TP-Link TL-ER604W manual  List of IPsec Proposal

Page 104

Security Protocol: Select the security protocol to be used. Options include:

AH: AH (Authentication Header) provides data origin authentication, data integrity and anti-replay services.

ESP: ESP (Encapsulating Security Payload) provides data encryption in addition to origin authentication, data integrity, and anti-replay services.

AH Authentication: Select the algorithm used to verify the integrity of the data for AH authentication. Options include:

MD5: MD5 (Message Digest Algorithm) takes a message of arbitrary length and generates a 128-bit message digest.

SHA: SHA (Secure Hash Algorithm) takes a message less than the 64th power of 2 in bits and generates a 160-bit message digest.

ESP Authentication: Select the algorithm used to verify the integrity of the data for ESP authentication. Options include:

MD5: MD5 (Message Digest Algorithm) takes a message of arbitrary length and generates a 128-bit message digest.

SHA: SHA (Secure Hash Algorithm) takes a message less than the 64th power of 2 in bits and generates a 160-bit message digest.

ESP Encryption: Select the algorithm used to encrypt the data for ESP encryption. Options include:

NONE: Performs no encryption.

DES: DES (Data Encryption Standard) encrypts a 64-bit block of plain text with a 56-bit key. The key should be 8 characters.

3DES: Triple DES, encrypts a plain text with 168-bit key. The key should be 24 characters.

AES128: Uses the AES algorithm and 128-bit key for encryption. The key should be 16 characters.

List of IPsec Proposal

In this table, you can view the information of IPsec Proposals and edit them by the action buttons.

-99-

Image 104
Contents TL-ER604W Copyright & Trademarks FCC Statement Contents III Hardware Specifications 148 Application 130149 Glossary 151Package Contents Symbol Description Intended ReadersConventions Overview of this GuideOverview of the Router Features Security WirelessTraffic Control Appearance Front Panel LEDs Status IndicationRear Panel Status System ModeNetwork Page WAN Mode  NAT Mode Non-NAT Mode  Classic Mode WAN Mode 3.2 WAN1Tips Static IPWAN Static IP Following items are displayed on this screen  Static IPDynamic IP  Dynamic IPConnection Type Host NameGet IP Address by UnicastUse the following DNS ServerPPPoE WAN PPPoEPassword Active ModeSettings Keep Alive Account NameService Name ISP AddressSecondary Connection Subnet AddressGateway Address L2TP L2TP Settings 10 WAN L2TP Following items are displayed on this screenConnection Default GatewaySecondary  L2TP Status Pptp Pptp Settings Server IPInternet connection by the Connect or Disconnect  Pptp Status BigPond BigPond Settings 12 WAN Bigpond Following items are displayed on this screen BigPond Status ISPDhcp 4 LAN4.1 LAN  Dhcp Settings  Dhcp Reservation Dhcp ClientDhcp Reservation MAC Address  List of Reserved AddressSet the MAC Address for LAN port Set the MAC Address for WAN portSwitch Statistics MAC Address PortPort Mirror  StatisticsEnable Port Mirror ModeMirroring Port Mirrored Port Rate Control Rate ControlApplication Example Port Config  Port Config Port Vlan Port StatusPort Vlan Wireless Wireless SettingWireless Setting  Wireless Setting Wireless Parameter Description Ssid BroadcastAP Isolation SecurityWPA/WPA2 WEP Hexadecimal and Ascii formats are Multi-SSIDKey Format  Multi-SSID Config  GeneralEnable/Disable Guest NetworkEncryption Group KeyAuth Type 1.3 WDS  List of GroupScan  ParameterBSSIDto be bridged Key TypeWireless Advanced  Wireless AdvancedKey : Short GIMAC Filtering  Rule List Host Status Filtering Rules  Host Status User GroupGroup User  Group Config User Config  View Config View List of User View1 NAT NAT SetupAdvanced One-to-One NAT  One-to-One NAT Multi-Nets NAT Multi-Nets NAT List of Rules Configuration procedure Application Example Network RequirementsVirtual Server Protocol  Virtual ServerInterface Port Triggering  Port Triggering1.6 ALG 38 ALG Following items are displayed on this screenSetup Traffic Control323 ALG IPsec ALGControl Control all the timeLimited UpstreamBandwidth Control Limited Bandwidth Session LimitSession Limit Session List  List of Session LimitPolicy Routing ConfigurationLoad Balance WAN Link Backup 45 Link Backup Following items are displayed on this screenWAN Config ProtocolTiming FailoverRouting Static Route Protocol  List of Protocol47 Static Route Following items are displayed on this screen  Static Route5.2 RIP 48 RIP Following items are displayed on this screen  List of RIPRoute Table IP-MAC Binding FirewallAnti ARP Spoofing ARP Scanning  IP-MAC BindingARP List Attack Defense Enable Attack Flood DefensePacket Anomaly DefenseAccess Control MAC FilteringURL Filtering  MAC Filtering URL Filtering Rule ObjectAccess Rules Web Filtering Access Rules ServicePolicy SourceService Group on 3.3.1 GroupDestination Priority Service  List of ServiceName Dest. PortApp Control Control Rules Control Rules ApplicationVPN Database1 IKE IKE Policy62 IKE Policy Following items are displayed on this screen  IKE PolicyIKE Proposal 63 IKE Proposal Following items are displayed on this screen  IKE Proposal List of IKE Proposal IPsecIPsec Policy Local Subnet  IPsec PolicyPolicy Name Policy Mode Remote SubnetRemote Gateway IKE PolicyAH Authentication Key-In ESP Authentication Key-InAH Authentication Key-Out ESP Authentication Key-Out IPsec Proposal IPsec Proposal List of IPsec Policy IPsec  List of IPsec Proposal IPsec SA Protocol Media Tunnel Length of Header Authentication3 L2TP/PPTP 3.1 L2TP/PPTP Tunnel  L2TP/PPTP TunnelTunnel Max ConnectionsL2TP/PPTP Server Pre-shard Key List of Configurations IP Address PoolList of L2TP/PPTP Tunnel  IP Address PoolGeneral ServicesPPPoE Server 70 General Following items are displayed on this screen IP Address Pool Account  AccountIP Address Assigned Static IP Address List of Account Is 48. If Enable Advanced Account Features is not selected,Exceptional IP  Exceptional IP BulletinList of Account Title Interval E-Bulletin  List of E-Bulletin Dynamic DNSPublisher DynDNS  Dyndns Ddns No-IP Ddns No-IP List of DynDNS Account  PeanutHull Ddns PeanutHull List of No-IP Account Comexe  List of PeanutHull Account List of Comexe Account UPnP Comexe Ddns Maintenance Admin SetupAdministrator  List of UPnP MappingLogin Parameter  AdministratorRemote Management  Remote Management List of Subnet Factory DefaultsManagement Reboot  Configuration VersionExport and Import  ExportFirmware Upgrade LicenseStatistics Interface Traffic Statistics Interface Traffic Statistics 123IP Traffic Statistics  Advanced WAN InformationDiagnostics Diagnostics Traffic Statistics  IP Traffic Statistics Tracert Online Detection Ping Time PingDNS Lookup Port Displays the detected WAN port DetectionLogs  Config  List of LogsSeverity Send System LogsApplication Network RequirementsSystem Mode Network Topology ConfigurationsInternet Setting System Mode Internet ConnectionVPN Setting IKE SettingSettings IPsec VPN IKE Policy IKE1IPsec Setting  IPsec Proposal IPsec Policy PFS DH1Pptp VPN Setting  IP Address Pool L2TP/PPTP Tunnel Network Management User Group Group  UserApp Control  ViewEnable Bandwidth Control 11 App RulesBandwidth Control Rule LAN WAN1Scan and import the entries to ARP List Network SecurityLAN ARP Defense Set Attack Defense WAN ARP DefenseSet IP-MAC Binding Entry Manually Attack Defense 20 Attack Defense 145Traffic Monitoring StatisticsPage Appendix a Hardware Specifications Environmental and PhysicalAppendix B FAQ Page Appendix C Glossary Glossary DescriptionAllows dissimilar communication devices to communicate Port or device that connects to a LAN. Other devices Enterprise
Related manuals
Manual 4 pages 13.1 Kb