发明名称 Method and apparatus for determining secure endpoints of tunnels in a network that uses internet security protocol
摘要 A method for establishing a secure connection between two network devices, such as a source end host and a destination end host, is disclosed. An initiator peer that sends network traffic on behalf of the source end host sends to a responder peer a first description of network traffic that is to be protected. In response, the initiator peer receives a second description of network traffic that is to be protected from the responder peer. The initiator peer then derives a third description of network traffic that is mutually acceptable to both the initiator peer and the responder peer. The third description of the network traffic is based on the first description of network traffic and the second description of the network traffic. The third description of network traffic is derived by finding the largest common subset of proxies from the first and second descriptions of network traffic.
申请公布号 US7207063(B1) 申请公布日期 2007.04.17
申请号 US20010990814 申请日期 2001.11.15
申请人 CISCO TECHNOLOGY, INC. 发明人 FLUHRER SCOTT
分类号 G06F9/00;G06F15/16;G06F15/173;G06F15/177;G06F17/00;H04L9/00 主分类号 G06F9/00
代理机构 代理人
主权项
地址