tion.
the
ore more likely to be
IKE
encryption algorithm that will be used to
encrypt the messages passed between the VPN
tunnel endpoints during the Phase 1 negotia
You can choose between DES and 3DES
encryption methods. The key length for
3DES algorithm is three times as long as the
DES key, and is theref
secure. You must choose exactly the same
Encryption algorithm on both ends of a VPN
tunnel.
P
hase 2 Proposal
Phase 2 Proposal
The following entries will establish the setup
for the negotiation between the two endpoints
for the encryption of messages once the VPN
tunnel has been initiated.
PFS Mode
This drop-down menu allows you to specify the
Содержание DFL-600
Страница 1: ...D Link DFL 600 Firewall VPN Manual Rev 4 0 Building Networks for People ...
Страница 20: ...Home The Home menu contains links to all of the setup menus for the DFL 600 Click on the WAN button ...
Страница 99: ......
Страница 116: ... optional Click Next Enter a Computer description and a Computer nam Click Next e ...
Страница 125: ...Right click on Local Area Connections perties Double click Pro Highlight Internet Protocol TCP IP Click Properties ...