25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

header format 758<br />

S<br />

SA bundle 811, 826<br />

secret, shared 783<br />

secure DNS server 838<br />

Secure Electronic Transactions (SET) 787<br />

acquirer 880<br />

cardholder 880<br />

certificate authority 881<br />

issuer 880<br />

key management 884<br />

merchant 880<br />

payment gateway 880<br />

transactions 881<br />

Secure Hash Algorithm 1 (SHA-1) 788<br />

secure local cache 838<br />

Secure Sockets Layer (SSL) 854<br />

certificate 859<br />

change CipherSpec protocol 857<br />

compatibility 856<br />

connection state 857<br />

generate encryption key 860<br />

h<strong>and</strong>shake phase 855<br />

H<strong>and</strong>shake Protocol 854, 858<br />

master key 860<br />

message authentication code (MAC) 860<br />

public key 860<br />

Record Layer 858<br />

Record Protocol 854, 860<br />

security issues 855<br />

session 856<br />

session state 857<br />

states 856<br />

symmetric-key 860<br />

<strong>TCP</strong> port 443 855<br />

Security Association Database (SAD) 811<br />

security exposures 773<br />

security ID cards 800<br />

Security Parameter Index (SPI) 810, 814, 819<br />

security policy 776<br />

Security Policy Database (SPD) 811<br />

security solutions 773, 775<br />

Serial Line <strong>IP</strong> (SL<strong>IP</strong>) 874<br />

addressing<br />

35<br />

implementations 35<br />

overview 34<br />

Van Jacobson Header Compression 35<br />

SET 792<br />

SHA-1 788<br />

shared keys 782<br />

shared secret 783, 785, 788–789<br />

Simple Internet Transition (SIT) 379<br />

SKEYID 836, 844<br />

SKEYID_a 837, 842<br />

SKEYID_d 837<br />

SKEYID_e 837<br />

SNA<br />

LCP 36<br />

Link Control Protocol (LCP) 36<br />

NCP 36<br />

Network Control Protocol (NCP) 36<br />

SOCKS<br />

authentication methods 848<br />

circuit-level gateway 846<br />

encapsulation method 850<br />

encryption st<strong>and</strong>ards 848<br />

firewall 804, 846<br />

key management systems 848<br />

method options 849<br />

request detail message 851<br />

SOCKS server 846<br />

SOCKS-enabled client 847<br />

SOCKS-enabled <strong>TCP</strong>/<strong>IP</strong> stack 847<br />

SOCKSv4 847<br />

SOCKSv5 847<br />

<strong>TCP</strong> connection 849<br />

tunneling protocols 848<br />

UDP connection 852<br />

UDP port 852<br />

UDP relay server 853<br />

UDP support 848<br />

version identifier 849<br />

spoofing attack 879<br />

St<strong>and</strong>ard Protocol Numbers (STD) 24<br />

STD 01 25, 36<br />

STD 02 25<br />

STD 03 25<br />

STD 04 25<br />

STD 05 68, 109<br />

STD 51 35<br />

stream algorithm 779<br />

Strict Source Routing 106<br />

strong cryptography 823<br />

subnet mask 73<br />

determining 77<br />

Index 973

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!