TP-Link TL-ER604W User Manual page 104

Wireless n gigabit broadband vpn router
Hide thumbs Also See for TL-ER604W:
Table of Contents

Advertisement

Security Protocol:
AH Authentication:
ESP Authentication:
ESP Encryption:
List of IPsec Proposal
In this table, you can view the information of IPsec Proposals and edit them by the action buttons.
Select the security protocol to be used. Options include:
AH:
AH
(Authentication
authentication, data integrity and anti-replay services.
ESP: ESP (Encapsulating Security Payload) provides data
encryption in addition to origin authentication, data integrity, and
anti-replay services.
Select the algorithm used to verify the integrity of the data for AH
authentication. Options include:
MD5: MD5 (Message Digest Algorithm) takes a message of
arbitrary length and generates a 128-bit message digest.
SHA: SHA (Secure Hash Algorithm) takes a message less than the
64th power of 2 in bits and generates a 160-bit message digest.
Select the algorithm used to verify the integrity of the data for ESP
authentication. Options include:
MD5: MD5 (Message Digest Algorithm) takes a message of
arbitrary length and generates a 128-bit message digest.
SHA: SHA (Secure Hash Algorithm) takes a message less than the
64th power of 2 in bits and generates a 160-bit message digest.
Select the algorithm used to encrypt the data for ESP encryption.
Options include:
NONE: Performs no encryption.
DES: DES (Data Encryption Standard) encrypts a 64-bit block of plain
text with a 56-bit key. The key should be 8 characters.
3DES: Triple DES, encrypts a plain text with 168-bit key. The key should
be 24 characters.
AES128: Uses the AES algorithm and 128-bit key for encryption. The
key should be 16 characters.
Header)
-99-
provides
data
origin

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents