EasyManuals Logo

TP-Link SafeStream TL-ER6020 User Manual

TP-Link SafeStream TL-ER6020
168 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #91 background imageLoading...
Page #91 background image
-86-
DPD Interval:
Enter the interval after which the DPD is triggered.
List of IKE Policy
In this table, you can view the information of IKE Policies and edit them by the action buttons.
3.5.1.2 IKE Proposal
On this page, you can define and edit the IKE Proposal.
Choose the menu VPNIKEIKE Proposal to load the following page.
Figure 3-59 IKE Proposal
The following items are displayed on this screen:
IKE Proposal
Proposal Name:
Specify a unique name to the IKE proposal for identification and
management purposes. The IKE proposal can be applied to IPsec
proposal.
Authentication:
Select the authentication algorithm for IKE negotiation. Options
include:
MD5: MD5 (Message Digest Algorithm) takes a message of
arbitrary length and generates a 128-bit message digest.
SHA1: SHA1 (Secure Hash Algorithm) takes a message less
than 2^64 (the 64th power of 2) in bits and generates a
160-bit message digest.

Other manuals for TP-Link SafeStream TL-ER6020

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the TP-Link SafeStream TL-ER6020 and is the answer not in the manual?

TP-Link SafeStream TL-ER6020 Specifications

General IconGeneral
Ethernet LANYes
Cabling technology10/100/1000Base-T(X)
Networking standardsIEEE 802.3, IEEE 802.3ab, IEEE 802.3u
VPN tunnels quantity50
Ethernet LAN data rates10, 100, 1000 Mbit/s
Ethernet LAN interface typeGigabit Ethernet
Maximum indoor range100 m
RS-232 ports1
Ethernet LAN (RJ-45) ports3
Form factor1U
USB ports quantity0
Management platformWeb/CLI/Telnet
Filtering descriptionMAC, URL/Keywords, WebContent
Compatible operating systemsMicrosoft Windows 98SE, NT, 2000, XP, Vista, Windows 7\\r MAC OS\\r NetWare, UNIX, Linux
Routing protocolsRIP-1, RIP-2
Supported protocolsIPsec/PPTP/L2TP
Supported network protocolsTCP/IP, DHCP, ICMP, NAT, PPPoE, SNTP, HTTP, DNS, IPsec, PPTP, L2TP
VPN support50 IPsec VPN Tunnels LAN-to-LAN, Client-to-LAN Main, Aggressive Negotiation Mode DES, 3DES, AES128, AES192, AES256 Encryption Algorithm MD5, SHA1 Authentication Algorithm IPsec NAT Traversal (NAT-T) Dead Peer Detection (DPD) Perfect Forward Secrecy (PFS) 16 PPTP VPN Tunnels PPTP VPN Server/Client PPTP with MPPE Encryption 16 L2TP VPN Tunnels L2TP VPN Server/Client L2TP over IPsec
NAT functionalityOne-to-One NAT\\r Multi-nets NAT\\r Virtual Server, DMZ Host, Port_Triggering, UPnP\\r FTP/H.323/SIP/IPsec/PPTP ALG
Security algorithms128-bit AES, 256-bit AES, 3DES, DES
Authentication methodMD5, SHA-1
Network Address Translation (NAT) sessions (max)30000
Flash memory16 MB
CertificationCE, FCC, RoHS
Internal memory128 MB
Internal memory typeDDR2
Mac operating systems supportedmacOS
Windows operating systems supportedWindows 10, Windows 2000, Windows 7, Windows 8, Windows 8.1, Windows 98SE, Windows NT, Windows Vista, Windows XP
AC input voltage100 - 240 V
Power source typeAC
AC input frequency50 - 60 Hz
Power over Ethernet (PoE)No
Power consumption (typical)- W
Storage temperature (T-T)-40 - 70 °C
Operating temperature (T-T)0 - 40 °C
Storage relative humidity (H-H)5 - 90 %
Operating relative humidity (H-H)10 - 90 %
Product colorBlack
Sustainability certificatesRoHS
Package depth250 mm
Package width400 mm
Package height80 mm
Package weight1810 g
Weight and Dimensions IconWeight and Dimensions
Depth180 mm
Width294 mm
Height44 mm
Weight- g

Related product manuals