Users Guide

Table Of Contents
Dell PowerConnect ArubaOS 5.0 | User Guide Virtual Private Networks | 353
Configuring a VPN for Smart Card Clients via the CLI
Use the following procedure to configure a L2TP/IPsec VPN for Microsoft smart card clients via the CLI:
ip access-list session authenticated
any any any permit position 1
user-role employee
access-list session authenticated
aaa authentication-server ias1
host 1.1.1.254
key 12345678
aaa server-group ias-server
auth-server ias1
aaa authentication vpn default
default-role employee
server-group ias-server
vpdn group l2tp
enable
ppp authentication eap
client dns 101.1.1.245
ip local pool sc-clients 10.1.1.1 10.1.1.250
crypto isakmp key 0987654 address 0.0.0.0 netmask 0.0.00
crypto isakmp policy 1
authentication pre-share
VPNs for L2TP/IPsec Clients with Passwords
This section describes how to configure a remote access VPN on the controller for L2TP/IPsec clients with user
passwords. As described previously in this section, L2TP/IPsec requires two levels of authentication: first, IKE SA
authentication, and then user-level authentication with the PAP authentication protocol. IKE SA is
authenticated with a preshared key, which you must configure as an IKE shared secret on the controller.
User-level authentication is performed by the controller’s internal database.
On the controller, you need to configure the following:
z User role for authenticated clients
z Internal database entries for username and passwords
z VPN authentication profile which defines the internal server group and the default role assigned to
authenticated clients
z L2TP/IPsec VPN with PAP as the PPP authentication
z IKE policy for preshared key authentication of the SA