Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [V] [W] [X] P (provider) routers, packets, L2F, path availability, 2nd and vendor HA availability path symmetry, managing, payload packets, PE (provider edge) routers, peer availability, 2nd on-demand DPD peer mismatches (IKE), troubleshooting, periodic DPD, PFS (perfect forward secrecy), 2nd PKI (Public Key Infrastructure), CAs case studies CA hierarchy, configuring CA/RA interoperability, cryptographic endpoint integration, CRLs cryptographic endpoints enrollment process public key certificates registration authorities PMTUD (Path MTU Discovery), PPTP (Point-to-Point Tunneling Protocol), compulsory tunnels data structure tunnel negotiation process voluntary tunnels preshared keys, preventing fragmentation with IPsec Prefragmentation with manual MTU adjustment proxies, PSKs (preshared keys), troubleshooting mismatched peer addresses, public key certificates, authentication forwarding life cycle of obtaining registration process RSA signatures, life cycle of 2nd signing X.509 certificates, life cycle of 2nd public key cryptography, public key encryption, Diffie-Hellman key exchange RSA RSA signatures |