Encapsulation and Packet Handling
3-6
Hewlett-Packard Company Virtual Private Networking Concepts Guide
SST Encapsulation
SST Encapsulation
SST Encapsulation
SST Encapsulation
When the encapsulation is set to Shiva Smart Tunneling (SST),
the following information must be specified to fully define the
security profile.
Authentication
Authentication
Authentication
Authentication
Method
Method
Method
Method
The authentication method must be set to either certificates,
challenge phrases, SecurID, or RADIUS. Challenge phrases are
often referred to as authentication keys. Sometimes challenge
phrases are called passwords, but this is not a good synonym.
Public Key
Public Key
Public Key
Public Key
Length
Length
Length
Length
The public key length must be set to 512 bits, 1024 bits, or 2048
bits. Note that public keys are used during the authentication
and session key exchange processes. The longer the public key
length, the more secure the session negotiation will be.
Crypto Period
Crypto Period
Crypto Period
Crypto Period
Length
Length
Length
Length
The crypto period length defines how long a session key will be
used. The default value for the crypto period is 1 month,
although it can be set to as low as 3 hours. Given that a packet
encrypted with a 90-bit key will require about 20 years of effort
by a well-funded dedicated adversary to crack, it is often
sufficient to use the default value for crypto period length.
Related
Related
Related
Related
Information
Information
Information
Information
ESP Encapsulation (page 3-4)
Packet Handling (page 3-7)
Packet Keys (page 3-8)