EasyManua.ls Logo

TP-Link TL-ER6120 - Ike Proposal

TP-Link TL-ER6120
166 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
3.5.1.2 IKE Proposal
On this page, you can define and edit the IKE Proposal.
Choose the menu VPNIKEIKE Proposal to load the following page.
Figure 3-59 IKE Proposal
The following items are displayed on this screen:
IKE Proposal
Proposal Name:
Specify a unique name to the IKE proposal for identification and
management purposes
. The IKE proposal can be applied to IPsec proposal.
Authentication:
Select the authentication algorithm for IKE negotiation. Options include:
MD5: MD5 (Message Digest Algorithm) takes a message of arbitrary
length and generates a 128-bit message digest.
SHA1: SHA1 (Secure Hash Algorithm) takes a message less than
2^64 (the 64th power of 2) in bits and generates a 160-bit message
digest.
Encryption:
Specify the encryption algorithm for IKE negotiation. Options include:
DES: DES (Data Encryption Standard) encrypts a 64-bit block of plain
text with a 56-bit key.
3DES: Triple DES, encrypts a plain text with 168-bit key.
AES128: Uses the AES algorithm and 128-bit key for encryption.
AES192: Uses the AES algorithm and 192-bit key for encryption.
AES256: Uses the AES algorithm and 256-bit key for encryption.
-82-

Other manuals for TP-Link TL-ER6120

Related product manuals