}
P2 Encrypt/Auth Algorithms 1:
It refers to the preferred phase 2 proposal that
specifies a set of security protocols and algorithms for phase 2 negotiation.
(2) Originate-Only
If the local Device has a dynamically assigned IP address, and the remote endpoint
(another enterprise wireless router or compatible VPN appliance) has a static IP
address, you can choose
Originate-Only
as the connection type. In this case, the
local Device can only act as an initiator, and both IPSec endpoints should use
aggressive mode for phase 1 IKE negotiation.
Figure 10-14 IPSec Settings_Originate-Only
The parameters
Gateway IP/Domain Name (Remote)
,
Subnet IP (Remote)
,
Subnet
Mask (Remote)
,
Bind to (Local)
,
Subnet IP (Local)
,
Subnet Mask (Local)
,
Preshared Key
, and
P2 Encrypt/Auth Algorithms 1
are the same as those in the
Bidirectional
connection type, please refer to the detailed descriptions of them.
The difference is that this connection type requires identity authentication. Specifically,
the identity authentication for the local Device is required, that is, the local Device
should provide its identity information to the remote IPSec endpoint for authentication;