HOME   Cart(1)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (26 Oct 2025)

GB/T 36968-2018 English PDF

US$1079.00 ยท In stock
Delivery: <= 8 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 36968-2018: Information security technology -- Technical specification for IPSec VPN
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/T 36968-2018English1079 Add to Cart 8 days [Need to translate] Information security technology -- Technical specification for IPSec VPN Valid GB/T 36968-2018

PDF similar to GB/T 36968-2018


Standard similar to GB/T 36968-2018

GB/T 37092   GB/T 36651   GB/T 36958   

Basic data

Standard ID GB/T 36968-2018 (GB/T36968-2018)
Description (Translated English) Information security technology -- Technical specification for IPSec VPN
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.040
Word Count Estimation 54,572
Date of Issue 2018-12-28
Date of Implementation 2019-07-01
Issuing agency(ies) State Administration for Market Regulation, China National Standardization Administration

GB/T 36968-2018: Information security technology -- Technical specification for IPSec VPN

---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology--Technical specification for IPSec VPN ICS 35.040 L80 National Standards of People's Republic of China Information Security Technology IPSecVPN Technical Specification Published on.2018-12-28 2019-07-01 implementation State market supervision and administration China National Standardization Administration issued

Content

Foreword III 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Abbreviations 2 5 cryptographic algorithm and key type 2 5.1 Cryptographic Algorithm 2 5.2 Key Type 3 6 Agreement 3 6.1 Key Exchange Protocol 3 6.2 Security Message Protocol 30 7 IPSecVPN Product Requirements 39 7.1 Product Functional Requirements 39 7.2 Product performance parameters 40 7.3 Security Management Requirements 40 8 IPSecVPN Product Detection 42 8.1 Product Function Test 42 8.2 Product Performance Testing 43 8.3 Security Management Detection 44 Appendix A (informative) IPSecVPN Overview 45 Reference 49

Foreword

This standard was drafted in accordance with the rules given in GB/T 1.1-2009. Please note that some of the contents of this document may involve patents. The issuing organization of this document is not responsible for identifying these patents. This standard is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260). This standard was drafted. Wuxi Jiangnan Information Security Engineering Technology Center, National Cryptographic Authority Commercial Password Testing Center, Shanghai Geer Software Co., Ltd., Beijing Digital Certification Co., Ltd., Shandong Dean Information Technology Co., Ltd., Beijing Tianrongxin Network Security Technology Technology Co., Ltd., Huawei Technologies Co., Ltd., Shenxin Service Technology Co., Ltd., Shenzhen Aolian Information Security Technology Co., Ltd., Chengdu Guardian Tong Information Industry Co., Ltd., Beijing Sanweixin Technology Development Co., Ltd. The main drafters of this standard. Liu Ping, Xu Wenyao, Zhou Guoliang, Zheng Qiang, Li Shusheng, Ma Hongfu, Luo Peng, Li Jinguo, Wang Yuchen, Lin Guoqiang, But Bo, Luo Jun, Xu Yongxin. Information Security Technology IPSecVPN Technical Specification

1 Scope

This standard specifies the technical protocols, product requirements and testing methods of IPSecVPN. This standard applies to the development, testing, use and management of IPSecVPN products.

2 Normative references

The following documents are indispensable for the application of this document. For dated references, only dated versions apply to this article. Pieces. For undated references, the latest edition (including all amendments) applies to this document. GB/T 20518 Information Security Technology Public Key Infrastructure Digital Certificate Format GB/T 25056 information security technology certificate authentication system password and related security technical specifications GB/T 32905 information security technology SM3 password hash algorithm GB/T 32907 information security technology SM4 block cipher algorithm GB/T 32915 information security technology binary sequence randomness detection method GB/T 32918 (all parts) Information Security Technology SM2 Elliptic Curve Public Key Cryptography GB/T 35276 Information Security Technology SM2 Cryptographic Algorithm Usage Specification RFC2408 Internet Security Association and Key Management Protocol (InternetSecurityAssociationandKeyManagement Protocol) NAT traversal negotiation in the RFC3947 key exchange process (NegotiationofNAT-TraversalintheIKE) UDP Encapsulation of RFC3948 IPSecESP Packet (UDPEncapsulationofIPsecESPPackets)

3 Terms and definitions

The following terms and definitions apply to this document. 3.1 Security association securityassociation An agreement established by two communicating entities through negotiation that describes how an entity uses security services for secure communication. Note. The Security Alliance includes all the information needed to perform various network security services, such as IP layer services (such as header authentication and payload encapsulation), transport layers, and Self-protection of application layer services or negotiated communications. 3.2 Internet Security Alliance and Key Management Protocol internetsecurityassociationandkeymanagementprotocol A protocol for establishing security associations and key management in an Internet environment. It defines the establishment, negotiation, modification and deletion of security The process and message format of the federation, as well as the payload format of the exchange key generation and authentication data. These formats are transport key and authentication information. Provides a consistent framework. 3.3 Load payload The data format of the exchange messages of the ISAKMP communication parties is the basic unit for constructing the ISAKMP message.

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 36968-2018_English be delivered?

Answer: Upon your order, we will start to translate GB/T 36968-2018_English as soon as possible, and keep you informed of the progress. The lead time is typically 5 ~ 8 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 36968-2018_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 36968-2018_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.

Refund Policy     Privacy Policy     Terms of Service     Shipping Policy     Contact Information