Chapter 8 L2TP VPN Example

11Select Use this string to protect the key exchange (preshared key), type password in the text box, and click Next.

Figure 204 IP Security Policy Properties: Authentication Method

12Click Add.

Figure 205 IP Security Policy Properties: IP Filter List

210

 

ZyWALL USG 300 User’s Guide