Tp-Link TL-ER6020 Инструкция по эксплуатации онлайн [92/168] 39132
-87-
Encryption:
Specify the encryption algorithm for IKE negotiation. Options
include:
DES: DES (Data Encryption Standard) encrypts a 64-bit
block of plain text with a 56-bit key.
3DES: Triple DES, encrypts a plain text with 168-bit key.
AES128: Uses the AES algorithm and 128-bit key for
encryption.
AES192: Uses the AES algorithm and 192-bit key for
encryption.
AES256: Uses the AES algorithm and 256-bit key for
encryption.
DH Group:
Select the DH (Diffie-Hellman) group to be used in key negotiation
phase 1. The DH Group sets the strength of the algorithm in bits.
Options include DH1, DH2 and DH5.
DH1: 768 bits
DH2: 1024 bits
DH3: 1536 bits
List of IKE Proposal
In this table, you can view the information of IKE Proposals and edit them by the action buttons.
3.5.2 IPsec
IPsec (IP Security) is a set of services and protocols defined by IETF (Internet Engineering Task Force)
to provide high security for IP packets and prevent attacks.
To ensure a secured communication, the two IPsec peers use IPsec protocol to negotiate the data
encryption algorithm and the security protocols for checking the integrity of the transmission data, and
exchange the key to data de-encryption.
IPsec has two important security protocols, AH (Authentication Header) and ESP (Encapsulating
Security Payload). AH is used to guarantee the data integrity. If the packet has been tampered during
transmission, the receiver will drop this packet when validating the data integrity. ESP is used to check
the data integrity and encrypt the packets. Even if the encrypted packet is intercepted, the third party
still cannot get the actual information.
Содержание
- Ce mark warning 2
- Copyright trademarks 2
- Fcc statement 2
- Contents 3
- Package contents 6
- Chapter 1 about this guide 7
- Conventions 7
- Intended readers 7
- Overview of this guide 7
- Chapter 2 introduction 9
- Overview of the router 9
- Features 10
- Appearance 11
- Front panel 11
- Rear panel 13
- Chapter 3 configuration 14
- Network 14
- Status 14
- System mode 14
- Dhcp client 36
- Dhcp reservation 36
- Mac address 39
- Statistics 41
- Switch 41
- Port mirror 42
- Rate control 44
- Port config 45
- Port status 46
- Port vlan 47
- User group 47
- Advanced 50
- Nat setup 50
- One to one nat 51
- Multi nets nat 52
- Virtual server 55
- Port triggering 57
- Traffic control 59
- Bandwidth control 61
- Session limit 63
- Configuration 64
- Load balance 64
- Session list 64
- Policy routing 65
- Link backup 66
- Protocol 68
- Routing 69
- Static route 69
- Route table 73
- Anti arp spoofing 74
- Firewall 74
- Ip mac binding 74
- Arp scanning 76
- Arp list 77
- Attack defense 77
- Mac filtering 79
- Access control 80
- Url filtering 80
- Access rules 82
- Web filtering 82
- Service 84
- App control 86
- Control rules 86
- Database 87
- Ike policy 89
- Ike proposal 91
- Ipsec policy 93
- Ipsec proposal 96
- Ipsec sa 98
- L2tp pptp 99
- L2tp pptp tunnel 99
- Ip address pool 102
- General 103
- List of l2tp pptp tunnel 103
- Pppoe server 103
- Services 103
- Ip address pool 105
- Account 106
- Exceptional ip 108
- E bulletin 109
- List of account 109
- Dynamic dns 111
- Dyndns 112
- Peanuthull 114
- Comexe 116
- Admin setup 118
- Administrator 118
- Maintenance 118
- Login parameter 119
- Remote management 120
- Export and import 121
- Factory defaults 121
- Management 121
- Reboot 122
- Firmware upgrade 123
- License 123
- Interface traffic statistics 124
- Statistics 124
- Ip traffic statistics 125
- Diagnostics 126
- Online detection 128
- Chapter 4 application 132
- Network requirements 132
- Configurations 133
- Configurations 4 configurations 133
- Internet setting 133
- Network topology 133
- Internet connection 134
- Link backup 134
- System mode 134
- Ipsec vpn 135
- Vpn setting 135
- Pptp vpn setting 139
- Network management 141
- User group 141
- App control 142
- Bandwidth control 143
- Network security 145
- Session limit 145
- Lan arp defense 146
- Wan arp defense 147
- Attack defense 148
- Traffic monitoring 148
- Chapter 5 cli 151
- Configuration 151
- Interface mode 154
- Online help 155
- Command introduction 157
- Ip mac 157
- History 160
- Appendix a hardware specifications 162
- Appendix b faq 163
- Appendix c glossary 165
Похожие устройства
- Panasonic KX-FP80 Инструкция по эксплуатации
- Sony HDR-XR106E Инструкция по эксплуатации
- Sony SF-16N4/T1 ET4 Инструкция по эксплуатации
- Tp-Link TL-R600VPN Инструкция по эксплуатации
- Toshiba GR-E311DTR Инструкция по эксплуатации
- Sony HDR-XR100E Инструкция по эксплуатации
- Tp-Link TL-R470T+ Инструкция по эксплуатации
- Panasonic NV-VP33 Инструкция по эксплуатации
- Sony HDR-SR8E Инструкция по эксплуатации
- Sony SF-32NX/T1 ET4 Инструкция по эксплуатации
- Tp-Link TL-R480T+ Инструкция по эксплуатации
- Sony HDR-SR7E Инструкция по эксплуатации
- Sony MRW68ED1 Инструкция по эксплуатации
- Tp-Link TL-ER5120 Инструкция по эксплуатации
- Hotpoint-Ariston AQGD 149 S Инструкция по эксплуатации
- Sony HDR-SR5E Инструкция по эксплуатации
- Sony MRW62ES2171 Инструкция по эксплуатации
- Tp-Link TL-R402M Инструкция по эксплуатации
- Panasonic TC-14F1 Инструкция по эксплуатации
- Sony HDR-SR1E Инструкция по эксплуатации
Скачать
Случайные обсуждения