DellPowerConnect W- Series ArubaOS 6.2 | User Guide VirtualPrivate Networks | 271
Chapte r 18

Virtual Private Ne tworks

Wirelessnetworks can use vi rtualprivate network (VPN) connections to further secure wireless data from attackers.
The Dell controller can be used as a VPN concentrator that terminates allVP N connections fromboth wired and
wireless clients.
This chapterdescribes the followingto pics:
l"Planninga VP N Configuration" on page 271
l"Workingwith V PN Authentication Profiles" on page 274
l"Configuringa Basic VPN for L2TP/IPsec in the WebUI" on page 275
l"Configuringa VP N for L2TP/IPsec with I KEv2 in the WebUI" on page 279
l"Configuringa VP N for Smart Card Clients"o n page 283
l"Configuringa VP N for Clients with User Passwords" on page 284
l"ConfiguringRemote A ccess VPNs for XAuth" on page 285
l"Workingwith R emote Access VPNs for P PTP" on page 287
l"Workingwith Sit e-to-Site VPNs" on page 288
l"Workingwith V PN Dialer" on page 293

Planning a VPN Co nfiguration

You can configurethe controller for the following types of VPNs:
lRemote access VPNs allow hosts (for example,telecommuters or travelingemployees) to connect to private
networks (forexample, a corporate network) over the Internet. Each host must run VPN client so ftware which
encapsulatesand encrypts traffic and sends it to a V PN gateway at the destination network. The controller
supports the followingremote access VPN protocols:
nLayer-2 TunnelingProtocol o ver IPsec (L2TP/IPsec)
nPoint-to-Point Tunneling Protocol (PPTP)
nXAUTH IKE/IPsec
nIKEv2 with Certificates
nIKEv2 with EA P
lSite-to-site VPNs allow networks (for example,a branch office network) to connect to other networks(for
example,a corporate network). Unlike a remote access VPN, hosts in a site-to-site VP N do not runVP N client
software. All traffic for the other network is sent and received through a VPN gateway w hich encapsulatesand
encrypts the traffic.
Beforeenabling VPN authentication, you must configure the following:
lThe defaultuser role for authenticated VPN clients. See Roles and Policies on page 296for information about
configuringuser roles
.
lThe authentication servergroup the controlleruses to validate the clients. See Authentication Servers on page 168
for configuration details.