TP-Link TL-ER6120 manual IPsec SA, ¾ List of IPsec Proposal

Models: TL-ER6120

1 169
Download 169 pages 57.81 Kb
Page 100
Image 100
¾List of IPsec Proposal

for ESP authentication. Options include:

zMD5: MD5 (Message Digest Algorithm) takes a message of arbitrary length and generates a 128-bit message digest.

zSHA: SHA (Secure Hash Algorithm) takes a message less than the 64th power of 2 in bits and generates a 160-bit message digest.

ESP Encryption: Select the algorithm used to encrypt the data for ESP encryption. Options include:

NONE: Performs no encryption.

DES: DES (Data Encryption Standard) encrypts a 64-bit block of plain text with a 56-bit key. The key should be 8 characters.

3DES: Triple DES, encrypts a plain text with 168-bit key. The key should be 24 characters.

AES128: Uses the AES algorithm and 128-bit key for encryption. The key should be 16 characters.

¾List of IPsec Proposal

In this table, you can view the information of IPsec Proposals and edit them by the action buttons.

3.5.2.3IPsec SA

This page displays the information of the IPsec SA (Security Association).

Choose the menu VPN→IPsec→IPsec SA to load the following page.

Figure 3-61 IPsec SA

Figure 3-61displays the connection status of the NO.1 entry in the List of IPsec policy in Figure 3-59.As shown in the figure, the Router is using WAN2 for tunnel connection, and the IP address of WAN2

-95-

Page 100
Image 100
TP-Link TL-ER6120 manual IPsec SA, ¾ List of IPsec Proposal