| 1. | The aggregation of these parameters , which are refreshed by ike , is called sa Ike将这些安全参数构成的安全参数集合称为安全关联sa 。 ike还负责这些安全参数的刷新。 |
| 2. | The second chapter introduces the protocols contained in ipsec protocol stack , the work modes and the methods to build security associations 第二章描述了ipsec协议族所包含的协议、 ipsec的工作模式、建立安全关联的方法。 |
| 3. | Security policy , which defines the security association to protect the communication between two entities , is an important part of the ipsec 安全策略作为ipsec协议的重要组成部分,为两个实体定义安全关联,保护相互间的通信。 |
| 4. | Ike protocol is an important part of the ipsec protocol suite . ike protocol serves as negotiator and manager of security association Ike ( internetkeyexchage )协议是ipsec协议族的重要协议之一,负责动态协商和管理安全关联。 |
| 5. | Security policy , which defines the security association to protect the communication between two entities , is an important part of the ipsec . this paper proposes architecture for security policy system 第七部分:安全策略作为ip安全协议的重要组成部分,为两个实体定义安全关联,保护相互间的通信。 |
| 6. | However , it should be noted that such use can only be made secure if communication between the supplicant client and authenticator access points systems takes place using a secure association 然而,应该注意到,只有通过使用安全关联进行恳求者[客户机]和验证者[接入点]系统之间的通信时,才能使这样的使用成为安全的。 |
| 7. | The realization includes establishing and managing security association database in linux kernel , developing pf _ key socket interface and pf _ key message , and designing the state machines of ike main mode and ike quick mode 包括如何在内核中创建和管理安全关联数据库,如何实现pf _ key套接字接口和pf _ key消息,如何设计ike协议的主模式和快速模式的状态机等等。 |
| 8. | It pays a great attention to the internet security association and key management protocol ( isakmp ) and the internet key exchange ( ike ) based on isakmp , because the key management is always the most consequential part of any security systems 然后针对在安全系统中至关重要的密钥管理进行了重点分析,这其中包括了internet安全关联密钥管理协议,以及以它为框架在ipsec中实现的internet密钥交换协议,并且简单说明了在上述密钥管理协议中密钥信息的生成公式。 |
| 9. | The security problems are dealt with in chapter three , we give the authentication mechanism used before , and also the recently - present aaa infrastructure o f ietf working group that aims at separating the authentication process from the registration process , then we propose a new method to fresh the security association between each functional entities involved in the infrastructure on the basis of that 第三章描述了移动ip中的安全问题。说明了移动ip机制中所采用的认证机制,介绍了近期由ietf工作组所提出的mip - aaa认证机制,该机制的目的是为了将注册和认证过程相分离。在此基础上,我们提出了一种新的更新其间各个功能实体间安全关联的有效方法。 |