TP-LINK TL-ER6120 User Manual Page 99

  • Download
  • Add to my manuals
  • Print
  • Page
    / 169
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 98
-94-
Figure 3-60 IPsec Proposal
The following items are displayed on this screen:
¾ IPsec Proposal
Proposal Name:
Specify a unique name to the IPsec Proposal for
identification and management purposes. The IPsec
proposal can be applied to IPsec policy.
Security Protocol:
Select the security protocol to be used. Options include:
z AH: AH (Authentication Header) provides data origin
authentication, data integrity, and anti-replay services.
z ESP: ESP (Encapsulating Security Payload) provides
data encryption in addition to origin authentication, data
integrity, and anti-replay services.
AH Authentication:
Select the algorithm used to verify the integrity of the data
for AH authentication. Options include:
z MD5: MD5 (Message Digest Algorithm) takes a
message of arbitrary length and generates a 128-bit
message digest.
z SHA: SHA (Secure Hash Algorithm) takes a message
less than the 64th power of 2 in bits and generates a
160-bit message digest.
ESP Authentication:
Select the algorithm used to verify the integrity of the data
Page view 98
1 2 ... 94 95 96 97 98 99 100 101 102 103 104 ... 168 169

Comments to this Manuals

No comments