Operation Manual

300Mbps Multi-Function Wireless N Router User Guide
- 52 -
To ensure a secured communication, the two IPsec peers use IPsec protocol to negotiate the data
encryption algorithm and the security protocols for checking the integrity of the transmission data,
and exchange the key to data de-encryption.
Choose menu VPN
IPsec”, you can view the information of IPsec Policies in this table
(shown in
Figure 4-38) and edit them by the action buttons. Check the Enable box and click the
Save button to enable IPsec function.
Figure 4-38 List of IPsec Policy
To add a new IPsec Policy entry, click the Add button and the next screen will pop-up as shown in
Figure 4-39. You can set parameters for IPsec Policy entry on this page.
Figure 4-39 IPsec Policy Settings
Policy Name - Enter the name for the IPsec Policy.
Local Subnet - Enter the local (LAN) subnet and mask.(ex. 192.168.0.0/24)
Peer Subnet - Enter the Peer subnet and mask.