EasyManua.ls Logo

TP-Link TL-ER604W - Page 98

TP-Link TL-ER604W
217 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
-93-
Figure 3-63 IKE Proposal
The following items are displayed on this screen:
IKE Proposal
Proposal Name:
Specify a unique name to the IKE proposal for identification and
management purposes. The IKE proposal can be applied to IPsec proposal.
Authentication:
Select the authentication algorithm for IKE negotiation. Options include:
MD5: MD5 (Message Digest Algorithm) takes a message of arbitrary
length and generates a 128-bit message digest.
SHA1: SHA1 (Secure Hash Algorithm) takes a message less than
2^64 (the 64th power of 2) in bits and generates a 160-bit message
digest.
Encryption:
Specify the encryption algorithm for IKE negotiation. Options include:
DES: DES (Data Encryption Standard) encrypts a 64-bit block of plain
text with a 56-bit key.
3DES: Triple DES, encrypts a plain text with 168-bit key.
AES128: Uses the AES algorithm and 128-bit key for encryption.
AES192: Uses the AES algorithm and 192-bit key for encryption.
AES256: Uses the AES algorithm and 256-bit key for encryption.
DH Group:
Select the DH (Diffie-Hellman) group to be used in key negotiation phase
1. The DH Group sets the strength of the algorithm in bits. Options include
DH1, DH2 and DH5.

Table of Contents

Other manuals for TP-Link TL-ER604W

Related product manuals