-
作者NIST
-
简介
In addition to providing specific recommendations related to configuring cryptography for IPsec, this guide presents a phased approach to IPsec planning and implementation that can help in achieving successful IPsec deployments. The five phases of the approach are as follows:
-
Identify Needs - Identify the need to protect network communications and determine how that need can best be met.
-
Design the Solution - Make design decisions in four areas: architectural considerations, authentication methods, cryptography policy, and packet filters.
-
Implement and Test a Prototype - Test a prototype of the designed solution in a lab or test environment to identify any potential issues.
-
Deploy the Solution - Gradually deploy IPsec throughout the enterprise.
-
Manage the Solution - Maintain the IPsec components and resolve operational issues; repeat the planning and implementation process when significant changes need to be incorporated into the solution.
-
-
提示本站仅做资料的整理和索引,转载引用请注明出处
相关推荐
-
2016-02-24 16:25:03
-
2016-03-17 03:12:02
-
2016-03-13 13:37:01
-
2016-03-17 03:28:27
附件下载
-
sp800.77.pdf