Users Guide

Table Of Contents
360 | Virtual Private Networks Dell PowerConnect ArubaOS 5.0 | [User Guide
enable
client dns 101.1.1.245
ip local pool sc-clients 10.1.1.1 10.1.1.250
crypto-local isakmp server-certificate ServerCert1
crypto-local isakmp ca-certificate TrustedCA1
crypto isakmp policy 1
authentication rsa-sig
Enter the following command in enable mode to configure client entries in the internal database:
local-userdb add username <name> password <password>
XAuth Clients Using a Username/Password
This section describes how to configure a remote access VPN on the controller for Cisco VPN XAuth clients using
passwords. IKE Phase 1 authentication is done with an IKE preshared key; the user is then prompted to enter
their username and password which is verified with the internal database on the controller.
On the controller, you need to configure the following:
z User role for authenticated clients
z Entries for Cisco VPN XAuth clients in the controller’s internal database
z VPN authentication profile which defines the internal authentication server group and the default role
assigned to authenticated clients
z Enable XAuth to prompt for the username and password
z IKE policy for preshared key authentication of the SA
Configure the VPN via the WebUI
To configure a VPN for Cisco VPN XAuth clients using a username and passwords via the WebUI:
1. Navigate to the Configuration > Security > Access Control > Policies page.
2. Click Add to add a new policy.
a. Enter the name of the policy (for example, authenticated). Default settings for a policy rule permit all
traffic from any source to any destination, but you can make a rule more restrictive. You can also configure
multiple rules; the first rule in a policy that matches the traffic is applied.
b. Click Add to add a rule.
c. When you are done adding rules, click Apply.
d. Click the User Roles tab. Click Add to add a new user role.
e. Enter the name of the role (for example, employee).
f. Under Firewall Policies, click Add. In the Choose from Configured Policies drop-down list, select the
policy you previously created. Click Done.
g. Click Apply.
3. Navigate to the Configuration > Security > Authentication > L3 Authentication page.
a. Select the default VPN Authentication Profile.
b. From the Default Role drop-down menu, select employee.
c. Click Apply.
d. Under the default VPN Authentication Profile, select Server Group.
e. Select the server group internal from the drop-down menu.
f. Click Apply.