TW100-BRV304 User's Guide
Figure 81: Key Exchange Security Methods
34.
Select the first entry, and click the "Edit" button to see the following screen.
Figure 82: IKE Security Algorithms
35.
Select "SHA1" for
Integrity Algorithm
, "3DES" for
Encryption algorithm
, and "Low(1)"
for the
Diffie-Hellman Group
.
36.
Click "OK" to save, then "OK" again, and then "Close" to return to the
Local Security
Settings
screen.
37.
Right click the
DUT to Win2K Policy
and select "Assign" to make your policy active.
Figure 83: Windows 2000/XP Client to TW100-BRV304
Configuration is now complete.
102
Summary of Contents for TW100-BRV304 SHEETS
Page 1: ......
Page 2: ......
Page 27: ...PC Configuration Figure 15 Windows NT4 0 DNS 23...
Page 63: ...Security Configuration 59...
Page 149: ...Appendix B Specifications 145...