Dell 6.2 manual

Models: 6.2

1 869
Download 869 pages 47.42 Kb
Page 286
Image 286

digital certificates; for XAuth clients using smart cards, the smart card digital certificates must be used for IKE authentication. The client is authenticated with the internal database on the controller.

On the controller, you need to configure the following:

1. Add entries for Cisco VPN XAuth clients to the controller’s internal database, or to an external RADIUS

NOTE: For each client, you need to create an entry in the internal database with the entire Principal name (SubjectAltname in X.509

certificates) or Common Name as it appears on the certificate.

1.or LDAP server. For details on configuring an authentication server, see "Authentication Servers" on page 168

2.Verify that the server with the client data is part of the server group associated with the VPN authentication profile.

3.In the L2TP and XAUTH Parameters section of the Configuration>VPN Services>IPsec tab, enable L2TP.

4.In the L2TP and XAUTH Parameters section of the Configuration>VPN Services>IPsec tab, enable XAuth to enable prompting for the username and password.

5.The Phase 1 IKE exchange for XAuth clients can be either Main Mode or Aggressive Mode. Aggressive Mode condenses the IKE SA negotiations into three packets (versus six packets for Main Mode). In the Aggressive Mode section of the Configuration>VPN Services>IPsec tab, Enter the authentication group name for aggressive mode to associate this setting to multiple clients. Make sure that the group name matches the aggressive mode group name configured in the VPN client software.

6.Configure other VPN settings as described in "Configuring a VPN for L2TP/IPsec with IKEv2 in the WebUI" on page 279, while ensuring that the following settings are selected

In the L2TP and XAUTH Parameters section of the Configuration>VPN Services>IPSEC tab, enable L2TP.

n the L2TP and XAUTH Parameters section of the Configuration>VPN Services>IPSEC tab, enable XAuth to enable prompting for the username and password.

n Define an IKE policy to use RSA or ECDSA authentication.

The following example describes the steps to use the command-line interface to configure a VPN for Cisco Smart Card Clients using certificate authentication and IKEv1, where the client is authenticated against user entries added to the internal database:

(host)(config) #aaa authentication vpn default server-group internal

(host)(config) #no crypto-local isakmp xauth

(host)(config) #vpdn group l2tp enable

client dns 101.1.1.245

(host)(config) #ip local pool sc-clients 10.1.1.1 10.1.1.250

(host)(config) #crypto-local isakmp server-certificate MyServerCert

(host)(config) #crypto-local isakmp ca-certificate TrustedCA

(host)(config) #crypto isakmp policy 1 authentication rsa-sig

Enter the following command in enable mode to configure client entries in the internal database:

(host)(config) #local-userdb add username <name> password <password>

286 Virtual Private Networks

Dell PowerConnect W-Series ArubaOS 6.2 User Guide

Page 286
Image 286
Dell 6.2 manual

6.2 specifications

Dell 6.2 is an advanced enterprise solution that caters to the needs of businesses seeking robust performance and efficiency. As a part of Dell's commitment to innovation, the 6.2 series combines cutting-edge technologies and features that enhance productivity and deliver reliable computing experiences.

One of the standout features of the Dell 6.2 is its impressive processing power. Equipped with the latest Intel processors, it offers exceptional speed and multitasking capabilities. This allows businesses to run demanding applications effortlessly, making it ideal for data-intensive tasks such as data analysis, software development, and virtualization. The series also supports substantial RAM configurations, enabling users to manage extensive workloads without experiencing slowdowns.

In terms of storage, the Dell 6.2 line includes advanced SSD options that significantly boost data access speeds compared to traditional hard drives. This rapid access to information is vital for businesses that require quick retrieval of large datasets. Furthermore, the devices support RAID configurations, which enhances data redundancy and security, protecting critical business information from loss.

Connectivity is another critical aspect of the Dell 6.2 series. It includes multiple USB ports, HDMI outputs, and high-speed Ethernet options, ensuring that users can easily connect to various peripherals and networks. The integration of Wi-Fi 6 technology enables faster wireless connections, resulting in improved internet speeds and bandwidth efficiency, which is crucial in today’s increasingly connected workplaces.

Dell has also prioritized security in the 6.2 series. It features enhanced biometric authentication and advanced encryption methods, safeguarding sensitive data from unauthorized access. Additionally, the system's BIOS protection and automatic updates provide an added layer of security, ensuring that the device remains safe from emerging threats.

The design of the Dell 6.2 is not only sleek and modern but also built for durability. Its robust chassis is engineered to withstand the rigors of daily use, making it suitable for various business environments. This durability ensures that the investment in Dell 6.2 will last for years while maintaining performance integrity.

In summary, the Dell 6.2 series embodies a blend of speed, storage efficiency, connectivity, and security, making it a top choice for enterprises looking to enhance their computing capabilities. With its modern features and durable design, Dell 6.2 is positioned as a reliable partner in driving business success.