Tp-Link TL-ER6120 [96/167] Ipsec proposal

Tp-Link TL-ER6120 [96/167] Ipsec proposal
-91-
3.5.2.2 IPsec Proposal
On this page, you can define and edit the IPsec proposal.
Choose the menu VPNIPsecIPsec Proposal to load the following page.
Figure 3-61 IPsec Proposal
The following items are displayed on this screen:
¾ IPsec Proposal
Proposal Name:
Specify a unique name to the IPsec Proposal for
identification and management purposes. The IPsec
proposal can be applied to IPsec policy.
Security Protocol:
Select the security protocol to be used. Options include:
z AH: AH (Authentication Header) provides data origin
authentication, data integrity and anti-replay services.
z ESP: ESP (Encapsulating Security Payload) provides
data encryption in addition to origin authentication, data
integrity, and anti-replay services.
AH Authentication:
Select the algorithm used to verify the integrity of the data
for AH authentication. Options include:
z MD5: MD5 (Message Digest Algorithm) takes a
message of arbitrary length and generates a 128-bit
message digest.
z SHA: SHA (Secure Hash Algorithm) takes a message

Содержание

Скачать