TMS zl Management and Configuration Guide ST.1.0.090213

7-104
Virtual Private Networks
Layer 2 Tunneling Protocol (L2TP) over IPsec
6. For User IP Address, type the IP address that the remote client uses on the
tunnel. This IP address must be on the same subnet as the LNS address
that you configured in the previous step.
You might place multiple remote clients in the same subnet. Make sure to
assign each user account a unique IP address.
7. For Authentication, you can choose this additional layer of authentication,
if desired:
No Authentication—The module and the remote endpoint do not
authenticate each other. However, the user still logs in with the
credentials that are configured on the next page.
Authentication Peer—The module authenticates the remote endpoint.
Authentication With Peer—The remote host authenticates the module.
Both—Both hosts authenticate each other.
Note If you enforce this additional layer of authentication for Windows end-
points, you must alter the endpoint’s registry. See “Configuring the L2TP
Shared Secret on the Windows Client” on page 7-267.
8. If you selected Authentication Peer, Authentication With Peer, or Both, type
a string in the Shared Secret box.
You must match this string when you configure the L2TP authentication
on the remote endpoint’s registry.
9. Click Next.
Figure 7-81. Add Dial-In User Window—Step 2 of 3