Wireless-G VPN Boradband Router

13.Change the authentication method to Use this string to protect the key exchange (preshared key), and enter the preshared key string, such as XYZ12345, as shown in Figure C-22. (This is a sample key string. Yours should be a key that is unique but easy to remember.) Then click the OK button.

14.This new Preshared key will be displayed in Figure C-23. Click the OK button to continue.

15.From the Tunnel Setting tab, shown in Figure C-24, click the radio button for The tunnel endpoint is specified by this IP Address, and enter the Windows 2000/XP computer’s IP Address.

Appendix C: Configuring IPSec between a Windows 2000 PC and the Router

Figure C-22: Preshared Key

Figure C-23: New Preshared Key

Figure C-24: Tunnel Seting Tab

78

How to Establish a Secure IPSec Tunnel

Page 82
Image 82
Cisco Systems WRV54G manual Figure C-22 Preshared Key