Users Guide

n Layer-2 Tunneling Protocol over IPSec (L2TP/IPSec)
n Point-to-Point Tunneling Protocol (PPTP)
l Site-to-site VPNs allow networks such as a branch office network to connect to other networks such as a corporate
network. Unlike a remote access VPN, hosts in a site-to-site VPN do not run VPN client software. All traffic for the
other network is sent and received through a VPN gateway that encapsulates and encrypts the traffic.
Before enabling VPN authentication, you must configure the following:
l The default user role for authenticated VPN clients. This is configured with roles and policies.
l The authentication server group the controllers will use to validate the clients. This is configured with server groups.
You then specify the default user role and authentication server group in the VPN authentication profile.
The Advanced Services > VPN Services page displays all VPN service profiles that are currently configured, and allows
you to add VPN service profiles or to edit existing profiles.
Refer to Table 4 for a list of VPN services that can be configured.
Profile Type Refer to
IKE Profile Refer to "Advanced Services > VPN Services > IKE Profile" on page 55
IPSEC Profile Refer to "Advanced Services > VPN Services > IPSEC Profile" on page 56.
L2TP Profile Refer to "Advanced Services > VPN Services > L2TP Profile" on page 56.
PPTP Profile Refer to "Advanced Services > VPN Services > PPTP Profile" on page 56.
Table 4:
Advanced Services > VPN Services
Advanced Services > VPN Services > IKE Profile
Navigate to the Advanced Services > VPN Services > IKEpage from the Dell Networking W Configuration
navigation pane. This page displays all Internet Key Exchange (IKE) profiles currently available for VPN Services. IKE
is a part of the IPSEC protocol suite, supporting security for VPNs with a shared session secret that produces security
keys.
The IKE profile requires the controller to have a Remote Access Points license or a VPN Server license.
Select Add to create a new IKE profile, or click the pencil icon next to an existing profile to edit.
Refer to the Virtual Private Networks chapter in the Dell Networking W-Series ArubaOS User Guide for information
about IKE.
Advanced Services > VPN Services > IKE > IKE Policy
Navigate to the Advanced Services > VPN Services > IKE > IKE Policy page from the Dell Networking W
Configuration navigation pane to add a new IKE policy.
Refer to the Virtual Private Networks chapter in the Dell Networking W-Series ArubaOS User Guide for information
about IKE. Also refer to the "vpn-dialer" command in the Dell Networking W-Series ArubaOS CLI Guide for
information about the options that are available on the IKE Policy form.
Dell Networking W-AirWave 7.7 | Controller Configuration Controller Configuration Reference | 55