02.01.2015 Views

Installation & Setup User Guide - Best Access Systems

Installation & Setup User Guide - Best Access Systems

Installation & Setup User Guide - Best Access Systems

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Installation</strong> & <strong>Setup</strong> <strong>User</strong> <strong>Guide</strong><br />

Appendix N:<br />

Encryption<br />

Encryption Overview<br />

Encryption is the translation of data into secret code. The purpose of encryption<br />

is to achieve data security. Data sent to and from the B.A.S.I.S. database can be<br />

encrypted using either of two methods:<br />

• Windows Internet Protocol Security (IPSec), a part of Microsoft Windows<br />

2000 Server/Professional<br />

• IRE SafeNet/Speed<br />

Windows 2000 IP Security is based on IPSec (Internet Protocol Security), a set of<br />

protocols being developed by the IETF (Internet Engineering Task Force) to<br />

support application-transparent exchange of packets at the IP layer. IPSec<br />

supports two encryption modes: transport and tunnel. Using IPSec transport<br />

mode, end-to-end security from client-to-server, server-to-server, and client-toclient<br />

can be accomplished. Using L2TP (Layer Two Tunneling Protocol)<br />

secured by IPSec, secure remote access from client-to-gateway over the Internet<br />

can be accomplished. Refer to the IPSec end-to-end walkthrough document in the<br />

Windows 2000 Resource Kit to set up Windows 2000 IP Security for use with<br />

the B.A.S.I.S. system.<br />

IRE SafeNet/Speed is a hardware device that encrypts data passing from one<br />

network to another. SafeNet/Speed automatically encrypts user data with the<br />

Triple-Data Encryption Standard (Triple-DES) for public key encryption.<br />

The encryption that occurs with the B.A.S.I.S. system can be broken down into<br />

two main segments: peer-to-peer and peer-to-panel. Peer-to-peer encryption<br />

occurs between the workstation that is within the secured area and the server that<br />

is outside the secured area. Peer-to-panel encryption occurs between the<br />

workstation within the secured area and the panel via the IRE SafeNet/Speed<br />

box.<br />

A key is a number or set of characters that an algorithm uses to encrypt or decrypt<br />

data. The peer-to-peer and peer-to-panel encryption segments use different keys.<br />

In this document, the key that peer-to-panel encryption uses is referred to as key<br />

A, and the key that peer-to-peer encryption uses is referred to as key B. Key A is<br />

only used within the secured area, while key B is used when encrypted data is<br />

sent between the workstation in the secured area and the server that is outside the<br />

secured area.<br />

revision 143 — 299

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!