TP-LINK TL-ER6120 User Manual Page 94

  • Download
  • Add to my manuals
  • Print
  • Page
    / 169
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 93
-89-
z AES192: Uses the AES algorithm and 192-bit key for
encryption.
z AES256: Uses the AES algorithm and 256-bit key for
encryption.
DH Group:
Select the DH (Diffie-Hellman) group to be used in key
negotiation phase 1. The DH Group sets the strength of the
algorithm in bits. Options include DH1, DH2 and DH5.
z DH1: 768 bits
z DH2: 1024 bits
z DH3: 1536 bits
¾ List of IKE Proposal
In this table, you can view the information of IKE Proposals and edit them by the action buttons.
3.5.2 IPsec
IPsec (IP Security) is a set of services and protocols defined by IETF (Internet Engineering Task Force)
to provide high security for IP packets and prevent attacks.
To ensure a secured communication, the two IPsec peers use IPsec protocol to negotiate the data
encryption algorithm and the security protocols for checking the integrity of the transmission data, and
exchange the key to data de-encryption.
IPsec has two important security protocols, AH (Authentication Header) and ESP (Encapsulating
Security Payload). AH is used to guarantee the data integrity. If the packet has been tampered during
transmission, the receiver will drop this packet when validating the data integrity. ESP is used to check
the data integrity and encrypt the packets. Even if the encrypted packet is intercepted, the third party
still cannot get the actual information.
3.5.2.1 IPsec Policy
On this page, you can define and edit the IPsec policy.
Choose the menu VPNIPsecIPsec Policy to load the following page.
Page view 93
1 2 ... 89 90 91 92 93 94 95 96 97 98 99 ... 168 169

Comments to this Manuals

No comments