USR-G806 User Manual
Technical Support:
h.usriot.com
Jinan USR IOT Technology Limited
www.usriot.com
32
and IP layer, including network authentication protocols AH, ESP, IKE and some algorithms for network
authentication and encryption. AH protocol and ESP protocol are used to provide security services, IKE
protocol is used for key exchange.
Figure34 setting page
Application mode selection: Net-to-Net mode (site-to-site or gateway-to-gateway), Road Warrior mode
(end-to-site or PC-to-gateway)
Transport mode selection: It can be divided into tunnel mode and transmission mode. You can choose
from the transport type.
Functional types: can be divided into VPN client and VPN server.
Connection name: The name used to indicate the connection must be unique.
Local interface: The local address through which you can choose wan_wired, wan_4g
Remote address: IP/domain name on the other end.
Local Terminals: IPSEC protects subnets and subnet masks. If you choose the client of Road Warrior
mode, you do not need to fill in.
Remote Terminals: IPSEC end-to-end protection subnet and subnet mask.
Local identifier: Channel local identifier, which can be IP or domain name. Note that when you customize a
domain name, add @
Remote dentifier: Channel-to-end identifier, which can be IP or domain name. Note that when you
customize a domain name, add @