TP-Link TL-ER604W manual IKE Policy Following items are displayed on this screen,  IKE Policy

Page 96

Figure 3-62 IKE Policy

The following items are displayed on this screen:

IKE Policy

Policy Name: Specify a unique name to the IKE policy for identification and management purposes. The IKE policy can be applied to IPsec policy.

Exchange Mode: Select the IKE Exchange Mode in phase 1, and ensure the remote VPN peer uses the same mode.

Main: Main mode provides identity protection and exchanges more information, which applies to the scenarios with higher requirement for identity protection.

Aggressive: Aggressive Mode establishes a faster connection but with lower security, which applies to scenarios with lower requirement for identity protection.

Local ID Type: Select the local ID type for IKE negotiation. IP Address: uses an IP address as the ID in IKE negotiation. FQDN: uses a name as the ID.

-91-

Image 96
Contents TL-ER604W Copyright & Trademarks FCC Statement Contents III Hardware Specifications 148 Application 130149 Glossary 151Package Contents Symbol Description Intended ReadersConventions Overview of this GuideOverview of the Router Features Wireless Traffic ControlSecurity Appearance Front Panel LEDs Status IndicationRear Panel System Mode NetworkStatus Page WAN Mode  NAT Mode Non-NAT Mode  Classic Mode WAN Mode 3.2 WAN1Tips Static IPWAN Static IP Following items are displayed on this screen  Static IPDynamic IP  Dynamic IPConnection Type Host NameGet IP Address by UnicastUse the following DNS ServerPPPoE WAN PPPoEPassword Active ModeSettings Keep Alive Account NameService Name ISP AddressSecondary Connection Subnet AddressGateway Address L2TP L2TP Settings 10 WAN L2TP Following items are displayed on this screenDefault Gateway SecondaryConnection  L2TP Status Pptp Pptp Settings Server IPInternet connection by the Connect or Disconnect  Pptp Status BigPond BigPond Settings 12 WAN Bigpond Following items are displayed on this screen BigPond Status ISP4 LAN 4.1 LANDhcp  Dhcp Settings Dhcp Client Dhcp Reservation Dhcp Reservation MAC Address  List of Reserved AddressSet the MAC Address for LAN port Set the MAC Address for WAN portSwitch Statistics MAC Address PortPort Mirror  StatisticsEnable Port Mirror ModeMirroring Port Mirrored PortRate Control Application Example Rate Control Port Config  Port ConfigPort Status Port Vlan Port Vlan Wireless Wireless SettingWireless Setting  Wireless Setting Wireless Parameter Description Ssid BroadcastAP Isolation SecurityWPA/WPA2 WEP Multi-SSID Key FormatHexadecimal and Ascii formats are  Multi-SSID Config  GeneralEnable/Disable Guest NetworkEncryption Group KeyAuth Type 1.3 WDS  List of GroupScan  ParameterBSSIDto be bridged Key TypeWireless Advanced  Wireless AdvancedKey : Short GIMAC Filtering Host Status  Filtering Rules Rule List User Group Group Host Status  Group Config  User ConfigUser  View Config View List of User ViewNAT Setup Advanced1 NAT One-to-One NAT  One-to-One NATMulti-Nets NAT  List of Rules Multi-Nets NAT Configuration procedure Application Example Network RequirementsVirtual Server  Virtual Server InterfaceProtocol Port Triggering  Port Triggering1.6 ALG 38 ALG Following items are displayed on this screenSetup Traffic Control323 ALG IPsec ALGControl Control all the timeLimited UpstreamBandwidth Control Session Limit Session LimitLimited Bandwidth Session List  List of Session LimitConfiguration Load BalancePolicy Routing WAN Link Backup 45 Link Backup Following items are displayed on this screenWAN Config ProtocolTiming FailoverRouting Static Route Protocol  List of Protocol47 Static Route Following items are displayed on this screen  Static Route5.2 RIP 48 RIP Following items are displayed on this screen  List of RIPRoute Table Firewall Anti ARP SpoofingIP-MAC Binding ARP Scanning  IP-MAC BindingARP List Attack Defense Enable Attack Flood DefensePacket Anomaly DefenseAccess Control MAC FilteringURL Filtering  MAC Filtering URL Filtering Rule ObjectAccess Rules Web Filtering Access Rules ServicePolicy SourceService Group on 3.3.1 GroupDestination Priority Service  List of ServiceName Dest. PortApp Control Control Rules Control Rules ApplicationVPN Database1 IKE IKE Policy62 IKE Policy Following items are displayed on this screen  IKE PolicyIKE Proposal 63 IKE Proposal Following items are displayed on this screen  IKE ProposalIPsec IPsec Policy List of IKE Proposal  IPsec Policy Policy NameLocal Subnet Policy Mode Remote SubnetRemote Gateway IKE PolicyAH Authentication Key-In ESP Authentication Key-InAH Authentication Key-Out ESP Authentication Key-OutIPsec Proposal  List of IPsec Policy IPsec IPsec Proposal  List of IPsec Proposal Protocol Media Tunnel Length of Header Authentication 3 L2TP/PPTPIPsec SA 3.1 L2TP/PPTP Tunnel  L2TP/PPTP TunnelTunnel Max ConnectionsL2TP/PPTP Server Pre-shard Key List of Configurations IP Address PoolList of L2TP/PPTP Tunnel  IP Address PoolServices PPPoE ServerGeneral 70 General Following items are displayed on this screen IP Address Pool Account  AccountIP Address Assigned Static IP AddressIs 48. If Enable Advanced Account Features is not selected, Exceptional IP List of Account Bulletin List of Account Exceptional IP Interval  E-BulletinTitle Dynamic DNS Publisher List of E-Bulletin DynDNS  Dyndns DdnsNo-IP  List of DynDNS Account No-IP Ddns PeanutHull  List of No-IP Account PeanutHull Ddns Comexe  List of PeanutHull AccountUPnP  Comexe Ddns List of Comexe Account Maintenance Admin SetupAdministrator  List of UPnP MappingLogin Parameter  AdministratorRemote Management  Remote ManagementFactory Defaults Management List of Subnet Reboot  Configuration VersionExport and Import  ExportFirmware Upgrade LicenseStatistics Interface Traffic Statistics Interface Traffic Statistics 123IP Traffic Statistics  Advanced WAN InformationDiagnostics Diagnostics Traffic Statistics  IP Traffic StatisticsOnline Detection  Ping Tracert Time PingDNS Lookup Port Displays the detected WAN port DetectionLogs  Config  List of LogsSeverity Send System LogsApplication Network RequirementsNetwork Topology Configurations Internet SettingSystem Mode System Mode Internet ConnectionVPN Setting IKE SettingSettings IPsec VPN IKE Policy IKE1IPsec Setting  IPsec Proposal IPsec Policy PFS DH1Pptp VPN Setting  IP Address Pool L2TP/PPTP Tunnel Network Management User Group Group  UserApp Control  ViewEnable Bandwidth Control 11 App RulesBandwidth Control Rule LAN WAN1Network Security LAN ARP DefenseScan and import the entries to ARP List WAN ARP Defense Set IP-MAC Binding Entry ManuallySet Attack Defense Attack Defense 20 Attack Defense 145Traffic Monitoring StatisticsPage Appendix a Hardware Specifications Environmental and PhysicalAppendix B FAQ Page Appendix C Glossary Glossary DescriptionAllows dissimilar communication devices to communicate Port or device that connects to a LAN. Other devices Enterprise
Related manuals
Manual 4 pages 13.1 Kb