TP-Link TL-ER604W manual IPsec Policy,  List of IKE Proposal

Page 99

DH1: 768 bits

DH2: 1024 bits

DH3: 1536 bits

List of IKE Proposal

In this table, you can view the information of IKE Proposals and edit them by the action buttons.

3.6.2 IPsec

IPsec (IP Security) is a set of services and protocols defined by IETF (Internet Engineering Task Force) to provide high security for IP packets and prevent attacks.

To ensure a secured communication, the two IPsec peers use IPsec protocol to negotiate the data encryption algorithm and the security protocols for checking the integrity of the transmission data, and exchange the key to data de-encryption.

IPsec has two important security protocols, AH (Authentication Header) and ESP (Encapsulating Security Payload). AH is used to guarantee the data integrity. If the packet has been tampered during transmission, the receiver will drop this packet when validating the data integrity. ESP is used to check the data integrity and encrypt the packets. Even if the encrypted packet is intercepted, the third party still cannot get the actual information.

3.6.2.1IPsec Policy

On this page, you can define and edit the IPsec policy.

Choose the menu VPN→IPsec→IPsec Policy to load the following page.

-94-

Image 99
Contents TL-ER604W Copyright & Trademarks FCC Statement Contents III Glossary 151 Hardware Specifications 148Application 130 149Package Contents Overview of this Guide Symbol DescriptionIntended Readers ConventionsOverview of the Router Features Wireless Traffic ControlSecurity Status Indication AppearanceFront Panel  LEDsRear Panel System Mode NetworkStatus Page  Classic Mode WAN Mode NAT Mode  Non-NAT ModeStatic IP  WAN Mode3.2 WAN1 Tips Static IP WAN Static IP Following items are displayed on this screenHost Name Dynamic IP Dynamic IP Connection TypeServer Get IP Address byUnicast Use the following DNSWAN PPPoE PPPoEAccount Name PasswordActive Mode Settings Keep AliveSubnet Address Service NameISP Address Secondary ConnectionL2TP Gateway Address10 WAN L2TP Following items are displayed on this screen  L2TP SettingsDefault Gateway SecondaryConnection Pptp  L2TP StatusServer IP  Pptp SettingsInternet connection by the Connect or Disconnect BigPond  Pptp Status12 WAN Bigpond Following items are displayed on this screen  BigPond SettingsISP  BigPond Status4 LAN 4.1 LANDhcp  Dhcp Settings Dhcp Client Dhcp Reservation Dhcp Reservation Set the MAC Address for WAN port MAC Address List of Reserved Address Set the MAC Address for LAN portPort SwitchStatistics  MAC Address Statistics Port MirrorMirrored Port Enable Port MirrorMode Mirroring PortRate Control Application Example Rate Control  Port Config Port ConfigPort Status Port Vlan Port Vlan  Wireless Setting WirelessWireless Setting Wireless Setting Wireless Parameter Security DescriptionSsid Broadcast AP IsolationWPA/WPA2 WEP Multi-SSID Key FormatHexadecimal and Ascii formats are  General  Multi-SSID ConfigGuest Network Enable/DisableGroup Key EncryptionAuth Type  List of Group 1.3 WDSKey Type Scan Parameter BSSIDto be bridgedShort GI Wireless Advanced Wireless Advanced Key :MAC Filtering Host Status  Filtering Rules Rule List User Group Group Host Status  Group Config  User ConfigUser View  View ConfigView  List of UserNAT Setup Advanced1 NAT  One-to-One NAT One-to-One NATMulti-Nets NAT  List of Rules Multi-Nets NAT Application Example Network Requirements Configuration procedureVirtual Server  Virtual Server InterfaceProtocol  Port Triggering Port Triggering38 ALG Following items are displayed on this screen 1.6 ALGIPsec ALG SetupTraffic Control 323 ALGUpstream ControlControl all the time LimitedBandwidth Control Session Limit Session LimitLimited Bandwidth  List of Session Limit Session ListConfiguration Load BalancePolicy Routing WAN 45 Link Backup Following items are displayed on this screen Link BackupFailover WAN ConfigProtocol Timing List of Protocol RoutingStatic Route  Protocol Static Route 47 Static Route Following items are displayed on this screen5.2 RIP  List of RIP 48 RIP Following items are displayed on this screenRoute Table Firewall Anti ARP SpoofingIP-MAC Binding  IP-MAC Binding ARP ScanningARP List Attack Defense Defense Enable AttackFlood Defense Packet Anomaly MAC Filtering Access ControlMAC Filtering URL FilteringObject  URL Filtering RuleWeb Filtering Access RulesSource  Access RulesService PolicyPriority ServiceGroup on 3.3.1 Group DestinationDest. Port  Service List of Service NameApplication App ControlControl Rules  Control RulesDatabase VPNIKE Policy 1 IKE IKE Policy 62 IKE Policy Following items are displayed on this screenIKE Proposal  IKE Proposal 63 IKE Proposal Following items are displayed on this screenIPsec IPsec Policy List of IKE Proposal  IPsec Policy Policy NameLocal Subnet IKE Policy Policy ModeRemote Subnet Remote GatewayESP Authentication Key-Out AH Authentication Key-InESP Authentication Key-In AH Authentication Key-OutIPsec Proposal  List of IPsec Policy IPsec IPsec Proposal  List of IPsec Proposal Protocol Media Tunnel Length of Header Authentication 3 L2TP/PPTPIPsec SA  L2TP/PPTP Tunnel 3.1 L2TP/PPTP TunnelPre-shard Key TunnelMax Connections L2TP/PPTP Server IP Address Pool  List of ConfigurationsIP Address Pool List of L2TP/PPTP TunnelServices PPPoE ServerGeneral 70 General Following items are displayed on this screen IP Address Pool Static IP Address Account Account IP Address AssignedIs 48. If Enable Advanced Account Features is not selected, Exceptional IP List of Account Bulletin List of Account Exceptional IP Interval  E-BulletinTitle Dynamic DNS Publisher List of E-Bulletin  Dyndns Ddns DynDNSNo-IP  List of DynDNS Account No-IP Ddns PeanutHull  List of No-IP Account PeanutHull Ddns  List of PeanutHull Account ComexeUPnP  Comexe Ddns List of Comexe Account  List of UPnP Mapping MaintenanceAdmin Setup Administrator Administrator Login Parameter Remote Management Remote ManagementFactory Defaults Management List of Subnet  Export Reboot Configuration Version Export and ImportLicense Firmware Upgrade123 StatisticsInterface Traffic Statistics  Interface Traffic Statistics Advanced WAN Information IP Traffic Statistics IP Traffic Statistics DiagnosticsDiagnostics  Traffic StatisticsOnline Detection  Ping Tracert Port Displays the detected WAN port Detection TimePing DNS LookupLogs Send System Logs  Config List of Logs SeverityNetwork Requirements ApplicationNetwork Topology Configurations Internet SettingSystem Mode Internet Connection System ModeIPsec VPN VPN SettingIKE Setting SettingsIKE1  IKE Policy IPsec Proposal IPsec SettingPFS DH1  IPsec Policy IP Address Pool Pptp VPN Setting L2TP/PPTP Tunnel  User Network ManagementUser Group  Group View App Control11 App Rules Enable Bandwidth ControlLAN WAN1 Bandwidth Control RuleNetwork Security LAN ARP DefenseScan and import the entries to ARP List WAN ARP Defense Set IP-MAC Binding Entry ManuallySet Attack Defense 20 Attack Defense 145 Attack DefenseStatistics Traffic MonitoringPage Environmental and Physical Appendix a Hardware SpecificationsAppendix B FAQ Page Glossary Description Appendix C GlossaryAllows dissimilar communication devices to communicate Port or device that connects to a LAN. Other devices Enterprise
Related manuals
Manual 4 pages 13.1 Kb