TP-Link TL-ER6120 manual ¾ IPsec Proposal

Models: TL-ER6120

1 169
Download 169 pages 57.81 Kb
Page 99
Image 99
¾IPsec Proposal

Figure 3-60 IPsec Proposal

The following items are displayed on this screen:

¾IPsec Proposal

Proposal Name: Specify a unique name to the IPsec Proposal for

identification and management purposes. The IPsec proposal can be applied to IPsec policy.

Security Protocol: Select the security protocol to be used. Options include:

zAH: AH (Authentication Header) provides data origin authentication, data integrity, and anti-replay services.

zESP: ESP (Encapsulating Security Payload) provides data encryption in addition to origin authentication, data integrity, and anti-replay services.

AH Authentication: Select the algorithm used to verify the integrity of the data for AH authentication. Options include:

zMD5: MD5 (Message Digest Algorithm) takes a message of arbitrary length and generates a 128-bit message digest.

zSHA: SHA (Secure Hash Algorithm) takes a message less than the 64th power of 2 in bits and generates a 160-bit message digest.

ESP Authentication: Select the algorithm used to verify the integrity of the data

-94-

Page 99
Image 99
TP-Link TL-ER6120 manual ¾ IPsec Proposal