You can use non-symmetric cryptography to hand over contact information, I’ve done that successfuly more than once, e.g.: http://forum.mikrotik.com/t/question-involving-multiple-ipsec-tunnels/149132/1 .
You can use non-symmetric cryptography to hand over contact information, I’ve done that successfuly more than once, e.g.: http://forum.mikrotik.com/t/question-involving-multiple-ipsec-tunnels/149132/1 .