
-
作者NIST
-
简介
In addition to providing specific recommendations related to configuring cryptography for IPsec, this guide presents a phased approach to IPsec planning and implementation that can help in achieving successful IPsec deployments. The five phases of the approach are as follows:
-
Identify Needs - Identify the need to protect network communications and determine how that need can best be met.
-
Design the Solution - Make design decisions in four areas: architectural considerations, authentication methods, cryptography policy, and packet filters.
-
Implement and Test a Prototype - Test a prototype of the designed solution in a lab or test environment to identify any potential issues.
-
Deploy the Solution - Gradually deploy IPsec throughout the enterprise.
-
Manage the Solution - Maintain the IPsec components and resolve operational issues; repeat the planning and implementation process when significant changes need to be incorporated into the solution.
-
-
提示本站仅做资料的整理和索引,转载引用请注明出处
相关推荐
-
2016-03-16 04:16:40
-
2016-03-17 03:33:04
-
2018-03-09 14:08:51
-
2016-03-13 13:37:01
附件下载
-
sp800.77.pdf