User Guide
Table Of Contents
- Chapter 1. Introduction
 - Chapter 2. Hardware installation
 - Chapter 3. Quick Installation Guide
 - Chapter 4. Configuring the Router
 - Appendix A: Specifications
 - Appendix B: Preventing Lightning
 - Appendix C: FAQ
 - Appendix D: Glossary
 

TL-R600VPN  SafeStream
TM
 Gigabit Broadband VPN Router User Guide
48
authentication key at the other end of the tunnel, and vice 
versa. 
In Encryption Key: 
Specify the Inbound Encryption Key manually if ESP 
protocol The inbound key here must match the outbound 
Encryption Key at the other end of the tunnel, and vice 
versa. 
Outgoing SPI: 
Specify the Outgoing SPI (Security Parameter Index) 
manually. The Outgoing SPI here must match the 
Incoming SPI value at the other end of the tunnel, and 
vice versa. 
Out Authentication 
Key: 
Specify the outbound AH Authentication Key manually if 
AH protocol is used in the corresponding IPsec Proposal. 
The outbound key here must match the inbound AH 
authentication key at the other end of the tunnel, and vice 
versa. 
Out Encryption 
Key: 
Specify the outbound Encryption Key manually The 
outbound key here must match the inbound Encryption 
Key at the other end of the tunnel, and vice versa. 
Status: 
Enable or Disable the entry. 
Other configurations for the entries as shown in 
Figure 4-40: 
Click the Delete All button to delete all the entries. 
Click the Previous button to view the information in the previous screen, click the Next button to 
view the information in the next screen. 
4.8.3  SA List 
This page displays the information of the IPsec SA (Security Association). Choose the menu 
IPsec VPN→SA List to load the following page. 










