Avaya Configuring Data Encryption Services User Manual Page 25

  • Download
  • Add to my manuals
  • Print
  • Page
    / 70
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 24
Data Encryption Overview
308618-14.00 Rev 00
1-9
The TEK automatically changes according to the values in the TEK Change
Seconds and TEK Change Bytes parameters. A sending router generates a new
TEK, and WEP encrypts it. The receiving router notes the change, decrypts it,
replaces the old TEK with the new one, and uses the new one to decrypt current
and future data until the TEK changes again.
Each router has its own TEK and TEK Change attributes that it uses to protect
data that it sends. A link therefore has two TEKs which are different, and which
change independently of each other. For more information on configuring key
change attributes, refer to Appendix A, “Encryption Parameters.
Page view 24
1 2 ... 20 21 22 23 24 25 26 27 28 29 30 ... 69 70

Comments to this Manuals

No comments