|
|
Авторизация |
|
|
Поиск по указателям |
|
|
|
|
|
|
|
|
|
|
Snader J.C. — VPNs Illustrated: Tunnels, VPNs, and IPsec |
|
|
Предметный указатель |
/dev/urandom device
/etc/ppp/auth-down file
/etc/ppp/auth-up file
/etc/ppp/ip-down file
/etc/ppp/ip-up file
/etc/ppp/ppp.conf file
/etc/ppp/ppp.linkdown file
/etc/ppp/ppp.linkup file
2nd 3rd 4th 5th 6th [See AS]
2nd [See AVP]
3DES (triple DES) 2nd 3rd 4th 5th 6th 7th 8th
3DES, definition of
Aboba, B. 2nd 3rd 4th
Accept function
access concentrator, definition of
ACCM (asynchronous control character map)
ACCM, attribute value field
ACCM, definition of
ACK flag, definition of
Adams, R.
Address
Address Resolution Protocol [See ARP]
Address, broadcast
Address, IPv6
address, limited broadcast
address, network-directed broadcast
address, private 2nd 3rd 4th 5th
Addressing
addressing, classful
addressing, IP
Adleman, L.M. 2nd 3rd
Advanced Encryption Standard [See AES]
AES (Rijndael) 2nd 3rd 4th 5th 6th 7th 8th
Agarwal, P.
aggressive mode, definition of
AH (Authentication Header protocol) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
AH, definition of 2nd
AH, header
AH, header, definition of
AH, input processing
AH, IPsec protocol
AH, IPv6
AH, output processing
AH, processing
AH, transport mode
AH, tunnel mode
Akyol, B.
Albaugh, T.
alert
alert, message types, SSL
alert, SSL
Algorithm
algorithm, Bellman-Ford
Algorithm, Dijkstra's
Algorithm, extended Euclidean
alleged RC4
Allen, C.
Alvestrand, H.T.
Anderson, R.
Andersson, L.
AppleTalk 2nd
Application layer 2nd 3rd
application layer, definition of
arithmetic, ones-compliment
Arkko, J.
ARP (Address Resolution Protocol), definition of
assigned
assigned, session ID, definition of
assigned, tunnel AVP, definition of
asymmetric cipher 2nd 3rd 4th
Asynchronous Control Character Map [See ACCM]
Atkinson, R. 2nd 3rd 4th 5th 6th 7th
Attack
attack, DOS
attack, Smurf
auth-up file
Authentication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th
Authentication Header protocol [See AH]
authentication, VTun
avalanche effect, definition of
AVP (attribute value pair)
AVP, definition of
AVP, HELLO
AVP, L2TP message type
AVP, Result code
AVPs
AVPs, CDN
AVPs, ICCN
AVPs, ICRP
AVPs, ICRQ
AVPs, OCCN
AVPs, OCRP
AVPs, OCRQ
AVPs, SCCCN
AVPs, SCCRP
AVPs, SCCRQ
AVPs, SLI
AVPs, SopCCN
AVPs, WEN
Barrett, D.J. 2nd 3rd
bash program
Baugher, M.
Baze, M.
bc program 2nd
bearer
bearer, capabilities, definition of
bearer, type, definition of
Begley, L.
Bellare, M. 2nd 3rd 4th 5th 6th
Bellman-Ford algorithm
Bellovin, S.M. 2nd
Bentley, J.
BGP (Border Gateway Protocol) 2nd 3rd
Birthday paradox 2nd
bit-flipping, definition of
BITS (bump-in-the-stack), definition of
BITW (bump-in-the-wire), definition of
Bleichenbacher, D. 2nd
Block cipher 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
Blowfish 2nd 3rd 4th 5th 6th 7th 8th 9th
Blunk, L.J.
Boneh, D.
Booth, S.
BOOTP
Border gateway protocol [See BGP]
border router, definition of
Borman, D.
Braden, R.T.
Broadcast address
Brumley, D.
BSD r-commands 2nd 3rd 4th
bsd work station 2nd
bump-in-the-stack [See BITS]
bump-in-the-wire [See BITW]
CA (certificate authority) 2nd 3rd 4th 5th 6th
CA, definition of
call serial number, definition of
called number, definition of
calling number, definition of
Callon, R.
Canetti, R. 2nd 3rd 4th
Canvel, B.
Carlson, J. 2nd 3rd 4th 5th
Carrel, D. 2nd
cat program
CBC mode, definition of
CCP (Compression Control Protocol), definition of
CDN AVPs
Certificate 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
Certificate authority [See CA]
| certificate, chain
certificate, revocation
certificate, SSL 2nd 3rd 4th 5th 6th 7th 8th
certificate, types, IKE
certificate, X.509
CFB (cipher feedback mode), definition of
challenge, definition of
Challenge-Handshake Authentication Protocol [See CHAP]
Chandra, P.
change cipher spec, SSL
channel messages, SSHv2
CHAP (Challenge-Handshake Authentication Protocol), definition of
Cheval, P.
CIDR (classless interdomain routing) 2nd 3rd
CIPE 2nd 3rd 4th 5th
CIPE, binary packet
CIPE, binary packet, definition of
CIPE, configuration data, definition of
CIPE, control message types
CIPE, control messages
CIPE, key exchange packet, definition of
CIPE, key exchange types
CIPE, key negotiation
CIPE, P byte, definition of
CIPE, security
ciped program 2nd
Cipher
cipher block chaining mode [See CBC]
cipher feedback mode [See CFB]
cipher, asymmetric 2nd 3rd 4th
cipher, block 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
cipher, Feistel 2nd
cipher, stream 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
cipher, suite, SSL
cipher, symmetric 2nd 3rd 4th
Clark, J.
classful
classful, address ranges
classful, addressing
Classless interdomain routing [See CIDR]
Client
client, authentication, SSL
client, hello, SSL
client, key exchange, SSL
closure notification, SSL
Cobb, S.
combined
combined, mode cryptographic algorithms
combined, security associations
Comer, D.E. 2nd
Compression Control Protocol [See CCP]
computationally infeasible, definition of
Connection
connection, set up
connection, shutdown
connection-based 2nd
Connectionless 2nd 3rd
connectionless, definition of
conservative label retention mode, definition of
Conta, A.
control messages
control messages, L2TP
control messages, PPTP
counter mode [See CTR]
CRC (Cyclic Redundancy Check) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
CRC-32 compensation attack detector
Crocker, S.D.
cryptographic
cryptographic, hash function
cryptographic, implementations
cryptographically secure random number
Cryptography 2nd
cryptography, elliptic curve
csh program
CTR mode, definition of
Cyclic redundancy check [See CRC]
Dai, W.
Data Encryption Standard [See DES]
Datagram Transport Layer Security [See DTLS]
datalink layer, definition of
Davari, S.
Davie, B.
Davis, C.R.
Dawson, E.
dc1 device
de Groot, J.G.
de Wegner, B.
decorrelation, definition of
Deep Crack
Deering, S.
Deering, S.E. 2nd
Denial of Service [See DOS]
DES (Data Encryption Standard) 2nd 3rd 4th 5th
DHCP (Dynamic Host Configuration Protocol) 2nd
DiBurro, L. 2nd
Dierks, T.
Diffie, W. 2nd 3rd
Diffie-Hellman key
Diffie-Hellman key, exchange 2nd 3rd
Diffie-Hellman key, exchange, SSL
Digital signature 2nd 3rd 4th 5th 6th 7th 8th
Digital Signature Algorithm [See DSA]
Digital Signature Standard [See DSS]
Digital Subscriber Line [See DSL]
Dijkstra's algorithm
Dijkstra, E.W.
Discrete logarithm 2nd
DISPLAY variable
distance vector protocol 2nd
Dixon, W. 2nd 3rd
DNS (Domain Name System) 2nd 3rd 4th 5th
DOI (Domain of Interpretation), definition of
Domain Name System [See DNS]
Domain of Interpretation [See DOI]
Dommety, G.
Doolan, P.
Doraswamy, N. 2nd
DoS (Denial of Service) 2nd 3rd
DOS (denial of service), attack
downstream on demand mode, definition of
Dreyfus, S.
DSA (Digital Signature Algorithm) 2nd
DSL (Digital Subscriber Line)
DSL (Digital Subscriber Line), definition of
DSS (Digital Signature Standard) 2nd 3rd 4th
DSS (Digital Signature Standard), definition of
DTLS (Datagram Transport Layer Security), definition of
Dynamic Host Configuration Protocol [See DHCP]
EAP (Extensible Authenication Protocol), definition of
Eastlake, D.E., 3rd
EBC mode, definition of
echo
echo, function
echo, program
echoit program 2nd
ECP, definition of
EDE mode, definition of
Effective TCP/IP Programming [See ETCP]
Egevang, K.B.
EGP (Exterior Gateway Protocol)
EGP (Exterior Gateway Protocol), definition of
egress router, definition of
EIGRP (Enhanced Interior Gateway Routing Protocol)
electronic code book mode [See ECB]
Electronic Frontier Foundation
ElGamal 2nd 3rd 4th 5th
ElGamal, T.
elliptic curve cryptography
Encapsulating security payload [See ESP]
Encapsulation 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd
|
|
|
Реклама |
|
|
|