Develop a Strategy for Certificates

Intel Packet Protect supports two ways you can verify the identity of a system that is attempting to communicate:

Use this table to help compare the advantages of certificates with those of pre-shared keys.

 

Certificates Compared with Pre-Shared Keys

Item

Certificates

Pre-Shared Keys

General Use

Each system attempting to communicate must present a certificate from a trusted certificate authority.

Each system attempting to communicate must present the same pre-shared key.

Deployment

Best for a large number of systems.

Best for a small number of systems.

Maintenance

Entrust/PKI* attempts to renew certificates automatically, so there is no general maintenance required using Intel Packet Protect. However, if a certificate becomes compromised, you must recover the Entrust profile. Refer to your Entrust documentation for information about this task.

If you use the same pre-shared key for all systems, the maintenance is minimal, but protection and trust can be weak. If you use various pre-shared keys depending on the communication, protection is stronger, but maintenance is cumbersome.

Effects of Multiple Adapters

You can only use one certificate on a system, either on a single adapter or on an adapter team. 

No effect. The same pre-shared key is used by all adapters for a system.

Initial Cost and Maintenance

Requires purchase of Entrust/ Entelligence*. May have additional service or hardware requirements for onsite deployment, as well as need for an Entrust administrator.

Everything you need to use pre-shared keys is included with Intel Packet Protect.


Copyright © 2000, Intel Corporation. All rights reserved.

Intel Corporation assumes no responsibility for errors or omissions in this document. Nor does Intel make any commitment to update the information contained herein.

* Other product and corporate names may be trademarks of other companies and are used only for explanation and to the owners' benefit, without intent to infringe.