摘要:
A novel and useful virtual private network (VPN) mechanism and related security association processor for maintaining the necessary security related parameters to perform security functions such as encryption, decryption and authentication. A security association database (SAD) and related circuitry is adapted to provide the necessary parameters to implement the IPSec group of security specifications for encryption/decryption and authentication. Each security association (SA) entry in the database comprises all the parameters that are necessary to receive and transmit VPN packets according to the IPSec specification.
摘要:
A method for secure communication between a local area network (32) and a wide area network (10) comprises integrating a NAT functionality (29) in a firewall (28) associated with the local area network, wherein the NAT functionality is suitable to translate the source port of outgoing data packets with a NAT port value obtained by adding to a NAT offset value the value of the session ID used in a session database. When reply data packets coming from the wide area network are received by the firewall, the session ID is extracted from the NAT port value and is used for directly pointing to the session database, thus reducing the time required to recognize the session.
摘要:
A method for operating a telecommunications device using a hash table, comprising: storing session data concerning received data packets in the hash table by means of a first hash function; monitoring the efficiency of the hash table in performing at least a predetermined operation, and in case the efficiency is below a predetermined threshold, storing further session data concerning received data packets by means of a second hash function different from the first hash function.
摘要:
A method for operating a telecommunications device using a hash table, comprising: storing session data concerning received data packets in the hash table by means of a first hash function; monitoring the efficiency of the hash table in performing at least a predetermined operation, and in case the efficiency is below a predetermined threshold, storing further session data concerning received data packets by means of a second hash function different from the first hash function.