TP-LINK TL-ER6120 User Manual Page 93

  • Download
  • Add to my manuals
  • Print
  • Page
    / 169
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 92
-88-
Figure 3-58 IKE Proposal
The following items are displayed on this screen:
¾ IKE Proposal
Proposal Name:
Specify a unique name to the IKE proposal for identification
and management purposes. The IKE proposal can be
applied to IPsec proposal.
Authentication:
Select the authentication algorithm for IKE negotiation.
Options include:
z MD5: MD5 (Message Digest Algorithm) takes a
message of arbitrary length and generates a 128-bit
message digest.
z SHA1: SHA1 (Secure Hash Algorithm) takes a
message less than 2^64 (the 64th power of 2) in bits
and generates a 160-bit message digest.
Encryption:
Specify the encryption algorithm for IKE negotiation.
Options include:
z DES: DES (Data Encryption Standard) encrypts a
64-bit block of plain text with a 56-bit key.
z 3DES: Triple DES, encrypts a plain text with 168-bit
key.
z AES128: Uses the AES algorithm and 128-bit key for
encryption.
Page view 92
1 2 ... 88 89 90 91 92 93 94 95 96 97 98 ... 168 169

Comments to this Manuals

No comments