User's Manual
Chapter 8 L2TP VPN Example
ZyWALL USG 2000 User’s Guide
198
11 Select Use this string to protect the key exchange (preshared key), type
password in the text box, and click Next.
Figure 188 IP Security Policy Properties: Authentication Method
12 Click Add.
Figure 189 IP Security Policy Properties: IP Filter List