TP-Link TL-ER6020 manual  List of IKE Policy,  IKE Proposal

Models: TL-ER6020

1 168
Download 168 pages 1.21 Kb
Page 91
Image 91
List of IKE Policy

DPD Interval: Enter the interval after which the DPD is triggered.

List of IKE Policy

In this table, you can view the information of IKE Policies and edit them by the action buttons.

3.5.1.2IKE Proposal

On this page, you can define and edit the IKE Proposal.

Choose the menu VPN→IKE→IKE Proposal to load the following page.

Figure 3-59 IKE Proposal

The following items are displayed on this screen:

IKE Proposal

Proposal Name: Specify a unique name to the IKE proposal for identification and

management purposes. The IKE proposal can be applied to IPsec proposal.

Authentication: Select the authentication algorithm for IKE negotiation. Options include:

MD5: MD5 (Message Digest Algorithm) takes a message of arbitrary length and generates a 128-bit message digest.

SHA1: SHA1 (Secure Hash Algorithm) takes a message less than 2^64 (the 64th power of 2) in bits and generates a 160-bit message digest.

-86-

Page 91
Image 91
TP-Link TL-ER6020 manual  List of IKE Policy,  IKE Proposal