Management and Security
This table lists those applications that are used for security or management. For more details of any module, click on its link in the table.
All of these modules are part of the HCC MISRA-compliant TCP/IP stack, as shown in the Networking Overview diagram, and designed specifically for use with it.
|IPsec and IKE||IPsec is the Security Architecture for IP protocol suite. Internet Key Exchange (IKEv2) is used by IPsec to set up Security Associations.|
|TLS/DTLS||Transport Layer Security (TLS) or Datagram Transport Layer Security (DTLS) is a highly optimized software module designed to provide secure network communications for embedded devices.|
|TLS 1.3||TLS 1.3 is the latest version of TLS, replacing TLS 1.2 which is used in the above module.|
|EAP||Extensible Authentication Protocol (EAP), designed to support secure connections for embedded devices.|
|SNMP||Provides embedded devices with secure and reliable network management capability.|
|NTP Client||Network Time Protocol (NTP) Client is used to synchronize clocks on computer systems in packet-switched networks.|
|SNTP Client||Simple Network Time Protocol (SNTP) is used to synchronize clocks on computer systems.|
|SSH||Secure SHell (SSH) server creates a secure socket connection that can be used for executing menu commands or for tunneling data between the clients and servers of other applications.|
|NAT||Network Address Translation (NAT) allows an organization to set up a network using private addresses, but still allowing its members to communicate over the public Internet.|