No relevant resource is found in the selected language.
Your browser version is too early. Some functions of the website may be unavailable. To obtain better user experience, upgrade the browser to the latest version.
CloudEngine 12800 and 12800E V200R005C10 Configuration Guide - Security
This document describes the configurations of Security, including AAA, 802.1x Authentication, ACL, TCAM ACL Customization, local attack defense, Microsegmentation, MFF, attack defense, traffic suppression and storm control, ARP security, Port security, MACsec, DHCP snooping, IPSG, URPF, SSL, Keychain and FIPS.
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document.
Note: Even the most advanced machine translation cannot match the quality of professional translators.
Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Protocol Structure
Protocol Structure
As shown in Figure 16-1, SSL functions
between the application layer and transport layer. SSL is composed
of two layers: the SSL Record Protocol at the bottom layer and the
SSL Handshake protocol, SSL Change Cipher Spec Protocol, and SSL Alert
Protocol at the upper layer.
Figure 16-1 SSL protocol stack
SSL Record Protocol: divides upper-layer data into blocks, computes
the data, adds Message Authentication Code (MAC), encrypts the data
to form record blocks, and sends the record blocks to the peer. The
SSL Record Protocol implements data transmission.
SSL Handshake Protocol: used before application data is transmitted.
The SSL Handshake Protocol negotiates a cipher suite including an
encryption algorithm, a key exchange algorithm, and a MAC algorithm,
authenticates server and client, and exchanges a key securely between
the server and client.
SSL Change Cipher Spec Protocol: used by both the client and server
to send a Change Cipher Spec message to notify each other that subsequent
packets will be protected using the new cipher suite and key.
SSL Alert Protocol: reports alarms about the handshake or data
transmission process to the remote end, so that the remote end can
take corresponding measures. An alarm message conveys the severity
of the message and description of the alarm.