User's Manual

2. In the Name field, give the VPN configuration a short name that identifies it clearly. VPN configuration
names can include spaces.
If you are duplicating a VPN configuration, the original name has "Copy" appended to it. You may highlight
this name and replace it with a new name.
3. In the Description field, briefly describe the characteristics of the VPN configuration.
4. In the Connection Type drop-down list, choose the appropriate connection type to enable:
l L2TP – Uses the Layer 2 Tunneling Protocol. Complete the fields displayed on the form for this
connection type.
l PPTP – Uses the Point-to-Point Tunneling Protocol. Complete the fields displayed on the form for this
connection type.
l IPSec – Uses the Internet Protocol with security extensions. Complete the fields displayed on the form
for this connection type.
5. If you chose IPSec as the connection type, the Authentication Type includes a drop-down list with the
following options:
l Identity Certificate – The client certificate issued during device provisioning will also be used as the
identity certificate for VPN connections. This option requires configuring your VPN server to allow IPSec
authentication using a client certificate.
l Shared Secret / Group Name – An optional group name may be specified. A shared secret (pre-shared
key) is used to establish the IPSec VPN. Authentication is performed with a username and password.
Dell Networking W-ClearPass Guest 6.4 | User Guide Onboard | 159