Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAE.IF-RFC4641 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2010-09-16 ÃÑÆäÀÌÁö 45
ÇѱÛÇ¥Áظí DNSSEC ¿î¿µ ¹æ¾È
¿µ¹®Ç¥Áظí DNSSEC Operational Practices
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØ DNSSECÀ» Á÷Á¢ Àû¿ëÇÏ´Â Á¸ °ü¸®ÀÚ¸¦ ´ë»óÀ¸·Î Çϸç, DNSSECÀÇ ¿î¿µ¿¡ ´ëÇÑ ³»¿ëÀ¸·Î ±¸¼ºµÇ¾î ÀÖ´Ù
ÁÖ¿ä ³»¿ëÀ¸·Î´Â DNS¿¡¼­ÀÇ Å°ÀÇ »ç¿ë°ú ¼­¸í, Å°ÀÇ »ý¼º°ú ÀúÀå, ¼­¸íÀÇ »ý¼º, Å° ±³Ã¼ µî¿¡ ´ëÇÑ ¿î¿µ ¹æ¾È ¹× °ü·Ã Á¤Ã¥¿¡ ´ëÇØ ¼³¸íÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à This document describes a set of practices for operating the DNS with security extensions (DNSSEC). The target audience is zone administrators deploying DNSSEC.
The document discusses operational aspects of using keys and signatures in the DNS. It discusses issues of key generation, key storage, signature generation, key rollover, and related policies.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAE.IF-RFC4641.zip TTAE.IF-RFC4641.zip            

ÀÌÀü
¹«¼± ¼¾¼­ ³×Æ®¿öÅ© º¸¾È °ü¸® Áöħ
´ÙÀ½
USN ȯ°æ¿¡¼­ÀÇ Å° °ü¸® ±â¼ú Àû¿ë Áöħ