What are the restrictions when encryption and verification keys are
The verification key in the inbound direction on the local end must be
the same as that in the outbound direction on the peer end. Similarly, the
verification key in the outbound direction on the local end must be the same as
that in the inbound direction on the peer end. The keys on both ends must be
entered in the same format. For example, the keys must be in hexadecimal format
or character strings. Otherwise, the tunnel cannot be established.