TP-Link TL-ER6020 manual  IPsec Proposal

Models: TL-ER6020

1 168
Download 168 pages 1.21 Kb
Page 97
Image 97
IPsec Proposal

Figure 3-61 IPsec Proposal

The following items are displayed on this screen:

IPsec Proposal

Proposal Name: Specify a unique name to the IPsec Proposal for identification and

management purposes. The IPsec proposal can be applied to IPsec policy.

Security Protocol: Select the security protocol to be used. Options include:

AH: AH (Authentication Header) provides data origin authentication, data integrity and anti-replay services.

ESP: ESP (Encapsulating Security Payload) provides data encryption in addition to origin authentication, data integrity, and anti-replay services.

AH Authentication: Select the algorithm used to verify the integrity of the data for AH authentication. Options include:

MD5: MD5 (Message Digest Algorithm) takes a message of arbitrary length and generates a 128-bit message digest.

SHA: SHA (Secure Hash Algorithm) takes a message less than the 64th power of 2 in bits and generates a 160-bit message digest.

-92-

Page 97
Image 97
TP-Link TL-ER6020 manual  IPsec Proposal