a. Select Internal DB to display entries for the internal database.
b. ClickAdd User.
c. Enter usernameand password information for t he client.
d. ClickEnabled to acti vate this entry on creation.
e. Click Apply.
2. Navigate to the Configuration > Security > Authentication > L3 Authentication window.
a. Underdefault VPN Authentication Profile, select Server Group.
b. Select the intern alserver group from the drop-down menu.
c. Click Apply.
3. Navi gatet o the Configuration > Advanced Services > VPN Services > IPsec window.
a. Select EnableL2TP (this is enabledby default).
b. Select PAP for Authentication Proto cols.
4. Configure other VPN settings as described in "Configuring a VPN for L2TP/IPsec with IKEv2 in the WebUI" on
page 279, while ensuringthat the followings ettings are selected:
lIn the L2TP and XAUTH Parameters section of the Configuration>VPN Services>IPsec tab, enable L2TP.
lIn the L2TP and XAUTH Parameters section o f the Configuration>VPN Services>IPsec tab, select PAP as
the authentication protocol.
In the CLI
The followingexample uses the command-line interface to configure a L2TP/IPsec VPN for username/password
clients using IKEv1.
(host)(config) #vpdn group l2tp
enable
ppp authentication pap
client dns 101.1.1.245
(host)(config) #ip local pool pw-clients 10.1.1.1 10.1.1.250
(host)(config) #crypto isakmp key <key> address 0.0.0.0 netmask 0.0.00
(host)(config) #crypto isakmp policy 1
authentication pre-share
Next, issue the following commandi n

enable

mode to configure client entries in the internal database:
(host)(config) #local-userdb add username <name> password <password>
Configuring Rem ote Access VPNs for XAuth
Extended Authentication (XAuth) is an Internet Draft t hat allows userauthenticati on after IKE Phase 1
authentication. This authentication prompts the user for a username and password, with user credentials
authenticated with an external RADIUS or LDAP servero r the controller’sinternal database. Alternatively, the user
can start the client authentication with a smart card which contains a digital certificate to verify the client
credentials.IK E Phase1 authenticatio ncan be done with either anIK E presharedkey or digital certificates.

Configuring VPN s for XAuth Clien ts using Smart Ca rds

This section describes how to configure aremote access VP N on theco ntrollerfor Cisco VPN XA uthclients using
smart cards.(A smart card contains a digital certificate which allows user-levelauthentication without the user
enteringa username and password.)IKE P hase1 authentication can be done with either anIKE preshared key or
DellPowerConnect W- Series ArubaOS 6.2 | UserGuide VirtualPrivate Networks | 285