Cisco WRV54G User Manual

Page 79

Advertising
background image

75

Appendix C: Configuring IPSec between a Windows 2000 PC and the Router
How to Establish a Secure IPSec Tunnel

Wireless-G VPN Boradband Router

4. Select the Authentication Methods tab, shown in Figure C-13, and click the Edit button.

5. Change the authentication method to Use this string to protect the key exchange (preshared key), as

shown in Figure C-14, and enter the preshared key string, such as XYZ12345. Click the OK button.

6. This new Preshared key will be displayed in Figure C-15. Click the OK or Close button to continue.

Figure C-14: Preshared Key

Figure C-13: Authentication Methods

Figure C-15: New Preshared Key

Advertising