Users Guide

Table Of Contents
Dell PowerConnect ArubaOS 5.0 | User Guide Virtual Private Networks | 359
3. Navigate to the Configuration > Security > Authentication > L3 Authentication page.
a. Select default VPN Authentication Profile.
b. From the Default Role drop-down menu, select employee.
c. Click Apply.
d. Under default VPN Authentication Profile, select Server Group.
e. Select the server group internal from the drop-down menu.
f. Click Apply.
4. Navigate to the Configuration > Advanced Services > VPN Services > IPSEC page.
a. Select Enable L2TP (this is enabled by default).
b. Deselect Enable XAuth (this is enabled by default).
c. Configure the IP addresses of the primary and secondary Domain Name System (DNS) servers and
primary and secondary Windows Internet Naming Service (WINS) Server that will be pushed to the VPN
client.
d. Under Address Pools, click Add to open the Add Address Pool page.
e. Specify the start address, the end address and the pool name.
f. Click Done to apply the configuration.
g. Select the server certificate the controller will use to authenticate itself to clients.
h. Select the CA certificate the controller will use to validate clients. Click Done.
i. Under IKE Policies, click Add to open the IPSEC Add Policy configuration page.
j. Set the Priority to 1 for this configuration to take priority over the Default setting.
k. Set the Authentication to RSA.
l. Click Done to activate the changes.
m. Click Apply.
Next, configure client entries in the internal database:
1. Navigate to the Configuration > Security > Authentication > Servers page.
2. Select Internal DB.
3. Click Add User in the Users section. The user configuration page displays.
4. Enter information for the client.
5. Click Enabled to activate this entry on creation.
6. Click Apply to apply the configuration.
Configure the VPN via the CLI
The following procedure describes the steps to configure VPN for Cisco Smart Card Clients via the CLI:
ip access-list session authenticated
any any any permit position 1
user-role employee
access-list session authenticated
aaa authentication vpn default
default-role employee
server-group internal
no crypto-local isakmp xauth
vpdn group l2tp