ipsec 中文意思是什麼

ipsec 解釋
安全性
  1. The new solution of nat and ipsec protocol compatibility

    協議兼容性問題解決方案
  2. For additional information on how to configure a dynamic - to - static vpn tunnel between the pix and asa, refer to pix / asa 7. x pix - to - pix dynamic - to - static ipsec with nat and vpn client configuration example

    也就是說,如果靜態圖和動態圖混用的時候,應該將動態圖放在前面,否則就會出現我遇到的問題。
  3. The company founded by bruce schneier and tom rowley ; holds ferguson and schneier s critical evaluation of ipsec among much other useful information

    ,該公司由bruce schneier和tom rowley創辦;擁有ferguson和schneier對ipsec的批評性評估,以及許多其它有用信息
  4. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6協議的由來和優點之後,詳細闡述了虛擬專用網的概念、特點、安全技術及實現的關鍵隧道協議,通過對實現技術的分析比較,選用了安全性強大的ipsec隧道技術,接著深入研究了ipv6安全協議ipsec的體系結構、操作模式,詳細論述了ipsec協議簇的各個組成部分,如認證報頭ah協議、封裝安全載荷esp協議、密鑰管理ike協議、加密認證演算法、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實現對網路層ip數據包的安全保護。
  5. This dissertation implements an access vpn cryptographical system and illustrates an application example. futhermore, there are more research work need to be done, include incorporating with ipsec protocol and firewall technology

    本文在對各項技術討論和改進的基礎上,採用kerberos協議、 socks協議和國內專用密碼演算法,實現了一個遠程訪問vpn密碼系統,並給出了該密碼系統的實際應用。
  6. Several authentication methods are discussed, and several vpn implementation protocols that include pptp / l2tp protocol, ipsec protocol, socks protocol and mpls protocol are discussed. to implement access vpn, this dissertation use socks protocol, kerberos protocol and domestic cryptographical algorithm

    針對遠程訪問vpn密碼系統的實現,我們採用socks協議做為vpn實現協議,使用kerberos協議來進行身份認證,使用國內專用密碼演算法來進行數據的加解密。
  7. In this paper we study the security mechanism based on ip, because ipsec protocol is a security mechanism based on cryptograph, we discussed cyptograhical algorithm firstly, then we analyze the cryptographical modes in the enviroment of ip communications

    本文對基於ip的安全機制? ? ipsec協議進行了研究, ipsec協議是基於加密機術的安全機制。本文首先研究了加密演算法,重點研究了高級加密標準( aes )演算法及其在ipsec協議中的應用,並對ip環境下的加密模式做了一定的分析。
  8. Ike ( internet key exchange ) is the protocol which performs mutual authentication and establishes security associations ( sas ) for ipsec ( ip security ). it is a very important component of the ipsec protocol suite

    因特網密鑰交換( internetkeyexchangeike )協議是ipsec ( ipsecurity )協議簇的重要組成部分,負責動態協商和管理安全聯盟。
  9. It includes chip selection, schematic circuit design, cpu selection and configuration, startup of the system, selection and configuration of embedded operation system, selection and configuration of tcp / ip software. it also describes some driver programming techniques of network controller. part 3 ( chapter 5 and 6 ) briefly introduces encryption technology and the ipsec protocol system, including architecture, mode, security association, security policy, implementation mode, processing of in / out packet, esp ( encapsulation security payload ), ah ( authentication header ), ike ( internet key exchange ) etc. the security requirements of embedded - networking is also analyzed

    本文首先探討了嵌入式網路的原理和設計要求,接著介紹了本文所開發的嵌入式系統的硬體平臺的設計(包括處理器的選擇與配置、存儲器的選擇和io設備的選用等) ,系統的啟動(包括bios和dos的啟動以及嵌入式操作系統vrtx的配置和引導) ,網路及其安全服務的實現(包括嵌入式協議棧usnet的選取、底層驅動程序的設計和安全協議ipsec的分析與實施) 。
  10. The ability of keeping the ip packet ' s integrity, secrecy, authentication, data origination, anti - relay is discussed. the relationship of ipsec component authentication header ( ah ), encapsulating security payload ( esp ) and ike ( internet key exchange ) is also talked about. this discussion of ipsec makes the impression that ipsec make ip layer security enough

    論述了ipsec在ip報文的完整性、機密性、數據來源認證和抗重播等方面的能力, ipsec的基本協議? ?認證報文頭( ah )和安全封裝載荷報頭( esp )與ipsec安全體系的其它組成部分如安全策略、加密和認證演算法、密鑰管理等如何合作,共同完成對ip報文的安全保護。
  11. Ipsec is a new ip security protocol suite

    Ipsec協議是一個新的ip層安全協議。
  12. Elementary analysis of ipsec and the vpn security technology

    與虛擬專用網安全技術
  13. Research on application of ipsec at campus network of ipv

    6的校園網安全中的應用研究
  14. Vpn technology based on ipsec and its realization

    的虛擬專用網技術及其實現
  15. Multicast research and implementation based on ipsec

    的組播研究與實現
  16. One clue is the research of virtue private network and ipsec

    第一條線索從vpn的研究開始。
  17. Netbsd paper on ipsec with netbsd

    Netbsd關于帶有netbsd的ipsec的文章
  18. Research and implementation of cooperation of ipsec and firewall

    與防火墻協同工作設計與實現
  19. Design of pki - enhanced agent ipsec - vpn gateway

    代理網關的設計與實現
  20. The paper analyzes the secure problem existing in the tcp / ip protocol, discusses the possibility and superiority of secure transmission in network layer, researches the architecture of protocol ipsec, presents the design thought of using ipsec to realize the secure transmission within the pbc ' s intranet under the windows. the paper gives a schema of secure transmission system in the pbc ' s intranet, realizes it using the windows kernel program technology and obeying the specifications of ndis and ipsec. the secure transmission system promotes the secure extent of the pbc ' s intranet

    論文針對人民銀行內聯網面臨的信息和數據安全傳輸問題,分析了tcp / ip協議存在的安全問題,探討了在tcp / ip網路層實現安全傳輸的可能性和優越性,認真研究了ipsec協議體系結構和esp協議、 ah協議、 ike密鑰交換協議的原理,在既要保護已有投資,又要提高安全程度的前提下,提出了在windows操作系統下採用ipsec實現人民銀行內聯網安全傳輸的設計思想。
分享友人