Tp-Link TL-ER6120 Инструкция по эксплуатации онлайн [95/167] 39127

Tp-Link TL-ER6120 Инструкция по эксплуатации онлайн [95/167] 39127
-90-
Key-In:
protocol is used in the corresponding IPsec Proposal. The
inbound key here must match the outbound ESP
encryption key at the other end of the tunnel, and vice
versa.
Outgoing SPI:
Specify the Outgoing SPI (Security Parameter Index)
manually. The Outgoing SPI here must match the
Incoming SPI value at the other end of the tunnel, and
vice versa.
AH Authentication
Key-Out:
Specify the outbound AH Authentication Key manually if
AH protocol is used in the corresponding IPsec Proposal.
The outbound key here must match the inbound AH
authentication key at the other end of the tunnel, and vice
versa.
ESP Authentication
Key-Out:
Specify the outbound ESP Authentication Key manually if
ESP protocol is used in the corresponding IPsec
Proposal. The outbound key here must match the inbound
ESP authentication key at the other end of the tunnel, and
vice versa.
ESP Encryption
Key-Out:
Specify the outbound ESP Encryption Key manually if
ESP protocol is used in the corresponding IPsec
Proposal. The outbound key here must match the inbound
ESP encryption key at the other end of the tunnel, and
vice versa.
¾ List of IPsec Policy IPsec
In this table, you can view the information of IPsec policies and edit them by the action buttons.
The first entry in
Figure 3-60 indicates: this is an IPsec tunnel, the local subnet is 192.168.0.0/24,
the remote subnet is 192.168.3.0/24 and this tunnel is using IKE automatic negotiation. It is
enabled.
Tips:
0.0.0.0.0/32 indicates all IP addresses.
Refer to Appendix Troubleshooting 5 for the configuration of subnet.

Содержание

Скачать