Users Guide

Table Of Contents
Dell PowerConnect ArubaOS 5.0 | User Guide Virtual Private Networks | 363
z Digital certificates: You can configure a server certificate and a CA certificate for each site-to-site VPN IPsec
map configuration. For more information about importing server and CA certificates into the controller, see
Chapter 26, “Management Access” on page503.
Site-to-Site VPNs with Dynamic IP Addresses
ArubaOS supports site-to-site VPNs with two statically addressed controllers, or with one static and one
dynamically addressed controller. By default, site-to-site VPN uses IKE Main-mode with Pre-Shared-Keys to
authenticate the IKE SA. This method uses the IP address of the peer, and therefore will not work for dynamically
addressed peers.
To support site-site VPN with dynamically addressed devices, you must enable IKE Aggressive-Mode with
Authentication based on a Pre-Shared-Key. The Dell controller with a dynamic IP address must be configured to
be the initiator of IKE Aggressive-mode for Site-Site VPN, while the controller with a static IP address must be
configured as the responder of IKE Aggressive-mode.
VPN Topologies
You must configure VPN settings on the controllers at both the local and remote sites. In the following figure, a
VPN tunnel connects Network A to Network B across the Internet.
Figure 65 Site-to-Site VPN Configuration Components
To configure the VPN tunnel on controller A, you need to configure the following:
z The source network (Network A)
z The destination network (Network B)
z The VLAN on which the controller A’s interface to the Layer-3 network is located (Interface A in Figure 65)
z The peer gateway, which is the IP address of controller B’s interface to the Layer-3 network (Interface B in the
Figure 65)
Configuring site-to-site VPN via the WebUI
Use the following procedure to create a site-to-site VPN via the WebUI:
1. Navigate to the Configuration > Advanced Services > VPN Services > Site-to-Site page.
2. Under IPsec Maps, click Add to open the Add IPsec Map page.
3. Enter a name for this VPN connection in the Name field.
4. Enter the IP address and netmask for the source (the local network connected to the controller) in the Source
Network and Source Subnet Mask fields, respectively. (See controller A in Figure 65)
Note: Certificate-based authentication is only supported for site-to-site VPN between two controllers with static IP addresses.
Network A
Network B
Layer 3
Network
Source Network
Destination Network
Peer Gateway
Controller A
Controller B
VLAN
Interface BInterface A
Note: Configure VPN settings on the controllers at both the local and remote sites.