TMS zl Module Planning and Implementation Guide 2009-08

Table Of Contents
Page 118
We will be using pre-shared key for example purposes. For more security,
certificates and DH Group 2 settings can be used.
Disable XAUTH and click Finish. Our IKE policy is completed.