D-Link DFL-600 Manual page 53

Hide thumbs Also See for DFL-600:
Table of Contents

Advertisement

AH Transform
Target Host Range
Type
Starting Target Host
encryption algorithm that will be used when
ESP is selected in the IPSec Operation drop-
down menu above.
You can choose between Null − no
authorization, MD5 − using MD5 message
digest authentication, and SHA − using the
SHA authentication method.
You must select the exact same ESP
authentication method on both ends of a VPN
tunnel.
This drop-down menu allows you to select the
encryption algorithm that will be used when
AH is selected in the IPSec Operation drop-
down menu above.
You can choose between MD5 − using MD5
message digest authentication, and SHA −
using the SHA authentication method.
You must select the exact same AH
authentication method on both ends of a VPN
tunnel.
The following fields will define the range of IP
addresses of computers on the remote LAN (the
remote endpoint of the VPN tunnel) that will be
allowed to access the VPN.
This drop-down menu allows you to select the
type of network definition for the range of IP
addresses on the remote LAN that will be
allowed to access the VPN. At the time of the
writing of this manual, only the Subnet type is
supported.
This is the first IP address of a subnet range of
IP addresses of computers on the remote LAN
that will be allowed to access the VPN. In this
case, the entire subnet of IP addresses from
53

Advertisement

Table of Contents
loading

Table of Contents