Chapter 8 L2TP VPN Example
11 Select Use this string to protect the key exchange (preshared key), type
password in the text box, and click Next.
Figure 189 IP Security Policy Properties: Authentication Method
12 Click Add.
Figure 190 IP Security Policy Properties: IP Filter List
200
ZyWALL USG 2000 User's Guide