1631313Overview 13In today’s world there are many security threats to your network and the data that travels over it. Yourmachine employs some of the latest network security and encryption protocols available today. Thesenetwork features can be integrated into your overall network security plan to help protect your data andprevent unauthorized access to the machine. This chapter explains various security protocols supported andhow to configure them.Security terms 13 CA (Certificate Authority)A CA is an entity that issues digital certificates (especially X.509 certificates) and vouches for the bindingbetween the data items in a certificate. CSR (Certificate Signing Request)A CSR is a message sent from an applicant to a CA in order to apply for issue of a certificate. The CSRcontains information identifying the applicant, the public key generated by the applicant and the digitalsignature of the applicant. CertificateA Certificate is the information that binds together a public key with an identity. The certificate can be usedto verify that a public key belongs to an individual. The format is defined by the x.509 standard. Digital signatureA Digital signature is a value computed with a cryptographic algorithm and appended to a data object insuch a way that any recipient of the data can use the signature to verify the data's origin and integrity. Public key cryptosystemA Public key cryptosystem is a modern branch of cryptography in which the algorithms employ a pair ofkeys (a public key and a private key) and use a different component of the pair for different steps of thealgorithm. Shared key cryptosystemA Shared key cryptosystem is a branch of cryptography involving algorithms that use the same key for twodifferent steps of the algorithm (such as encryption and decryption).Security features 13