Lancom Systems LCOS 3.50 Manuel d'utilisateur Page 333

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 346
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 332
Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50
333
Virtual Private Networks—
VPN
The AH process in the sender
In the sender, the authentication data is generated in 3 steps.
A checksum is calculated for the complete package using a hash
algorithm.
This checksum is once again sent through a hash algorithm together with
a key known to both the sender and the recipient.
This results in the required authentication data which is inserted in the AH
header.
Checking of integrity and authenticity by the recipient
The AH protocol works in a very similar manner at the recipient's end. The
recipient also uses his key to calculate the authentication data for the received
Authentication data,
ICV
Checksum
(hash code)
IP header AH header Data
Vue de la page 332
1 2 ... 328 329 330 331 332 333 334 335 336 337 338 ... 345 346

Commentaires sur ces manuels

Pas de commentaire