Installation and Getting Started Guide for 720wl/740wl/760wl 2004-03
BASIC CONFIGURATION
4
This chapter will help you accomplish the following:
• Create a demonstration user account that can log on and be authenticated through the 700wl Series
system built-in user database
• Configure the 700wl Series system as a VPN gateway using PPTP encryption
• Configure a Windows client system to establish a network connection using the PPTP protocol
• Connect to the 700wl Series system as a client using the PPTP protocol, and authenticate the
demonstration user against the built-in database
• (Optional) Configure the 700wl Series system to use a RADIUS server for user authentication, and log
on a user that can be authenticated by the RADIUS server.
This chapter includes the following sections:
Procedure Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1
Preparation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2
Creating a User Account in the Built-In Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3
User Authentication Through the Default Logon Page . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3
PPTP Gateway Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5
Configuring Access Policies for Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-6
PPTP Client Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8
User Authentication Via PPTP Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-11
External Authentication Service Configuration (Optional) . . . . . . . . . . . . . . . . . . . . . . . . 4-11
Verify the External Authentication Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-15
Procedure Overview
This chapter assumes that you have installed an Access Control Server and an Access Controller, or a
single Integrated Access Manager, and have performed the basic configuration following the instructions
in the previous chapters. It assumes you have verified that the Access Controller appears in the Access
Control Server’s Administrative Console.
To accomplish the objectives listed above, the instructions in this chapter lead you through the following
steps:
Step 1. Create a demonstration user account (username and password) in the Rights Manager's Built-in
database.
4-1










