![IBM WebSphere XS40 Скачать руководство пользователя страница 259](http://html.mh-extra.com/html/ibm/websphere-xs40/websphere-xs40_command-reference-manual_607316259.webp)
Table 5. Available algorithm keywords for the cipher string (continued)
Algorithm keyword Meaning
eNULL
or
NULL
NULL ciphers offer no encryption at all and are a security
risk. These cipher suites are disabled unless explicitly
included.
aNULL
The cipher suites offering no authentication. This is
currently the anonymous DH algorithms. These cipher suites
are vulnerable to
man-in-the-middle
attacks. Use is normally
discouraged.
kRSA
and
RSA
Cipher suites using RSA key exchange.
kEDH
Cipher suites using ephemeral DH key agreement.
kDHr
and
kDHd
Cipher suites using DH key agreement and DH certificates
signed by Certificate Authorities with RSA and DSS keys
respectively. Not implemented.
aRSA
Cipher suites using RSA authentication. This is, the
certificates carry RSA keys.
aDSS
and
DSS
Cipher suites using DSS authentication. This is, the
certificates carry DSS keys.
aDH
Cipher suites effectively using DH authentication. This is,
the certificates carry DH keys. Not implemented.
kFZA
,
aFZA
,
eFZA
or,
FZA
Cipher suites using FORTEZZA key exchange,
authentication, encryption, or all FORTEZZA algorithms.
Not implemented.
TLSv1
,
SSLv3
, and
SSLv2
TLS version 1.0, SSL version 3.0, and SSL version 2.0 cipher
suites, respectively.
DH
Cipher suites using DH, including anonymous DH.
ADH
Anonymous DH cipher suites.
3DES
Cipher suites using triple DES.
DES
Cipher suites using DES, except triple DES.
RC4
Cipher suites using RC4.
RC2
Cipher suites using RC2.
IDEA
Cipher suites using IDEA.
MD5
Cipher suites using MD5.
SHA1
or
SHA
Cipher suites using SHA-1.
AES
Cipher suites using AES.
The cipher string consists of one or more cipher keywords separated by
colons. Commas or spaces are acceptable separators, but colons are the
norm.
The cipher string can take different forms.
v
A single cipher suite, such as
RC4-SHA
.
v
A list of cipher suites that contains a certain algorithm, or cipher suites
of a certain type. For example
SHA1
represents all ciphers suites using the
SHA-1 digest algorithm.
v
A combination of single cipher string using the
+
character, which is
used as a logical
AND
operation. For example
SHA1+DES
represents all
cipher suites that contain the SHA-1 and the DES algorithms.
Chapter 11. Crypto configuration mode
233
Содержание WebSphere XS40
Страница 1: ...WebSphere DataPower XML Security Gateway XS40 Command Reference Version 3 7 2 ...
Страница 2: ......
Страница 3: ...WebSphere DataPower XML Security Gateway XS40 Command Reference Version 3 7 2 ...
Страница 44: ...18 Command Reference ...
Страница 194: ...168 Command Reference ...
Страница 198: ...172 Command Reference ...
Страница 206: ...180 Command Reference ...
Страница 210: ...184 Command Reference ...
Страница 222: ...196 Command Reference ...
Страница 232: ...206 Command Reference ...
Страница 238: ...212 Command Reference ...
Страница 268: ...242 Command Reference ...
Страница 272: ...246 Command Reference ...
Страница 276: ...250 Command Reference ...
Страница 288: ...262 Command Reference ...
Страница 292: ...266 Command Reference ...
Страница 298: ...272 Command Reference ...
Страница 320: ...294 Command Reference ...
Страница 322: ...296 Command Reference ...
Страница 340: ...314 Command Reference ...
Страница 344: ...318 Command Reference ...
Страница 352: ...326 Command Reference ...
Страница 360: ...334 Command Reference ...
Страница 368: ...342 Command Reference ...
Страница 376: ...350 Command Reference ...
Страница 386: ...360 Command Reference ...
Страница 392: ...366 Command Reference ...
Страница 396: ...370 Command Reference ...
Страница 402: ...376 Command Reference ...
Страница 404: ...378 Command Reference ...
Страница 408: ...382 Command Reference ...
Страница 446: ...420 Command Reference ...
Страница 450: ...424 Command Reference ...
Страница 456: ...430 Command Reference ...
Страница 458: ... message type Extranet Message type configuration mode no message matching TFDef2 432 Command Reference ...
Страница 520: ...494 Command Reference ...
Страница 536: ...510 Command Reference ...
Страница 550: ...524 Command Reference ...
Страница 584: ...558 Command Reference ...
Страница 600: ...574 Command Reference ...
Страница 605: ... timeout 500 Chapter 63 RADIUS configuration mode 579 ...
Страница 606: ...580 Command Reference ...
Страница 638: ...v Allow access by the admin account to all access methods restrict admin off 612 Command Reference ...
Страница 650: ...624 Command Reference ...
Страница 667: ...v Specifies support for SNMP Version 2c the default state version 2c Chapter 72 SNMP Settings configuration mode 641 ...
Страница 668: ...642 Command Reference ...
Страница 704: ...678 Command Reference ...
Страница 714: ...688 Command Reference ...
Страница 726: ...700 Command Reference ...
Страница 734: ...708 Command Reference ...
Страница 752: ...726 Command Reference ...
Страница 756: ...730 Command Reference ...
Страница 804: ...778 Command Reference ...
Страница 880: ...854 Command Reference ...
Страница 892: ...866 Command Reference ...
Страница 912: ...886 Command Reference ...
Страница 918: ...892 Command Reference ...
Страница 940: ...914 Command Reference ...
Страница 946: ...920 Command Reference ...
Страница 974: ...948 Command Reference ...
Страница 1004: ...978 Command Reference ...
Страница 1030: ...1004 Command Reference ...
Страница 1032: ...1006 Command Reference ...
Страница 1038: ...Other company product and service names may be trademarks or service marks of others 1012 Command Reference ...
Страница 1065: ......
Страница 1066: ... Printed in USA ...