Users Guide

Table Of Contents
362 | Virtual Private Networks Dell PowerConnect ArubaOS 5.0 | [User Guide
crypto isakmp policy 1
authentication pre-share
Enter the following command in enable mode to configure client entries in the internal database:
local-userdb add username <name> password <password>
Remote Access VPN for PPTP
Point-to-Point Tunneling Protocol (PPTP) is an alternative to L2TP/IPsec. Like L2TP/IPsec, PPTP provides a
logical transport mechanism to send PPP frames as well as tunneling or encapsulation so that the PPP frames can
be sent across an IP network. PPTP relies on the PPP connection process to perform user authentication and
protocol configuration.
With PPTP, data encryption begins after PPP authentication and connection process is completed. PPTP
connections use Microsoft Point-to-Point Encryption (MPPE), which uses the Rivest-Shamir-Aldeman (RSA)
RC-4 encryption algorithm. PPTP connections require user-level authentication through a PPP-based
authentication protocol (MSCHAPv2 is the currently-supported method).
Configuring a VPN with PPTP via the WebUI
1. Navigate to the Configuration > Advanced Services > VPN Services > PPTP page.
2. To enable PPTP, select Enable PPTP.
3. Select the authentication protocol. The currently-supported method is MSCHAPv2.
4. Configure the primary and secondary DNS servers and primary and secondary WINS Server that will be
pushed to the VPN Dialer.
5. Configure the VPN Address Pool.
a. Click Add. The Add Address Pool page displays.
b. Specify the pool name, start address, and end address.
c. Click Done on completion to apply the configuration.
6. Click Apply to apply the changes made before navigating to other pages.
Configuring a VPN with PPTP via the CLI
vpdn group pptp
enable
client configuration {dns|wins} <ipaddr1> [<ipaddr2>]
ppp authentication {mschapv2}
pptp ip local pool <pool> <start-ipaddr> <end-ipaddr>
Site-to-Site VPNs
Site-to-site VPN allows sites at different physical locations to securely communicate with each other over a Layer-
3 network such as the Internet. You can use Dell controllers instead of VPN concentrators to connect the sites.
Or, you can use a VPN concentrator at one site and a controller at the other site .
A Dell controller supports the following IKE SA authentication methods for site-to-site VPNs:
z Preshared key: the same IKE shared secret must be configured on both the local and remote sites.