TP-Link TL-ER604W User Manual page 98

Wireless n gigabit broadband vpn router
Hide thumbs Also See for TL-ER604W:
Table of Contents

Advertisement

The following items are displayed on this screen:
IKE Proposal
Proposal Name:
Authentication:
Encryption:
DH Group:
Figure 3-63 IKE Proposal
Specify a unique name to the IKE proposal for identification and
management purposes. The IKE proposal can be applied to IPsec proposal.
Select the authentication algorithm for IKE negotiation. Options include:
MD5: MD5 (Message Digest Algorithm) takes a message of arbitrary
length and generates a 128-bit message digest.
SHA1: SHA1 (Secure Hash Algorithm) takes a message less than
2^64 (the 64th power of 2) in bits and generates a 160-bit message
digest.
Specify the encryption algorithm for IKE negotiation. Options include:
DES: DES (Data Encryption Standard) encrypts a 64-bit block of plain
text with a 56-bit key.
3DES: Triple DES, encrypts a plain text with 168-bit key.
AES128: Uses the AES algorithm and 128-bit key for encryption.
AES192: Uses the AES algorithm and 192-bit key for encryption.
AES256: Uses the AES algorithm and 256-bit key for encryption.
Select the DH (Diffie-Hellman) group to be used in key negotiation phase
1. The DH Group sets the strength of the algorithm in bits. Options include
DH1, DH2 and DH5.
-93-

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents