原创 我的友情鏈接

51CTO博客開發

原创 PKI 基礎理論-5

The digital signature computed on the certificate fields, added by the CA when creating the certificate. By generating t

原创 PKI 基礎理論-4

Phase I Using Certificates When using certificates, the first packet exchange has the same purpose, to negotiate the Pha

原创 IOS安全-2

加密:分爲對稱加密和非對稱加密;討論非對稱加密算法的作用:加密、認證、以及密鑰分發 Symmetric encryption occurs when the same key is used for both encryption and

原创 PKI 基礎理論-3

Phase 1 Using Preshared Keys IKE的main模式有六個包,六個包分爲三個階段: 1:These first two packets define the algorithms and hashes used t

原创 PKI 基礎理論-2

Digital signatures operate in two distinct functions: signature construction and signature verification. Following are

原创 ASA ACL

透明牆的情況下 每個接口有兩個方向: 一個接口一個方向可以有兩個:1個是擴展acl ;2個ether-type 名字不能一樣 access-list out extended deny icmp any any access-list ou

原创 PKI 基礎理論-1

This chapter covers the basics of encryption, which essentially is the mathematical concatenation of data with a key. Th