User's Manual
Table Of Contents
- TL-ER604W(UN)1.0-UG-2016.4.27修改
- 路由器
- TL-ER604W(UN)1.0-UG-2016.4.27修改
- Package Contents
- Chapter 1 About this Guide
- Chapter 2 Introduction
- Chapter 3 Configuration
- Chapter 4 Application
- Appendix A Hardware Specifications
- Appendix B FAQ
- Appendix C Glossary
ESP Encryption
Key-Out:
Specify the outbound ESP Encryption Key manually if ESP protocol is
used in the corresponding IPsec Proposal. The outbound key here
must match the inbound ESP encryption key at the other end of the
tunnel, and vice versa.
List of IPsec Policy
In this table, you can view the information of IPsec policies and edit them by the action buttons.
The first entry in Figure 3-65 indicates: this is an IPsec tunnel, the local subnet is 192.168.0.0/24,
the remote subnet is 192.168.3.0/24 and this tunnel is using IKE automatic negotiation. It is
enabled.
Tips:
0.0.0.0/0 indicates all IP addresses.
Refer to Appendix B FAQ Q4 for the configuration of subnet.
3.6.2.2 IPsec Proposal
On this page, you can define and edit the IPsec proposal.
Choose the menu VPN→IPsec→IPsec Proposal to load the following page.
Figure 3-66 IPsec Proposal
The following items are displayed on this screen:
IPsec Proposal
Proposal Name:
Specify
a unique name to the IPsec Proposal for identification and
management purposes. The IPsec proposal can be applied to IPsec policy.
-98-