TL-WR842N
300Mbps Multi-Function Wireless N Router User Guide
- 53 -
To ensure a secured communication, the two IPsec peers use IPsec protocol to negotiate the data
encryption algorithm and the security protocols for checking the integrity of the transmission data,
and exchange the key to data de-encryption.
Choose menu “
VPN
→
IPsec
”, you can view the information of IPsec Policies in this table
(shown in Figure 4-38) and edit them by the action buttons. Check the
Enable
box and click the
Save
button to enable IPsec function.
Figure 4-38 List of IPsec Policy
To add a new IPsec Policy entry, click the
Add
button and the next screen will pop-up as shown in
Figure 4-39. You can set parameters for IPsec Policy entry on this page.
Figure 4-39 IPsec Policy Settings
Policy Name
-
Enter the name for the IPsec Policy.
Local Subnet
-
Enter the local (LAN) subnet and mask.(ex. 192.168.0.0/24)
Peer Subnet -
Enter the Peer subnet and mask.