25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Security Parameter Index (SPI) 810<br />

Security Policy Database (SPD) 811<br />

transform 810<br />

transport adjacency 823, 826<br />

tunneling 812<br />

<strong>IP</strong> stack 125<br />

<strong>IP</strong> Version 6 (<strong>IP</strong>v6) 352–353, 357, 363<br />

address space 339<br />

anycast address 345<br />

automatic tunneling 381<br />

configured tunneling 385<br />

DNC extensions 368<br />

dual stack 380<br />

extension headers 333<br />

authentication 339, 347<br />

destination options 339<br />

ESP 339<br />

fragment 351<br />

hop-by-hop 335<br />

redid=ipv6ext.type-length-value (TLV) option<br />

format 333<br />

routing 337<br />

type-length-value (TLV) option format 335<br />

flow 346<br />

flow labels 346<br />

format prefix 340<br />

fragment header 339, 351<br />

header checksum 333<br />

header translation 387<br />

Hop-by-Hop header 335<br />

inverse DNS lookups 368<br />

<strong>IP</strong>v4-compatible address 341<br />

<strong>IP</strong>v4-mapped address 341<br />

<strong>IP</strong>v6 addresses 339<br />

link-local unicast address 341<br />

options 333<br />

packet sizes 350<br />

site-local unicast address 341<br />

solicited node multicast address 345<br />

transition from <strong>IP</strong>v4 379<br />

tunneling 335, 381<br />

automatic 381<br />

configured 385<br />

tunneling over <strong>IP</strong>v4 networks 381<br />

VPN 863<br />

<strong>IP</strong>6.INT domain 368<br />

<strong>IP</strong>-FDDI 33<br />

<strong>IP</strong>v6 863<br />

<strong>IP</strong>X 812<br />

968 <strong>TCP</strong>/<strong>IP</strong> <strong>Tutorial</strong> <strong>and</strong> <strong>Technical</strong> <strong>Overview</strong><br />

ISAKMP/Oakley<br />

application-layer security 839<br />

authentication 783, 839–840<br />

authentication key 837<br />

authentication mechanism 831, 839<br />

authentication method 834<br />

certificate 832, 837, 846<br />

certificate authority 837<br />

certificate payload 837, 839<br />

Certificate Request message 838<br />

certificates 840<br />

composite value 836<br />

cryptographic key 831<br />

cryptographic keys 835, 837, 840<br />

denial-of-service 830<br />

destination port 833<br />

Diffie-Hellman 832, 835–836, 838–840, 842,<br />

845<br />

Diffie-Hellman algorithm 784<br />

digital signature 838–839<br />

Digital Signature Algorithm 790, 837<br />

Digital Signature St<strong>and</strong>ard 831<br />

DOI 833–834<br />

Domain of Interpretation (DOI) 833–834, 842<br />

encryption 839<br />

encryption algorithm 834<br />

Encryption Bit 838<br />

Encryption Flag 841<br />

encryption key 837<br />

exponent 835<br />

Flags field 838<br />

hash function 840<br />

Hash Payload 842–844<br />

identity 835<br />

identity payload 837–839<br />

Identity Protect exchange 832<br />

Initiator Cookie 833–834, 836<br />

ISAKMP header 833–834, 838–839, 844<br />

Key Exchange attribute 840<br />

Key Exchange field 836<br />

Key Exchange Payload 843<br />

KEY_OAKLEY 834–835<br />

keying material 830, 836–837, 844–845<br />

LDAP 838<br />

man-in-the-middle 830<br />

master key 832<br />

master secret 831<br />

Message 1 833, 841, 845<br />

Message 2 834, 843, 845

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!