TP-LINK TL-ER6120 User Manual Page 100

  • Download
  • Add to my manuals
  • Print
  • Page
    / 169
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 99
-95-
for ESP authentication. Options include:
z MD5: MD5 (Message Digest Algorithm) takes a
message of arbitrary length and generates a 128-bit
message digest.
z SHA: SHA (Secure Hash Algorithm) takes a message
less than the 64th power of 2 in bits and generates a
160-bit message digest.
ESP Encryption:
Select the algorithm used to encrypt the data for ESP
encryption. Options include:
NONE: Performs no encryption.
DES: DES (Data Encryption Standard) encrypts a 64-bit
block of plain text with a 56-bit key. The key should be 8
characters.
3DES: Triple DES, encrypts a plain text with 168-bit key. The
key should be 24 characters.
AES128: Uses the AES algorithm and 128-bit key for
encryption. The key should be 16 characters.
¾ List of IPsec Proposal
In this table, you can view the information of IPsec Proposals and edit them by the action buttons.
3.5.2.3 IPsec SA
This page displays the information of the IPsec SA (Security Association).
Choose the menu VPNIPsecIPsec SA to load the following page.
Figure 3-61 IPsec SA
Figure 3-61 displays the connection status of the NO.1 entry in the List of IPsec policy in Figure 3-59.
As shown in the figure, the Router is using WAN2 for tunnel connection, and the IP address of WAN2
Page view 99
1 2 ... 95 96 97 98 99 100 101 102 103 104 105 ... 168 169

Comments to this Manuals

No comments