Specifications
Issue 1.0, April 2006 Section 364-180-N02
©2006 Charles Industries, Ltd.
All rights reserved. Printed in United States of America.
90
• Time to live: The time to live (TTL) indicates the maximum amount of time this IP packet is
allowed to remain in the network. Each router is required to decrement this value as it routes the
packet. The packet is dropped if this value reaches 0.
• Digital Signatures: Is the electronic analogy to a handwritten signature, and in many ways it is
an even stronger device. The key is shared by at least one other party.
• IKE: IKE (Internet Key Exchange) is a protocol negotiation and key exchange protocol that is
part of the IPSec protocol suite specified by the Internet Engineering Task Force (IETF). IKE
allows communicating parties implementing VPNS to automatically negotiate IPSec SAs to
facilitate the implementation of VPNs. With IKE, a separate IKE SA is initially created to
provide a secure channel for negotiating an IPSec SAs to facilitate the implementation of VPNs.
• Point-to-Point Protocol (PPP): Point-to-Point Protocol
is the Internet standard for
transmission of IP packets over serial lines. It uses a variation of High Level Data Link
Control (HDLC) for packet encapsulation.
• Point-to-Point Tunneling Protocol (PPTP): A Microsoft-sponsored IETF draft standard for
implementing VPNs form the Windows 95/98 operating system to a VPN gateway.
• Layer 2 Tunneling Protocol (L2TP): L2TP is refinement of PPTP and Cisco’s L2F protocol.
L2Tp was designed to combine the best features of both PPTP and L2F. L2TP operates, as its
name suggests, at Layer 2 in the International Organization for Standardization (ISO) model, and
it is a network protocol that creates a tunnel between an L2TP client and an L2TP server, and
then encapsulates PPP frames to be sent over tunnel. When using IP as the transport protocol,
L2TP can be used as a VPN protocol over the Internet. L2TP has been designed so that it can be
used directly over various wide area network (WAN) media (such as Frame Relay) without an IP
transport layer, which can extend its usefulness in setting up corporate networks.
• Private Key: A digital key code used to decrypt data and verify digital signatures. This key is
kept secret, and is known only to its owner.
• Public key: A trusted and efficient key and certificate management system.
• Public key infrastructure: A trusted and efficient key and certificate management system.
• Hash algorithm
: When a provider issues a certificate, it is not generally the overall
certificate but a cryptographic check sum from the certificate that is signed. The
procedure used for calculating the check sum is referred to as a hash algorithm, and the
check sum is called the hash value.
• Security Associations (SA): An SA defines the kinds of security measures that should be
applied to packets based on who is sending the packets, where they are going, and what type of
The availability of features and technical specifications herein subject to change without notice.