Ipsec - TP-Link SafeStream TL-ER6020 User Manual

Gigabit dual-wan vpn router
Hide thumbs Also See for SafeStream TL-ER6020:
Table of Contents

Advertisement

Encryption:
DH Group:
List of IKE Proposal
In this table, you can view the information of IKE Proposals and edit them by the action buttons.

3.5.2 IPsec

IPsec (IP Security) is a set of services and protocols defined by IETF (Internet Engineering Task Force)
to provide high security for IP packets and prevent attacks.
To ensure a secured communication, the two IPsec peers use IPsec protocol to negotiate the data
encryption algorithm and the security protocols for checking the integrity of the transmission data, and
exchange the key to data de-encryption.
IPsec has two important security protocols, AH (Authentication Header) and ESP (Encapsulating
Security Payload). AH is used to guarantee the data integrity. If the packet has been tampered during
transmission, the receiver will drop this packet when validating the data integrity. ESP is used to check
the data integrity and encrypt the packets. Even if the encrypted packet is intercepted, the third party
still cannot get the actual information.
Specify the encryption algorithm for IKE negotiation. Options
include:
DES: DES (Data Encryption Standard) encrypts a 64-bit
block of plain text with a 56-bit key.
3DES: Triple DES, encrypts a plain text with 168-bit key.
AES128: Uses the AES algorithm and 128-bit key for
encryption.
AES192: Uses the AES algorithm and 192-bit key for
encryption.
AES256: Uses the AES algorithm and 256-bit key for
encryption.
Select the DH (Diffie-Hellman) group to be used in key negotiation
phase 1. The DH Group sets the strength of the algorithm in bits.
Options include DH1, DH2 and DH5.
DH1: 768 bits
DH2: 1024 bits
DH3: 1536 bits
-87-

Advertisement

Table of Contents
loading

Table of Contents