beautypg.com

D-Link DFL-600 User Manual

Page 86

background image

tion.

the

ore more likely to be

IKE

encryption algorithm that will be used to
encrypt the messages passed between the VPN
tunnel endpoints during the Phase 1 negotia
You can choose between DES and 3DES
encryption methods. The key length for
3DES algorithm is three times as long as the
DES key, and is theref
secure. You must choose exactly the same
Encryption algorithm on both ends of a VPN
tunnel.


P

hase 2 Proposal

Phase 2 Proposal

The following entries will establish the setup
for the negotiation between the two endpoints
for the encryption of messages once the VPN
tunnel has been initiated.

PFS Mode

This drop-down menu allows you to specify the