TP-Link TL-ER604W manual  IKE Proposal

Models: TL-ER604W

1 159
Download 159 pages 47.9 Kb
Page 98
Image 98
IKE Proposal

Figure 3-63 IKE Proposal

The following items are displayed on this screen:

IKE Proposal

Proposal Name: Specify a unique name to the IKE proposal for identification and

management purposes. The IKE proposal can be applied to IPsec proposal.

Authentication: Select the authentication algorithm for IKE negotiation. Options include:

MD5: MD5 (Message Digest Algorithm) takes a message of arbitrary length and generates a 128-bit message digest.

SHA1: SHA1 (Secure Hash Algorithm) takes a message less than 2^64 (the 64th power of 2) in bits and generates a 160-bit message digest.

Encryption: Specify the encryption algorithm for IKE negotiation. Options include:

DES: DES (Data Encryption Standard) encrypts a 64-bit block of plain text with a 56-bit key.

3DES: Triple DES, encrypts a plain text with 168-bit key.

AES128: Uses the AES algorithm and 128-bit key for encryption.

AES192: Uses the AES algorithm and 192-bit key for encryption.

AES256: Uses the AES algorithm and 256-bit key for encryption.

DH Group: Select the DH (Diffie-Hellman) group to be used in key negotiation phase

1.The DH Group sets the strength of the algorithm in bits. Options include DH1, DH2 and DH5.

-93-

Page 98
Image 98
TP-Link TL-ER604W manual  IKE Proposal