User's Manual
Table Of Contents
- TL-ER604W(UN)1.0-UG-2016.4.27修改
- 路由器
- TL-ER604W(UN)1.0-UG-2016.4.27修改
- Package Contents
- Chapter 1 About this Guide
- Chapter 2 Introduction
- Chapter 3 Configuration
- Chapter 4 Application
- Appendix A Hardware Specifications
- Appendix B FAQ
- Appendix C Glossary
IKE consists of two phases. Phase 1 is used to negotiate the parameters, key exchange algorithm and
encryption to establish an ISAKMP SA for securely exchanging more information in Phase 2. During
phase 2, the IKE peers use the ISAKMP SA established in Phase 1 to negotiate the parameters for
security protocols in IPsec and create IPsec SA to secure the transmission data.
3.6.1.1 IKE Policy
On this page you can configure the related parameters for IKE negotiation.
Choose the menu VPN→IKE→IKE Policy to load the following page.
Figure 3-63 IKE Policy
The following items are displayed on this screen:
IKE Policy
Policy Name:
Specify a unique name to the IKE policy for identificatio
n and
management purposes. The IKE policy can be applied to IPsec policy.
-91-