![Black Box LS1016A Скачать руководство пользователя страница 374](http://html.mh-extra.com/html/black-box/ls1016a/ls1016a_user-manual_2763435374.webp)
Appendix G - IPSEC
374
BLACK BOX
®
Advanced Console Server
Using IPsec to create a VPN
A VPN, or Virtual Private Network lets two networks communicate securely when the only
connection between them is over a third network which they do not trust.
The method is to put a security gateway machine between each of the communicating net-
works and the untrusted network. The gateway machines encrypt packets entering the
untrusted net and decrypt packets leaving it, creating a secure tunnel through it.
The Authentication
A complication, which applies to any type of connection, is that a secure connection cannot
be created magically. There must be some mechanism which enables the gateways to reliably
identify each other. Without this, they cannot sensibly trust each other and cannot create a
genuinely secure link.
In the BLACK BOX
®
Advanced Console Server IPsec implementation there are two methods
of authentication:
1.
A shared secret provides authentication. If Alice and Bob are the only ones who know a
secret and Alice receives a message which could not have been created without that
secret, then Alice can safely believe the message came from Bob.
2.
A public key or RSA authentication can also provide authentication. If Alice receives a
message signed with Bob's private key (which of course only he should know) and she
has a trustworthy copy of his public key (so that she can verify the signature), then she
can safely believe the message came from Bob.
The Encryption
In a tunnel, the two system must have a common key that they will use to encrypt and
decrypt the packages. The key for the encryption can be provided in two ways:
Maual keying
The two ends share a secret key to encrypt their message. Of
course, if an enemy gets the key, all is lost. The BLACK BOX
®
Advanced Console Server IPsec implementation does not
support manual keying.
Automatic keying
The two systems authenticate each other and negotiate their
own secret key. The key are automatically changed periodically.
Содержание LS1016A
Страница 12: ...Table of Contents 12 BLACK BOX Advanced Console Server This page has been left intentionally blank ...
Страница 30: ...Introduction and Overview 30 BLACK BOX Advanced Console Server This page has been left intentionally blank ...
Страница 282: ...Time Zone 282 BLACK BOX Advanced Console Server This page has been left intentionally blank ...
Страница 406: ...Appendix H Web User Management 406 BLACK BOX Advanced Console Server Figure 43 Access Limit List default page ...
Страница 414: ...Appendix H Web User Management 414 BLACK BOX Advanced Console Server This page has been left intentionally blank ...
Страница 439: ...List of Figures User Guide 439 47 Terminal Server diagram 422 48 Ports configured for Dial in Access 424 ...
Страница 440: ...List of Figures 440 BLACK BOX Advanced Console Server This page has been left intentionally blank ...
Страница 449: ...This page has been left intentionally blank ...