Users Guide

Table Of Contents
356 | Virtual Private Networks Dell PowerConnect ArubaOS 5.0 | [User Guide
Authentication Method and Server Addresses
1. Navigate to the Configuration > Advanced Services > VPN Services > IPSEC page.
2. To enable or disable Extended Authentication (XAuth), select or deselect Enable XAuth (this is enabled by
default).
Disable XAuth if the VPN client is authenticated using a smart card. After successful IKE main mode
exchange, the controller extracts the values of the Principal name (SubjectAltname in X.509 certificates) or
Common Name fields from the digital certificate in the smart card and authenticates them with the
authentication server. The authentication server can be an external RADIUS or LDAP server or the internal
database.
3. Configure the IP addresses of the primary and secondary Domain Name System (DNS) servers and primary
and secondary Windows Internet Naming Service (WINS) Server that will be pushed to the VPN client.
Address Pools
This is the pool from which the clients are assigned addresses.
1. Navigate to the Configuration > Advanced Services > VPN Services > IPSEC page
2. Under Address Pools, click Add to open the Add Address Pool page.
3. Specify the start address, the end address and the pool name.
4. Click Done to apply the configuration.
Source NAT
Use this option if the IP addresses of clients need to be translated to access the network. To use this option, you
must have created a NAT pool by navigating to the Configuration > IP > NAT Pools page.
Aggressive Mode
For XAuth clients, the Phase 1 IKE exchange can be either Main Mode or Aggressive Mode. Aggressive Mode
condenses the IKE SA negotiations into three packets (versus six packets for Main Mode). A group associates the
same set of attributes to multiple clients.
Enter the authentication group name for aggressive mode. Make sure that the group name matches the group
name configured in the VPN client software.
Server Certificate
You can specify a single server certificate for VPN clients. The server certificate must be imported into the
controller, as described in Chapter 26, “Management Access” on page503 Select the server certificate from the
drop-down list.
CA Certificate for VPN Clients
You can assign one or more trusted CA certificates to VPN clients. The trusted CA certificate must be imported
into the controller, as described in Chapter 26, “Management Access” on page503.
1. Under CA Certificate Assigned for VPN-clients, click Add.
2. Select a CA certificate from the drop-down list of CA certificates imported in the controller.
3. Click Done.
4. Repeat the above steps to add additional CA certificates.