Operation Manual
48
&RQWUROSRUFRPDQGRVDWUDYpVGHODUHGFRQWLQXDFLyQ
,QWHUUXSFLyQDXWRPiWLFDGHODFRQH[LyQ
/DFRQH[LyQ7&3VHGHVFRQHFWDUiDXWRPiWLFDPHQWHVLQRKD\FRPXQLFDFLyQ
GXUDQWHVHJXQGRVDSDUWLUGHKDEHUVHHVWDEOHFLGR
&XDQGRVHKDELOLWDODDXWHQWLFDFLyQHOSUR\HFWRUQRDFHSWDFRPDQGRVVLOD
DXWHQWLFDFLyQQRHVH[LWRVD(OSUR\HFWRUXWLOL]DXQDDXWHQWLFDFLyQGHOWLSRGH
UHVSXHVWDDODSUHJXQWDGHFRPSUREDFLyQFKDOOHQJHUHVSRQVHFRQXQDOJRULWPR
MD5 (Message Digest 5).
&XDQGRHOSUR\HFWRUHVWiXWLOL]DQGRXQD/$1UHWRUQDUiQE\WHVDOHDWRULRVVL
ODDXWHQWLFDFLyQHVWiKDELOLWDGD(QODFHHVWRVE\WHVUHFLELGRV\OD&RQWUDVHxD
GHDXWHQWLFDFLyQFRPSHQGLHHVWRVGDWRVFRQHODOJRULWPR0'\DJUHJXHHVWR
GHODQWHGHORVFRPDQGRVDHQYLDU
/DTXHVLJXHHVXQDPXHVWUDGHOFDVRHQTXHOD&RQWUDVHxDGHDXWHQWLFDFLyQHV
³SDVVZRUG´\ORVE\WHVDOHDWRULRVVRQ³DIF´
Autenticación
6HOHFFLRQHHOSUR\HFWRU
5HFLEDORVE\WHVDOHDWRULRV³DIF´GHVGHHOSUR\HFWRU
(QODFHORVE\WHVDOHDWRULRV³DIF´\OD&RQWUDVHxDGHDXWHQWLFDFLyQ
³SDVVZRUG´FRQORTXHVHIRUPD³DIFSDVVZRUG´
&RPSHQGLHHVWHHQODFH³DIFSDVVZRUG´FRQHODOJRULWPR0'
(OUHVXOWDGRVHUi³HGDGIIDEFHIGEGH´
$JUHJXH³HGDGIIDEFHIGEGH´GHODQWHGHORVFRPDQGRV\
HQYtHORVGDWRV
(QYtH³HGDGIIDEFHIGEGH´FRPDQGR
&XDQGRORVGDWRVHQYLDGRVVRQFRUUHFWRVVHHMHFXWDUiHOFRPDQGR\VH
UHJUHVDUiQORVGDWRVGHUHVSXHVWD(QFDVRFRQWUDULRVHUHJUHVDUiXQHUURU
de autenticación.
(QORUHIHUHQWHDODWUDQVPLVLyQGHOVHJXQGRFRPDQGR\ORV
VXEVLJXLHQWHVORVGDWRVGHDXWHQWLFDFLyQSXHGHQRPLWLUVHVLODFRQH[LyQHVOD
misma.
NOTA
3. Funciones de Red










