EasyManua.ls Logo

Tenda V1200 - Page 167

Tenda V1200
257 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
157
Parameter description
Parameter
Description
IPSec Connection
Name
It specifies a name for the IPSec connection.
IP Version
Select an IP version to which the rule applies.
Tunnel Mode
It specifies tunnel protocol the rule uses.
ESP: It specifies Encapsulating Security Payload. This protocol is used to test data
integrity and encryption. Even the encrypted packet is intercepted, the third party
also cannot obtain correct message.
AH: It specifies Authentication Header. This protocol is used to test data integrity. If a
packet is tampered during transmission, the receiver discards the packet when it
performs data integrity test.
Local Gateway
Interface
Select a WAN service for the rule.
Remote IPSec
Gateway Address
It specifies the WAN IP address or domain name of the peer device enabled IPSec
function.
Tunnel access from
local IP addresses
Subnet: When Subnet is selected, you can specify any network address on LAN and
the corresponding subnet mask.
Single Address: When Single Address is selected, you can only specify an IP address of
a local host.
IP Address for VPN
It specifies the IP address of a local host.
Mask or Prefix
Length
It specifies the subnet mask of the LAN you specified in IP Address for VPN.
Tunnel access from
remote IP addresses
Subnet: When Subnet is selected, you can specify all hosts on the peer network.
Single Address: When Single Address is selected, you can only specify one host on the
peer network.
IP Address for VPN
It specifies IP address of a host on peer network.
Mask or Prefix
Length
It specifies LAN IP network segment of the peer router.
Key Exchange
Method
It specifies the key negotiation method.
Auto(IKE): When Auto(IKE) is selected, the negotiation process is divided into two
stages:
Stage 1: Both communication sides exchange verification algorithm, encryption
algorithm and so on security protocols, and establish an ISAKMP (Internet Security
Association and Key Management Protocol) SA (Security Association) which is used to
exchange more information in stage 2.

Table of Contents

Related product manuals