Intel Packet Protect supports two ways you can verify the identity of a system that is attempting to communicate:
Use this table to help compare the advantages of certificates with those of pre-shared keys.
| 
       Item  | 
    
       Certificates  | 
    
       Pre-Shared Keys  | 
  
|---|---|---|
| 
       General Use  | 
    
       Each system attempting to communicate must present a certificate from a trusted certificate authority.  | 
    
       Each system attempting to communicate must present the same pre-shared key.  | 
  
| 
       Deployment  | 
    
       Best for a large number of systems.  | 
    
       Best for a small number of systems.  | 
  
| 
       Maintenance  | 
    
       Entrust/PKI* attempts to renew certificates automatically, so there is no general maintenance required using Intel Packet Protect. However, if a certificate becomes compromised, you must recover the Entrust profile. Refer to your Entrust documentation for information about this task.  | 
    
       If you use the same pre-shared key for all systems, the maintenance is minimal, but protection and trust can be weak. If you use various pre-shared keys depending on the communication, protection is stronger, but maintenance is cumbersome.  | 
  
| 
       Effects of Multiple Adapters  | 
    
       You can only use one certificate on a system, either on a single adapter or on an adapter team.  | 
    
       No effect. The same pre-shared key is used by all adapters for a system.  | 
  
| 
       Initial Cost and Maintenance  | 
    
       Requires purchase of Entrust/ Entelligence*. May have additional service or hardware requirements for onsite deployment, as well as need for an Entrust administrator.  | 
    
       Everything you need to use pre-shared keys is included with Intel Packet Protect.  | 
  
Copyright © 2000, Intel Corporation. All rights reserved.
Intel Corporation assumes no responsibility for errors or omissions in this document. Nor does Intel make any commitment to update the information contained herein.
* Other product and corporate names may be trademarks of other companies and are used only for explanation and to the owners' benefit, without intent to infringe.