TP-Link TL-ER6020 TL-ER6020 v1 User Guide - Page 97
Proposal Name, Security Protocol, AH Authentication
View all TP-Link TL-ER6020 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 97 highlights
Figure 3-61 IPsec Proposal The following items are displayed on this screen: IPsec Proposal Proposal Name: Specify a unique name to the IPsec Proposal for identification and management purposes. The IPsec proposal can be applied to IPsec policy. Security Protocol: Select the security protocol to be used. Options include: AH: AH (Authentication Header) provides data origin authentication, data integrity and anti-replay services. ESP: ESP (Encapsulating Security Payload) provides data encryption in addition to origin authentication, data integrity, and anti-replay services. AH Authentication: Select the algorithm used to verify the integrity of the data for AH authentication. Options include: MD5: MD5 (Message Digest Algorithm) takes a message of arbitrary length and generates a 128-bit message digest. SHA: SHA (Secure Hash Algorithm) takes a message less than the 64th power of 2 in bits and generates a 160-bit message digest. -92-