a key has been generated,
the user must register his or her public key with a central
administration, called a Certifying Authority (CA). Organizations, such
as RSA Data Security and Verisign, can help users issue and register
key pairs.
The Firewall VPN uses Symmetric Cryptography. As a result, the key on
both ends of the VPN tunnel must match exactly.
■
Authentication Header (AH)
The Authentication Header is a mechanism for providing strong
integrity and authentication for IP packets. Confidentiality and
protection from traffic analysis are not provided by the Authentication
Header.
The IP Authentication Header provides security by adding
authentication information to an IP packet. This authentication
information is calculated using all header and payload data in the IP
packet. This provides significantly more security that is currently
present in IP.
Use of AH will increase the processing requirements in the Firewall and
will also increase the communication latency. The increased latency is
primarily due to the calculation and comparison of the authentication
data by the receiver for each IP packet containing an Authentication
Header.
■
Data Encryption Standard (DES)
DUA1611-0AAA02.book Page 187 Thursday, August 2, 2001 4:01 PM
Содержание 3C16111 - SuperStack 3 Firewall Web Site Filter
Страница 18: ...18 DUA1611 0AAA02 book Page 18 Thursday August 2 2001 4 01 PM ...
Страница 50: ...50 DUA1611 0AAA02 book Page 50 Thursday August 2 2001 4 01 PM ...
Страница 96: ...96 CHAPTER 6 USING THE FIREWALL DIAGNOSTIC TOOLS DUA1611 0AAA02 book Page 96 Thursday August 2 2001 4 01 PM ...
Страница 122: ...122 CHAPTER 8 ADVANCED SETTINGS DUA1611 0AAA02 book Page 122 Thursday August 2 2001 4 01 PM ...
Страница 150: ...150 CHAPTER 10 CONFIGURING HIGH AVAILABILITY DUA1611 0AAA02 book Page 150 Thursday August 2 2001 4 01 PM ...
Страница 152: ...152 DUA1611 0AAA02 book Page 152 Thursday August 2 2001 4 01 PM ...
Страница 166: ...166 CHAPTER 11 ADMINISTRATION AND ADVANCED OPERATIONS DUA1611 0AAA02 book Page 166 Thursday August 2 2001 4 01 PM ...
Страница 174: ...174 DUA1611 0AAA02 book Page 174 Thursday August 2 2001 4 01 PM ...
Страница 178: ...178 CHAPTER 13 TYPES OF ATTACK AND FIREWALL DEFENCES DUA1611 0AAA02 book Page 178 Thursday August 2 2001 4 01 PM ...
Страница 190: ...190 CHAPTER 14 NETWORKING CONCEPTS DUA1611 0AAA02 book Page 190 Thursday August 2 2001 4 01 PM ...
Страница 192: ...192 DUA1611 0AAA02 book Page 192 Thursday August 2 2001 4 01 PM ...
Страница 206: ...206 APPENDIX D TECHNICAL SUPPORT DUA1611 0AAA02 book Page 206 Thursday August 2 2001 4 01 PM ...
Страница 212: ...212 INDEX DUA1611 0AAA02 book Page 212 Thursday August 2 2001 4 01 PM ...
Страница 214: ...DUA1611 0AAA02 book Page 214 Thursday August 2 2001 4 01 PM ...