hit counter script

D-Link DSL-X3052E User Manual page 49

Ax3000 wi-fi 6 vdsl2/adsl2+ modem router with voip
Table of Contents

Advertisement

Section 4 - Configuration
Key Exchange Phase 2
Encryption
Select encryption method as the algorithm for encrypting data
Algorithm:
packets. The options are DES, 3DES, AES-128, AES-192 or AES-256.
The authentication algorithm validates data packets. Select MD5,
Authentication
SHA1, or SHA256. Both local and remote device of the VPN tunnel
Algorithm:
must use the same authentication algorithm. Both MD5 and SHA1
are one-way hashing algorithm but they produce different length
of digest bits.
Diffie-Hellman
The Diffie-Hellman key exchange protocol offers different prime key
lengths. Select 768, 1024, 1536, 2048, 3072, or 4096 bit.
Group:
Key Life Time:
Enter the amount of time that a key is active in Phase 2. Then select
the unit: Seconds, Minutes or Hours.
Click Save when you are done. You can create up to 7 IPSec profiles.
D-Link DSL-X3052E User Manual
45

Advertisement

Table of Contents
loading

Table of Contents