EasyManua.ls Logo

TP-Link TL-ER6120 - Page 94

TP-Link TL-ER6120
166 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
IPsec Proposal
Proposal Name:
Specify a uni
que name to the IPsec Proposal for identification and
management purposes. The IPsec proposal can be applied to IPsec
policy.
Security Protocol:
Select the security protocol to be used. Options include:
AH: AH (Authentication Header) provides data origin
authentication, data integrity and anti-replay services.
ESP: ESP (Encapsulating Security Payload) provides data
encryption in addition to origin authentication, data integrity, and
anti-replay services.
AH Authentication:
Select the algorithm used to
verify the integrity of the data for AH
authentication. Options include:
MD5: MD5 (Message Digest Algorithm) takes a message of
arbitrary length and generates a 128-bit message digest.
SHA: SHA (Secure Hash Algorithm) takes a message less than the
64th power of 2 in bits and generates a 160-bit message digest.
ESP Authentication:
Select the algorithm used to verify the integrity of the data for ESP
authentication. Options include:
MD5: MD5 (Message Digest Algorithm) takes a message of
arbitrary length and generates a 128-bit message digest.
SHA: SHA (Secure Hash Algorithm) takes a message less than the
64th power of 2 in bits and generates a 160-bit message digest.
-88-

Other manuals for TP-Link TL-ER6120

Related product manuals