Users Guide

Table Of Contents
Dell PowerConnect ArubaOS 5.0 | User Guide | 17
Example Configurations for Remote Access Clients........................................................351
Configuring a VPN for Smart Card Clients via the WebUI.......................................351
Configuring a VPN for Smart Card Clients via the CLI..............................................353
VPNs for L2TP/IPsec Clients with Passwords...................................................................353
Configure the L2TP/IPsec VPN via the WebUI..........................................................354
Configure the L2TP/IPsec VPN via the CLI.................................................................355
Remote Access VPNs for XAuth..................................................................................................355
Configure a VPN with XAuth via the WebUI......................................................................355
Authentication Method and Server Addresses ........................................................356
Address Pools.................................................................................................................356
Source NAT.....................................................................................................................356
Aggressive Mode...........................................................................................................356
Server Certificate...........................................................................................................356
CA Certificate for VPN Clients......................................................................................356
IKE Shared Secrets........................................................................................................357
IKE Policies......................................................................................................................357
Configure a VPN with XAuth via the CLI.............................................................................357
Authentication Method and Server Addresses ........................................................357
Address Pools.................................................................................................................357
Source NAT.....................................................................................................................357
Aggressive Mode...........................................................................................................357
Server Certificate...........................................................................................................357
CA Certificate Assigned for VPN Clients....................................................................357
IKE Shared Secrets........................................................................................................357
IKE Policies......................................................................................................................358
Configurations for XAuth Clients using Smart Cards .......................................................358
Configure a VPN for Cisco XAuth Smart Card Clients......................................................358
Configure the VPN via the WebUI...............................................................................358
Configure the VPN via the CLI......................................................................................359
XAuth Clients Using a Username/Password .....................................................................360
Configure the VPN via the WebUI...............................................................................360
Configure the VPN via the CLI......................................................................................361
Remote Access VPN for PPTP.....................................................................................................362
Configuring a VPN with PPTP via the WebUI....................................................................362
Configuring a VPN with PPTP via the CLI...........................................................................362
Site-to-Site VPNs............................................................................................................................362
Site-to-Site VPNs with Dynamic IP Addresses.................................................................363
VPN Topologies ......................................................................................................................363
Configuring site-to-site VPN via the WebUI ......................................................................363
Configuring site-to-site VPN via the CLI.............................................................................365
Dead Peer Detection..............................................................................................................366
Dell Dialer ........................................................................................................................................366
Configuring the Dialer via the WebUI .................................................................................366
Configuring the Dialer via the CLI........................................................................................367
Captive Portal Dialer..............................................................................................................367
Configuring MAC-Based Authentication....................................................................................369
Configuring the MAC Authentication Profile.....................................................................369
Chapter 16 MAC-based Authentication ...........................................................................................369
Using the WebUI to configure a MAC authentication profile.................................370
Using the CLI to configure a MAC authentication profile........................................370
Configuring Clients.........................................................................................................................370
Using the WebUI to configure clients in the internal database .....................................370
Using the CLI to configure clients in the internal database............................................371
Chapter 17 Control Plane Security....................................................................................................373