TRENDnet BRV204 manual Configuration is now complete, Key Exchange Security Methods

Models: BRV204

1 146
Download 146 pages 58.45 Kb
Page 102
Image 102
Figure 81: Key Exchange Security Methods

TW100-BRV204 User Guide

Figure 81: Key Exchange Security Methods

34. Select the first entry, and click the "Edit" button to see the following screen.

Figure 82: IKE Security Algorithms

35.Select "SHA1" for Integrity Algorithm, "3DES" for Encryption algorithm, and "Low(1)" for the Diffie-Hellman Group.

36.Click "OK" to save, then "OK" again, and then "Close" to return to the Local Security Settings screen.

37.Right click the DUT to Win2K Policy and select "Assign" to make your policy active.

Figure 83: Windows 2000/XP Client to TW100-BRV204

Configuration is now complete.

98

Page 102
Image 102
TRENDnet BRV204 manual Configuration is now complete, Key Exchange Security Methods, IKE Security Algorithms