Lancom-systems LCOS 3.50 Bedienungsanleitung Seite 333

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 346
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 332
Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50
333
Virtual Private Networks—
VPN
The AH process in the sender
In the sender, the authentication data is generated in 3 steps.
A checksum is calculated for the complete package using a hash
algorithm.
This checksum is once again sent through a hash algorithm together with
a key known to both the sender and the recipient.
This results in the required authentication data which is inserted in the AH
header.
Checking of integrity and authenticity by the recipient
The AH protocol works in a very similar manner at the recipient's end. The
recipient also uses his key to calculate the authentication data for the received
Authentication data,
ICV
Checksum
(hash code)
IP header AH header Data
Seitenansicht 332
1 2 ... 328 329 330 331 332 333 334 335 336 337 338 ... 345 346

Kommentare zu diesen Handbüchern

Keine Kommentare