47D-Link DSL-226 User Manual
Section 4 - Conguration
Key Life Time:
Enter the amount of time that a key is active in Phase 1. Then select
the unit: Seconds, Minutes or Hours.
Key Exchange Phase 2
Encryption
Algorithm:
Select encryption method as the algorithm for encrypting data
packets. The options are DES, 3DES, AES-128, AES-192 or AES-256.
Authentication
Algorithm:
The authentication algorithm validates data packets. Select MD5,
SHA1, or SHA256. Both local and remote device of the VPN tunnel
must use the same authentication algorithm. Both MD5 and SHA1
are one-way hashing algorithm but they produce dierent length
of digest bits.
Die-Hellman
Group:
The Die-Hellman key exchange protocol oers dierent prime key
lengths. Select 768, 1024, 1536, 2048, 3072, or 4096 bit.
Key Life Time:
Enter the amount of time that a key is active in Phase 2. Then select
the unit: Seconds, Minutes or Hours.
Click Save when you are done. You can create up to 7 IPSec proles.