TP-Link TL-ER6020 TL-ER6020 v1 User Guide - Page 91
IKE Proposal
![]() |
View all TP-Link TL-ER6020 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 91 highlights
DPD Interval: Enter the interval after which the DPD is triggered. List of IKE Policy In this table, you can view the information of IKE Policies and edit them by the action buttons. 3.5.1.2 IKE Proposal On this page, you can define and edit the IKE Proposal. Choose the menu VPN→IKE→IKE Proposal to load the following page. Figure 3-59 IKE Proposal The following items are displayed on this screen: IKE Proposal Proposal Name: Specify a unique name to the IKE proposal for identification and management purposes. The IKE proposal can be applied to IPsec proposal. Authentication: Select the authentication algorithm for IKE negotiation. Options include: MD5: MD5 (Message Digest Algorithm) takes a message of arbitrary length and generates a 128-bit message digest. SHA1: SHA1 (Secure Hash Algorithm) takes a message less than 2^64 (the 64th power of 2) in bits and generates a 160-bit message digest. -86-
![](/manual_guide/products/tplink-tler6020-tler6020-v1-user-guide-1fe5db5/91.png)