Avaya Configuring Data Encryption Services User Manual Page 1

Browse online or download User Manual for Software manuals Avaya Configuring Data Encryption Services. Avaya Configuring Data Encryption Services User's Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 62
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 0
Part No. 117386-A Rev. A
September 1997
BayRS Version 12.00
Site Manager Software Version 6.00
Configuring Data
Encryption Services
Page view 0
1 2 3 4 5 6 ... 61 62

Summary of Contents

Page 1 - Encryption Services

Part No. 117386-A Rev. ASeptember 1997BayRS Version 12.00Site Manager Software Version 6.00 Configuring Data Encryption Services

Page 3

117386-A Rev. A xi About This Guide If you are responsible for configuring and managing Bay Networks ® routers, read this guide to learn how to confi

Page 4

Configuring Data Encryption Servicesxii 117386-A Rev. A Conventions angle brackets (< >) Indicate that you choose the text to enter based on th

Page 5 - Contents

About This Guide 117386-A Rev. A xiii Acronyms ANSI American National Standards InstituteBRI Basic Rate InterfaceDES Data Encryption StandardDLCI da

Page 6

Configuring Data Encryption Servicesxiv 117386-A Rev. A The Bay Networks Press catalog is available on the World Wide Web at support.baynetworks.com

Page 7

About This Guide 117386-A Rev. A xv If you purchased a Bay Networks service program, call one of the following Bay Networks Technical Solutions Cent

Page 9

117386-A Rev. A 1-1 Chapter 1Data Encryption Overview Bay Networks data encryption services enable you to protect sensitive traffic on your network.

Page 10

Configuring Data Encryption Services1-2 117386-A Rev. A Data Encryption Standard (DES) Bay Networks bases encryption services on DES, which the Unite

Page 11 - About This Guide

Data Encryption Overview 117386-A Rev. A 1-3 Message Digest 5 (MD5) MD5 is a secure hash algorithm, and is a component in a number of IETF standard

Page 12 - Conventions

ii 117386-A Rev. A 4401 Great America Parkway 8 Federal StreetSanta Clara, CA 95054 Billerica, MA 01821 Copyright © 1997 Bay Networks, Inc. All right

Page 13 - Acronyms

Configuring Data Encryption Services1-4 117386-A Rev. A Site Security Carefully restrict access to routers that encrypt data and the workstations you

Page 14 - How to Get Help

Data Encryption Overview 117386-A Rev. A 1-5 Figure 1-1. Hierarchy of Encryption Keys The keys are the• Node Protection Key (NPK). It encrypts the L

Page 15

Configuring Data Encryption Services1-6 117386-A Rev. ANode Protection Key (NPK) The NPK encrypts and decrypts LTSSs.The NPK is stored in the router’s

Page 16

Data Encryption Overview117386-A Rev. A 1-7 The easiest way to enter the NPK is to use a text editor in read-only mode to display the contents of the

Page 17 - Data Encryption Overview

Configuring Data Encryption Services1-8 117386-A Rev. AMaster Encryption Key (MEK)The MEK encrypts the Traffic Encryption Key (TEK). The LTSS for a cir

Page 18 - 117386-A Rev. A

117386-A Rev. A 2-1 Chapter 2Implementation NotesThis chapter describes special issues that you may encounter in configuring and running encryption.Req

Page 19 - Security and Data Encryption

Configuring Data Encryption Services2-2 117386-A Rev. ASynchronizing Router ClocksThe Master Encryption Key must be the same at both ends of a link. T

Page 20 - Encryption Keys

Implementation Notes117386-A Rev. A 2-3 Using Data Compression with EncryptionYou can configure both hardware- and software-based data compression over

Page 21

Configuring Data Encryption Services2-4 117386-A Rev. AUsing Floppy Disks to Store Key FilesFor security reasons, Bay Networks recommends that you use

Page 22 - Node Protection Key (NPK)

117386-A Rev. A 3-1 Chapter 3Enabling EncryptionThis chapter describes how to configure data encryption.Before You BeginBefore you can start data encry

Page 23

117386-A Rev. A iii Bay Networks, Inc. Software License Agreement NOTICE: Please carefully read this license agreement before copying or using the

Page 24 - Traffic Encryption Key (TEK)

Configuring Data Encryption Services3-2 117386-A Rev. AStarting EncryptionTo use Bay Networks data encryption on your network, you must1. Create the s

Page 25 - Implementation Notes

Enabling Encryption117386-A Rev. A 3-3 Creating Seeds on a PCTo use a PC to create seeds that the WEP software uses to generate NPKs and LTSSs, issue

Page 26 - Encryption and Performance

Configuring Data Encryption Services3-4 117386-A Rev. A2. Press Return to create the LTSS key file.WEP displays this message:Enter the path of the key

Page 27 - Using an NPK

Enabling Encryption117386-A Rev. A 3-5 Creating Seeds on a UNIX PlatformTo create a seed on a UNIX platform:1. Set the environment variable for the pa

Page 28

Configuring Data Encryption Services3-6 117386-A Rev. ARunning the WEP wfkseed CommandThe wfkseed command creates the seed that enables you to generat

Page 29 - Enabling Encryption

Enabling Encryption117386-A Rev. A 3-7 Creating NPKs and LTSSsAfter you generate the NPK and LTSS seeds, you open Site Manager and use the WEP Key Man

Page 30 - Creating Seeds

Configuring Data Encryption Services3-8 117386-A Rev. ACreating LTSSsTo generate an LTSS:1. Start Site Manager. Note that you open Site Manager after

Page 31 - Creating Seeds on a PC

Enabling Encryption117386-A Rev. A 3-9 Entering an NPK on a RouterThe router stores its NPK in nonvolatile RAM. To enter the NPK, you work in the secu

Page 32

Configuring Data Encryption Services3-10 117386-A Rev. A6. Save the configuration file.7. Exit the secure shell by enteringkexitYou return to the regula

Page 33 - 117386-A Rev. A 3-5

Enabling Encryption117386-A Rev. A 3-11 Changing an NPK in the MIBTo change the MIB NPK value:1. At any shell prompt on a UNIX platform, or at the DOS

Page 34

iv 117386-A Rev. A its own data and information and for maintaining adequate procedures apart from the Software to reconstruct lost or altered files,

Page 35 - Creating NPKs and LTSSs

Configuring Data Encryption Services3-12 117386-A Rev. AThe kseed command creates the seed that enables WEP to generate random numbers. To create a TE

Page 36 - Creating LTSSs

Enabling Encryption117386-A Rev. A 3-13 5.Exit the Secure Shell by enteringkexitYou return to the regular prompt.Starting Encryption for PPPTo configur

Page 37 - Entering an NPK on a Router

Configuring Data Encryption Services3-14 117386-A Rev. A3. Enter the NPK.You need to do this once for each router or configuration file.After you enter

Page 38 - Monitoring NPKs

Enabling Encryption117386-A Rev. A 3-15 The Encrypt Enable parameter defaults to Disable. Both the PPP Encrypt Enable parameter and the WEP Enable par

Page 39 - Creating TEKs

Configuring Data Encryption Services3-16 117386-A Rev. A2. Select the WEP protocol.3. Enter the NPK.You need to do this once for each router or configu

Page 40

Enabling Encryption117386-A Rev. A 3-17 4.Enter the LTSS Value and LTSS Name.5. Enable Encryption.The Encrypt Enable parameter defaults to Disable. Bo

Page 41 - Starting Encryption for PPP

Configuring Data Encryption Services3-18 117386-A Rev. AConfiguring WEP ParametersWEP has both line and circuit interface parameters. WEP parameters ha

Page 42 - 3. Enter the NPK

Enabling Encryption117386-A Rev. A 3-19 TEK Change BytesThe TEK Change Bytes parameter sets the number of bytes between changes in the value of the TE

Page 43 - 117386-A Rev. A 3-15

Configuring Data Encryption Services3-20 117386-A Rev. ADeleting Encryption from a RouterTo delete encryption from all circuits on which it is current

Page 44 - 2. Select the WEP protocol

117386-A Rev. A A-1 Appendix AEncryption ParametersThis appendix contains parameter descriptions for Frame Relay and PPP encryption parameters, and fo

Page 45

117386-A Rev. A v Contents About This Guide Before You Begin ...

Page 46 - Configuring WEP Parameters

Configuring Data Encryption ServicesA-2 117386-A Rev. AParameter: Encrypt EnablePath: PPP: Configuration Manager > Protocols > PPP > PPP Inter

Page 47 - Disabling Encryption

Encryption Parameters117386-A Rev. A A-3 Parameter: LTSS ValuePath: PPP: Configuration Manager > Protocols > PPP > PPP Interface Lists windowF

Page 48 - 2. Click on OK

Configuring Data Encryption ServicesA-4 117386-A Rev. AWEP Line ParametersParameter: EnablePath: Configuration Manager > Protocols > WEP > Lin

Page 49 - Encryption Parameters

Encryption Parameters117386-A Rev. A A-5 WEP Circuit Interface ParametersParameter: TEK Change (Bytes)Path: Configuration Manager > Protocols > W

Page 50 -

Configuring Data Encryption ServicesA-6 117386-A Rev. AParameter: Cipher Mode MaskPath: Configuration Manager > Protocols > WEP > Circuit Inte

Page 51

Encryption Parameters117386-A Rev. A A-7 Parameter: TEK Change (Seconds)Path: Configuration Manager > Protocols > WEP > LinesDefault: 10 secon

Page 53

117386-A Rev. A B-1 Appendix BDefinitions of k CommandsThis appendix contains definitions of the k commands that you use to work in the secure shell of

Page 55

117386-A Rev. A Index-1Numbers40-bit and 56-bit encryption, 1-2, 2-1AAN routers, using encryption, 2-2authentication, 1-3BBay Networks Press, xiiiCcha

Page 56

vi 117386-A Rev. A Chapter 2 Implementation Notes Requirements for Enabling Encryption ...

Page 57 - Definitions of k Commands

Index-2 117386-A Rev. Aencryption strength, selecting 40-bit or 56-bit, 2-1, 3-18entering an NPK on a router, 3-9Ffloppy disks, for storing key files, 1

Page 58

117386-A Rev. A Index-3Ssecure shell, 3-9secure shell password, 1-6, 1-7, 3-12security, 1-2, 1-3, 1-7seedscreating, 3-2 to 3-6seeds, defined, 1-5SEO so

Page 60

117386-A Rev. A viiStarting Encryption for PPP ...3-13Starting

Page 62

117386-A Rev. A ix Figure Figure 1-1. Hierarchy of Encryption Keys ..................1-5

Comments to this Manuals

No comments