TP-Link TL-ER6020 manual IPsec,  List of IKE Proposal

Models: TL-ER6020

1 168
Download 168 pages 1.21 Kb
Page 92
Image 92

Encryption: Specify the encryption algorithm for IKE negotiation. Options include:

DES: DES (Data Encryption Standard) encrypts a 64-bit block of plain text with a 56-bit key.

3DES: Triple DES, encrypts a plain text with 168-bit key.

AES128: Uses the AES algorithm and 128-bit key for encryption.

AES192: Uses the AES algorithm and 192-bit key for encryption.

AES256: Uses the AES algorithm and 256-bit key for encryption.

DH Group: Select the DH (Diffie-Hellman) group to be used in key negotiation phase 1. The DH Group sets the strength of the algorithm in bits. Options include DH1, DH2 and DH5.

DH1: 768 bits

DH2: 1024 bits

DH3: 1536 bits

List of IKE Proposal

In this table, you can view the information of IKE Proposals and edit them by the action buttons.

3.5.2 IPsec

IPsec (IP Security) is a set of services and protocols defined by IETF (Internet Engineering Task Force) to provide high security for IP packets and prevent attacks.

To ensure a secured communication, the two IPsec peers use IPsec protocol to negotiate the data encryption algorithm and the security protocols for checking the integrity of the transmission data, and exchange the key to data de-encryption.

IPsec has two important security protocols, AH (Authentication Header) and ESP (Encapsulating Security Payload). AH is used to guarantee the data integrity. If the packet has been tampered during transmission, the receiver will drop this packet when validating the data integrity. ESP is used to check the data integrity and encrypt the packets. Even if the encrypted packet is intercepted, the third party still cannot get the actual information.

-87-

Page 92
Image 92
TP-Link TL-ER6020 manual IPsec,  List of IKE Proposal