TMS zl Management and Configuration Guide ST.1.1.100226
If you choose to enter the domain-name option, replace <domain name> with
the domain name associated with your RADIUS server.
See “radius-server” on page A-102 for complete information.
To use a RADIUS server to authenticate L2TP clients and to specify the TMS
zl Module’s virtual L2TP server IP address, enter the following command:
Syntax: l2tp radius-auth <L2TP server address>
Replace <L2TP server address> with the IP address that the TMS zl Module
will use in its role as L2TP server. This IP address is not part of an existing
TMS VLAN or subnet in your network.
Your RADIUS server might provide IP settings to L2TP clients authenticating
to the domain associated with it. However, if it does not, you must configure
the TMS zl Module to specify these settings. Enter the following command to
set the IP address pool, DNS server, and WINS server (you must specify the
RADIUS server with the radius-server host command before entering this
command):
Syntax: l2tp radius-auth domain-config <domain name> ip-pool <start IP address>
<end IP address> [dns primary <DNS server address> [secondary <DNS server
address>]] [wins primary <WINS server address> [secondary <WINS server
address>]]
Replace <domain name> with the domain name that you specified for the
RADIUS server in the radius-server host command. If this RADIUS server
is not assigned to a specific domain—you did not include the domain-name
option when you entered that command—replace <domain name> with
global.
Replace <start IP address> and <end IP address> with the first and last
IP addresses in the range of addresses that the remote clients will be assigned.
This IP address range can include up to 10,160 IP addresses.
If you specify one or both of the dns options, replace <DNS server address>
with the IP address of a DNS server that the remote client can use to resolve
host names.
If you specify one or both of the wins options, replace <WINS server
address> with the IP address of a WINS server that the remote client is
allowed to access.
To disable RADIUS authentication for the L2TP VPN, enter the following
command: