Chapter 8 L2TP VPN Example

11Select Use this string to protect the key exchange (preshared key), type password in the text box, and click Next.

Figure 188 IP Security Policy Properties: Authentication Method

12Click Add.

Figure 189 IP Security Policy Properties: IP Filter List

198

 

ZyWALL USG 2000 User’s Guide