Cisco WUSB54G User Guide - Page 114

D-15: New Preshared Key, D-13: Authentication Methods

Page 114 highlights

Wireless-G VPN Broadband Router 4. Select the Authentication Methods tab, and click the Edit button. 5. Change the authentication method to Use this string to protect the key exchange (preshared key), and enter the preshared key string, such as XYZ12345. Click the OK button. Figure D-13: Authentication Methods 6. This new Preshared key will be displayed. Click the Apply button to continue, if it appears on your screen; otherwise, proceed to the next step. Figure D-14: Preshared Key Appendix D: Configuring IPSec between a Windows 2000 or XP Computer and the Router How to Establish a Secure IPSec Tunnel Figure D-15: New Preshared Key 104

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145

104
Appendix D: Configuring IPSec between a Windows 2000 or XP Computer and the Router
How to Establish a Secure IPSec Tunnel
Wireless-G VPN Broadband Router
4.
Select the
Authentication Methods
tab, and click the
Edit
button.
5.
Change the authentication method to
Use this string to protect the key exchange (preshared key)
, and
enter the preshared key string, such as XYZ12345. Click the
OK
button.
6.
This new Preshared key will be displayed. Click the
Apply
button to continue, if it appears on your screen;
otherwise, proceed to the next step.
Figure D-13: Authentication Methods
Figure D-14: Preshared Key
Figure D-15: New Preshared Key