Chapter 8 L2TP VPN Example
11 Select Use this string to protect the key exchange (preshared key), type
password in the text box, and click Next.
Figure 205 IP Security Policy Properties: Authentication Method
12 Click Add.
Figure 206 IP Security Policy Properties: IP Filter List
212
ZyWALL USG 300 User's Guide