Internet Protocol Control
Protocol
is a network control protocol for establishing and configuring Internet
Protocol over a
(PPP) link. IPCP uses the same
packet exchange mechanism as the Link Control Protocol. IPCP packets
may not be exchanged until PPP has reached the Network-Layer
Protocol phase, and any IPCP packets received before this phase is
reached should be silently discarded.
Internet Protocol Security
commonly called IPsec, is a protocol suite for secure
(IP) communications by authenticating and encrypting each IP packet
of a communication session. IPsec includes protocols for establishing
mutual authentication between agents at the beginning of the session
and negotiation of cryptographic keys to be used during the session.
IPsec can be used in protecting data flows between a pair of hosts
(host-to-host), between a pair of security gateways
(network-to-network), or between a security gateway and a host
(network-to-host). Internet Protocol security (IPsec) uses cryptographic
security services to protect communications over Internet Protocol (IP)
networks. IPsec supports network-level peer authentication, data origin
authentication, data integrity, data confidentiality (encryption), and
replay protection.
IPsec Security Association
is fundamental to IPsec. An SA is a relationship between two or more
entities that describes how the entities will use security services to
communicate securely. Each IPsec connection can provide encryption,
integrity, authenticity, or all three. When the security service is
determined, the two IPsec peers must determine exactly which
algorithms to use (for example, DES or 3DES for encryption, MD5 or
SHA for integrity). After deciding on the algorithms, the two devices
must share session keys. The Security Association is the method that
IPsec uses to track all the particulars concerning a given IPSec
communication session.
IP in IP
is an IP tunneling protocol that encapsulates one IP packet in another
IP packet.
IPv6CP
is responsible for configuring, enabling, and disabling the IPv6 protocol
modules on both ends of the
(PPP) link. IPv6CP uses the
same packet exchange mechanism as the
. IPv6CP
packets may not be exchanged until PPP has reached the Network-Layer
Protocol phase. IPv6CP packets received before this phase is reached
should be silently discarded.
Link Control Protocol
establishes, configures, and tests data-link Internet connections in the
(PPP). Before establishing communications over
a point-to-point link, each end of the PPP link must send out LCP
packets. The LCP packet either accepts or rejects the identity of its
linked peer, agrees up on packet size limits, and looks for common
misconfiguration errors.
LCP packets are divided into three classes:
• Link configuration packets used to establish and configure a link
• Link termination packets used to terminate a link
Command Reference Guide — Keenetic Extra (KN-1710)
326
Glossary
Summary of Contents for EXTRA KN-1710
Page 2: ......
Page 6: ...Command Reference Guide Keenetic Extra KN 1710 6 Contents Overview...
Page 20: ...Command Reference Guide Keenetic Extra KN 1710 20 Chapter 1 Product Overview...
Page 26: ...Command Reference Guide Keenetic Extra KN 1710 26 Chapter 2 Introduction to the CLI...
Page 322: ...Command Reference Guide Keenetic Extra KN 1710 322 Chapter 3 Command Reference...
Page 332: ...Command Reference Guide Keenetic Extra KN 1710 332 Glossary...
Page 348: ...Command Reference Guide Keenetic Extra KN 1710 348 Appendix C SNMP MIB...