Bidirectional Forwarding Detection (BFD).Communication Between Private and Public Colors.When multiple authentication types are configured, the strongest method between the two points is chosen (AH-SHA1 HMAC). By default, AH-SHA1 HMAC and ESP HMAC-SHA1 are both configured. The authentication algorithm, which verifies the integrity and authenticity of data, is configurable and is included in TLOC properties which is exchanged with the vSmart controllers. The encryption algorithm is AES-256 GCM but can fall back to AES-256 CBC if needed (as in the case of multicast traffic). For encrypting data plane traffic, a modified version of Encapsulating Security Payload (ESP) is used to protect the data packet payload.Automated Device Provisioning (ZTP or PnP).Authentication/Authorization of SD-WAN Devices.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |