Users Guide

Table Of Contents
348 | Virtual Private Networks Dell PowerConnect ArubaOS 5.0 | [User Guide
VPN authentication
To configure VPN authentication via the WebUI:
1. Navigate to the Configuration > Security > Authentication > L3 Authentication page.
2. In the Profiles list, select the default VPN Authentication Profile.
3. Select the Default Role from the drop-down menu.
4. (Optional) Set Max Authentication failures to an integer value (the default value is 0, which disables this
feature). This number indicates the number of contiguous authentication failures before the station is
blacklisted.
5. Click Apply.
6. In the default profile list, select Server Group.
7. From the drop-down menu, select the server group to be used for VPN authentication.
8. Click Apply.
To configure VPN authentication via the command-line interface, access the CLI in config mode and issue the
following commands:
aaa authentication vpn default
default-role <role>
max-authentication-failure <number>
server-group <name>
Supported VPN AAA Deployments
If you want to simultaneously deploy various combinations of a VPN client, RAP-psk, RAP-certs and CAP on the
same controller, see Table 66.
Each row in this table specifies the allowed combinations of AAA servers for simultaneous deployment.
Configuration rules include:
z RAP-certs can only use Local-DP-AP
z A RAP-psk and RAP-cert can only terminate on the same controller if the RAP VPN profile’s AAA server uses
Local-db.
z If a RAP-psk is using an external AAA server, then the RAP-cert cannot be terminated on the same controller.
z Clients can use any type of AAA server irrespective of RAP/CAP authentication configuration server.
Table 66 Supported VPN AAA Deployments
VPN Client RAP psk RAP certs CAP
External AAA server 1 LocalDB LocalDB-AP CPSEC-whitelist
External AAA server 1 External AAA server 1 Not supported CPSEC-whitelist
External AAA server 1 External AAA server 2 Not supported CPSEC-whitelist
LocalDB LocalDB LocalDB-AP CPSEC-whitelist
LocalDB External AAA server 1 Not supported CPSEC-whitelist