|
US$1079.00 ยท In stock Delivery: <= 8 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 36968-2018: Information security technology -- Technical specification for IPSec VPN Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/T 36968-2018 | English | 1079 |
Add to Cart
|
8 days [Need to translate]
|
Information security technology -- Technical specification for IPSec VPN
| Valid |
GB/T 36968-2018
|
PDF similar to GB/T 36968-2018
Standard similar to GB/T 36968-2018 GB/T 37092 GB/T 36651 GB/T 36958
Basic data | Standard ID | GB/T 36968-2018 (GB/T36968-2018) | | Description (Translated English) | Information security technology -- Technical specification for IPSec VPN | | Sector / Industry | National Standard (Recommended) | | Classification of Chinese Standard | L80 | | Classification of International Standard | 35.040 | | Word Count Estimation | 54,572 | | Date of Issue | 2018-12-28 | | Date of Implementation | 2019-07-01 | | Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GB/T 36968-2018: Information security technology -- Technical specification for IPSec VPN---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology--Technical specification for IPSec VPN
ICS 35.040
L80
National Standards of People's Republic of China
Information Security Technology IPSecVPN Technical Specification
Published on.2018-12-28
2019-07-01 implementation
State market supervision and administration
China National Standardization Administration issued
Content
Foreword III
1 Scope 1
2 Normative references 1
3 Terms and Definitions 1
4 Abbreviations 2
5 cryptographic algorithm and key type 2
5.1 Cryptographic Algorithm 2
5.2 Key Type 3
6 Agreement 3
6.1 Key Exchange Protocol 3
6.2 Security Message Protocol 30
7 IPSecVPN Product Requirements 39
7.1 Product Functional Requirements 39
7.2 Product performance parameters 40
7.3 Security Management Requirements 40
8 IPSecVPN Product Detection 42
8.1 Product Function Test 42
8.2 Product Performance Testing 43
8.3 Security Management Detection 44
Appendix A (informative) IPSecVPN Overview 45
Reference 49
Foreword
This standard was drafted in accordance with the rules given in GB/T 1.1-2009.
Please note that some of the contents of this document may involve patents. The issuing organization of this document is not responsible for identifying these patents.
This standard is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260).
This standard was drafted. Wuxi Jiangnan Information Security Engineering Technology Center, National Cryptographic Authority Commercial Password Testing Center, Shanghai Geer
Software Co., Ltd., Beijing Digital Certification Co., Ltd., Shandong Dean Information Technology Co., Ltd., Beijing Tianrongxin Network Security Technology
Technology Co., Ltd., Huawei Technologies Co., Ltd., Shenxin Service Technology Co., Ltd., Shenzhen Aolian Information Security Technology Co., Ltd., Chengdu Guardian
Tong Information Industry Co., Ltd., Beijing Sanweixin Technology Development Co., Ltd.
The main drafters of this standard. Liu Ping, Xu Wenyao, Zhou Guoliang, Zheng Qiang, Li Shusheng, Ma Hongfu, Luo Peng, Li Jinguo, Wang Yuchen, Lin Guoqiang,
But Bo, Luo Jun, Xu Yongxin.
Information Security Technology IPSecVPN Technical Specification
1 Scope
This standard specifies the technical protocols, product requirements and testing methods of IPSecVPN.
This standard applies to the development, testing, use and management of IPSecVPN products.
2 Normative references
The following documents are indispensable for the application of this document. For dated references, only dated versions apply to this article.
Pieces. For undated references, the latest edition (including all amendments) applies to this document.
GB/T 20518 Information Security Technology Public Key Infrastructure Digital Certificate Format
GB/T 25056 information security technology certificate authentication system password and related security technical specifications
GB/T 32905 information security technology SM3 password hash algorithm
GB/T 32907 information security technology SM4 block cipher algorithm
GB/T 32915 information security technology binary sequence randomness detection method
GB/T 32918 (all parts) Information Security Technology SM2 Elliptic Curve Public Key Cryptography
GB/T 35276 Information Security Technology SM2 Cryptographic Algorithm Usage Specification
RFC2408 Internet Security Association and Key Management Protocol (InternetSecurityAssociationandKeyManagement
Protocol)
NAT traversal negotiation in the RFC3947 key exchange process (NegotiationofNAT-TraversalintheIKE)
UDP Encapsulation of RFC3948 IPSecESP Packet (UDPEncapsulationofIPsecESPPackets)
3 Terms and definitions
The following terms and definitions apply to this document.
3.1
Security association securityassociation
An agreement established by two communicating entities through negotiation that describes how an entity uses security services for secure communication.
Note. The Security Alliance includes all the information needed to perform various network security services, such as IP layer services (such as header authentication and payload encapsulation), transport layers, and
Self-protection of application layer services or negotiated communications.
3.2
Internet Security Alliance and Key Management Protocol internetsecurityassociationandkeymanagementprotocol
A protocol for establishing security associations and key management in an Internet environment. It defines the establishment, negotiation, modification and deletion of security
The process and message format of the federation, as well as the payload format of the exchange key generation and authentication data. These formats are transport key and authentication information.
Provides a consistent framework.
3.3
Load payload
The data format of the exchange messages of the ISAKMP communication parties is the basic unit for constructing the ISAKMP message.
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 36968-2018_English be delivered?Answer: Upon your order, we will start to translate GB/T 36968-2018_English as soon as possible, and keep you informed of the progress. The lead time is typically 5 ~ 8 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 36968-2018_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 36968-2018_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|