UTT N518W Manual page 184

Table of Contents

Advertisement

UTT Technologies
P2 Encrypt/Auth Algorithms 1: It refers to the preferred phase 2 proposal that
specifies a set of security protocols and algorithms for phase 2 negotiation.
(2) Originate-Only
If the local Device has a dynamically assigned IP address, and the remote endpoint
(another enterprise wireless router or compatible VPN appliance) has a static IP
address, you can choose Originate-Only as the connection type. In this case, the local
Device can only act as an initiator, and both IPSec endpoints should use aggressive
mode for phase 1 IKE negotiation.
The parameters Gateway IP/Domain Name (Remote), Subnet IP (Remote), Subnet
Mask (Remote), Bind to (Local), Subnet IP (Local), Subnet Mask (Local), Preshared
Key, and P2 Encrypt/Auth Algorithms 1 are the same as those in the Bidirectional
connection type, please refer to the detailed descriptions of them.
The difference is that this connection type requires identity authentication. Specifically,
the identity authentication for the local Device is required, that is, the local Device
should provide its identity information to the remote IPSec endpoint for authentication,
http://www.uttglobal.com
Figure 13-14 IPSec Settings_Originate-Only
VPN Menu
Page 177

Hide quick links:

Advertisement

Table of Contents
loading

Related Products for UTT N518W

This manual is also suitable for:

Ac1220gwAc750wAc750gwAc755w

Table of Contents