Broadband VPN Router User’s Manual
Figure83: Key Exchange Security Methods34. Select the first entry, and click the "Edit" button to see the following screen.
Figure84: IKE Security Algorithms35.Select "SHA1" for Integrity Algorithm, "3DES" for Encryption algorithm, and "Low(1)" for the
36.Click "OK" to save, then "OK" again, and then "Close" to return to the Local Security Settings screen.
37.Right click the DUT to Win2K Policy and select "Assign" to make your policy active.
Figure85: Windows 2000/XP Client to102