Index-1
IIIInnnnd
ddde
eeex
xxx
Index
Index
Index
Index
Numerics
Numerics
Numerics
Numerics
3DES
...................................................
2-7
A
A
A
A
AH key length
.......................................
3-4
algorithms
............................................
3-2
See also secure profiles
application ports
...................................
1-9
assymetric cryptographic systems
..
2-9
,
2-10
authentication headers
..........................
3-4
authentication methods
.............
3-6
,
4-1
–
4-6
certificate authentication
.................
4-2
challenge phrase authentication
.......
4-3
Entrust authentication
.....................
4-6
RADIUS authentication
...................
4-5
SecurID authentication
....................
4-4
B
B
B
B
black networks
.....................................
5-2
black tunnels
.......................................
5-20
brute force attacks
...............................
2-13
C
C
C
C
CBC (outer cipher block chaining)
.........
2-8
certificate authentication
.......................
4-2
challenge phrase authentication
.............
4-3
crypto period length
..............................
3-6
crypto periods
.....................................
2-12
cryptographic systems
...................
2-1
–
2-10
3DES
.............................................
2-7
asymmetric
....................................
2-9
symmetric
......................................
2-3
symmetric v. asymmetric
................
2-10
triple pass DES
...............................
2-5
D
D
D
D
Data Encryption Standard (DES)
............
2-4
default gateways
...................................
1-8
DES (Data Encryption Standard)
............
2-4
Diffie-Hellman key exchange protocol
...
2-11
E
E
E
E
Encapsulating Security Payload (ESP)
AH key length
.................................
3-4
authentication headers
....................
3-4
iv length
.........................................
3-4
See also encapsulation
encapsulation
.......................................
3-3
Encapsulating Security Payload (ESP)
3-1
Shiva Smart Tunneling (SST)
...........
3-1
See also secure profiles
encryption
............................................
2-1
Entrust authentication
...........................
4-6
F
F
F
F
filters
...................................................
5-6
firewall rules
and tunnel termination
...................
5-31
multiuser tunnels
...........................
5-18
one-way in firewall rules
.................
5-22
one-way out firewall rules
...............
5-24
single-user tunnels
.........................
5-14
stateful
...........................................
5-4
stateless
.........................................
5-2
firewalls
...............................................
5-1
full access
multiuser tunnels
...........................
5-17
single-user tunnels
.........................
5-12
functions of
HP SA3000 Series VPN Client
...........
1-3
HP SA3000 Series VPN Manager
.......
1-2
VPN device
.....................................
1-2
IIII
inbound proxies
...................................
5-28
IP addresses
.........................................
1-6
network address translation (NAT)
.
5-12
iv (initialization vector) length
...............
3-4
K
K
K
K
keepalive
..............................................
3-2
See also secure profiles
key operations
................................
1-3
,
2-9