TP-Link TL-ER6020 TL-ER6020 v1 User Guide - Page 96

IPsec Proposal

Page 96 highlights

AH Authentication Key-Out: Specify the outbound AH Authentication Key manually if AH protocol is used in the corresponding IPsec Proposal. The outbound key here must match the inbound AH authentication key at the other end of the tunnel, and vice versa. ESP Authentication Key-Out: Specify the outbound ESP Authentication Key manually if ESP protocol is used in the corresponding IPsec Proposal. The outbound key here must match the inbound ESP authentication key at the other end of the tunnel, and vice versa. ESP Encryption Key-Out: Specify the outbound ESP Encryption Key manually if ESP protocol is used in the corresponding IPsec Proposal. The outbound key here must match the inbound ESP encryption key at the other end of the tunnel, and vice versa.  List of IPsec Policy IPsec In this table, you can view the information of IPsec policies and edit them by the action buttons. The first entry in Figure 3-60 indicates: this is an IPsec tunnel, the local subnet is 192.168.0.0/24, the remote subnet is 192.168.3.0/24 and this tunnel is using IKE automatic negotiation. It is enabled. Tips: ● 0.0.0.0.0/32 indicates all IP addresses. ● Refer to Appendix Troubleshooting 5 for the configuration of subnet. 3.5.2.2 IPsec Proposal On this page, you can define and edit the IPsec proposal. Choose the menu VPN→IPsec→IPsec Proposal to load the following page. -91-

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168

-91-
AH Authentication Key-Out:
Specify the outbound AH Authentication Key manually if AH
protocol is used in the corresponding IPsec Proposal. The
outbound key here must match the inbound AH authentication
key at the other end of the tunnel, and vice versa.
ESP Authentication Key-Out:
Specify the outbound ESP Authentication Key manually if ESP
protocol is used in the corresponding IPsec Proposal. The
outbound key here must match the inbound ESP authentication
key at the other end of the tunnel, and vice versa.
ESP Encryption Key-Out:
Specify the outbound ESP Encryption Key manually if ESP
protocol is used in the corresponding IPsec Proposal. The
outbound key here must match the inbound ESP encryption key
at the other end of the tunnel, and vice versa.
List of IPsec Policy IPsec
In this table, you can view the information of IPsec policies and edit them by the action buttons.
The first entry in Figure 3-60 indicates: this is an IPsec tunnel, the local subnet is 192.168.0.0/24,
the remote subnet is 192.168.3.0/24 and this tunnel is using IKE automatic negotiation. It is
enabled.
Tips:
0.0.0.0.0/32 indicates all IP addresses.
Refer to Appendix Troubleshooting 5 for the configuration of subnet.
3.5.2.2
IPsec Proposal
On this page, you can define and edit the IPsec proposal.
Choose the menu
VPN
IPsec
IPsec Proposal
to load the following page.