Figure 3-60 IPsec Proposal

The following items are displayed on this screen:

¾IPsec Proposal

Proposal Name: Specify a unique name to the IPsec Proposal for

identification and management purposes. The IPsec proposal can be applied to IPsec policy.

Security Protocol: Select the security protocol to be used. Options include:

zAH: AH (Authentication Header) provides data origin authentication, data integrity, and anti-replay services.

zESP: ESP (Encapsulating Security Payload) provides data encryption in addition to origin authentication, data integrity, and anti-replay services.

AH Authentication: Select the algorithm used to verify the integrity of the data for AH authentication. Options include:

zMD5: MD5 (Message Digest Algorithm) takes a message of arbitrary length and generates a 128-bit message digest.

zSHA: SHA (Secure Hash Algorithm) takes a message less than the 64th power of 2 in bits and generates a 160-bit message digest.

ESP Authentication: Select the algorithm used to verify the integrity of the data

-94-

Page 99
Image 99
TP-Link TL-ER6120 manual ¾ IPsec Proposal

TL-ER6120 specifications

The TP-Link TL-ER6120 is a robust and versatile gigabit router designed for small to medium-sized businesses, offering high-performance routing capabilities while ensuring secure network management. This device stands out for its user-friendly configuration, affordability, and rich feature set tailored for business needs.

One of the key features of the TL-ER6120 is its advanced routing capabilities. It supports load balancing and failover, ensuring reliable internet connectivity by distributing traffic across multiple WAN ports. This helps to maintain optimal performance even during high-traffic periods. The router can accommodate up to three WAN ports, providing flexibility in terms of connection options and redundancy.

Security is paramount in any business network, and the TL-ER6120 does not disappoint. It includes a robust firewall with stateful packet inspection, preventing unauthorized access and safeguarding sensitive data. The router also supports various VPN protocols, including PPTP, L2TP, and IPSec, enabling secure remote access for employees working from remote locations. This feature is particularly beneficial as remote work becomes more prevalent.

In addition to its security features, the TL-ER6120 offers support for VLAN configuration, allowing businesses to segment their networks for better performance and security. Dynamic Routing Protocols such as RIP v1/v2, and static routing are also supported, ensuring seamless data exchange across different network segments.

Another significant aspect of the TL-ER6120 is its Quality of Service (QoS) functionality. This feature enables users to prioritize bandwidth for critical applications, ensuring that services like VoIP and video conferencing maintain optimal performance. By managing the flow of data, businesses can enhance their operational efficiency.

The TL-ER6120 is equipped with several advanced management features, including a web-based user interface that simplifies network configuration and monitoring. Users can easily manage their network settings, view traffic statistics, and troubleshoot issues without advanced technical knowledge.

In conclusion, the TP-Link TL-ER6120 is an excellent choice for businesses seeking a reliable, feature-rich router. Its combination of security, performance, and ease of use makes it an ideal solution for managing business networks efficiently. Whether for load balancing, secure remote access, or network segmentation, the TL-ER6120 meets diverse business needs with sophistication and reliability.