Chapter 8 L2TP VPN Example
11 Select Use this string to protect the key exchange (preshared key), type
password in the text box, and click Next.
Figure 181 IP Security Policy Properties: Authentication Method
12 Click Add.
Figure 182 IP Security Policy Properties: IP Filter List
196
ZyWALL USG 1000 User's Guide