TRENDnet BRV204 Network Router User Manual


 
TW100-BRV204 User Guide
98
Figure 81: Key Exchange Security Methods
34. Select the first entry, and click the "Edit" button to see the following screen.
Figure 82: IKE Security Algorithms
35. Select "SHA1" for Integrity Algorithm, "3DES" for Encryption algorithm, and "Low(1)"
for the Diffie-Hellman Group.
36. Click "OK" to save, then "OK" again, and then "Close" to return to the Local Security
Settings screen.
37. Right click the DUT to Win2K Policy and select "Assign" to make your policy active.
Figure 83: Windows 2000/XP Client to TW100-BRV204
Configuration is now complete.