75
Appendix C: Configuring IPSec between a Windows 2000 PC and the Router
How to Establish a Secure IPSec Tunnel
Wireless-G VPN Boradband Router
4. Select the
Authentication Methods
tab, shown in Figure C-13, and click the
Edit
button.
5. Change the authentication method to
Use this string to protect the key exchange (preshared key)
, as
shown in Figure C-14, and enter the preshared key string, such as XYZ12345. Click the
OK
button.
6. This new Preshared key will be displayed in Figure C-15. Click the
OK
or
Close
button to continue.
Figure C-14: Preshared Key
Figure C-13: Authentication Methods
Figure C-15: New Preshared Key