44
D-Link DSL-245GE User Manual
Section 4 - Configuration
Key Life Time:
Enter the amount of time that a key is active in Phase 1. Then select
the unit:
Seconds, Minutes
or
Hours
.
Key Exchange Phase 2
Encryption
Algorithm:
Select encryption method as the algorithm for encrypting data
packets. The options are
DES, 3DES, AES-128, AES-192
or
AES-256
.
Authentication
Algorithm:
The authentication algorithm validates data packets. Select
MD5,
SHA1,
or
SHA256
. Both local and remote device of the VPN tunnel
must use the same authentication algorithm. Both MD5 and SHA1
are one-way hashing algorithm but they produce different length
of digest bits.
Diffie-Hellman
Group:
The Diffie-Hellman key exchange protocol offers different prime key
lengths. Select
768, 1024, 1536, 2048, 3072,
or
4096 bit
.
Key Life Time:
Enter the amount of time that a key is active in Phase 2. Then select
the unit:
Seconds, Minutes
or
Hours
.
Click
Save
when you are done. You can create up to 7 IPSec profiles.