Configuring a V PN for XAuth Clients Using a Usernam e and Password

This section describes how to configure aremote access VP N on theco ntrollerfor Cisco VPN XA uthclients using
passwords. IKE Phase 1 authentication i s done with an IKE preshared key; the user is then prompted to enter their
usernameand password which is verified with the internal database on the controller.
Ont heco ntroller,you need to configure the following:
1. Add entries forCi sco VPN XAuth clients to the controller’si nternaldatabase, For details on configuringan
authentication server,s ee "Authentication Servers"on page 1 68
NOTE:For each cli ent, youneed to create an entry in the internal database with the entire Principal name (Subj ectAltnamei n X.509
certificates)or Common Nam e asi tappears on the certificate.
2. Verify that the server with the client data is part of the servergroup associat edw ith the VPN authentication
profile.
3. Configureot herVP N settings as described in "Configuring a VPN for L2TP /IPsec with IKEv2 inthe WebUI" on
page 279, while ensuringthat thefollowing settings are selected:
lIn the L2TP and XAUTH Parameters section ofthe Configuration>VPN Services>IPSEC tab, enable
L2TP.
lIn the L2TP and XAUTH Parameters section ofthe Configuration>VPN Services>IPSEC tab, enable
XAuth to enable prompting for the username andpassw ord.
lThe IKE policy must have pre-shared authentication.
The followingexample configures a VPN for XAuth IKEv1 clients using a username and passwords.A ccess the
command-lineinterface and issue the following commands in config mode:
(host)(config) #aaa authentication vpn default
server-group internal
crypto-local isakmp xauth
(host)(config) #vpdn group l2tp
enable
client dns 101.1.1.245
(host)(config) #ip local pool pw-clients 10.1.1.1 10.1.1.250
(host)(config) #crypto isakmp key 0987654 address 0.0.0.0 netmask 0.0.00
(host)(config) #crypto isakmp policy 1
authentication pre-share
Enter the following commandi n enablemode to configure client entries in the internal database:
(host)(config) #local-userdb add username <name> password <password>
Working with Rem ote Access VPNs for PPTP
Point-to-Point Tunneling Protocol (PPTP) i s an alternative to L2TP/IPsec. Like L2TP/IPsec, P PTP provides a
logical transportmechanism to send PPP frames as well as tunnelingor encapsulation so that the PPP frames can be
sent across an IP network. PPTP relies on the PPP connection process toperform user authentication and protocol
configuration.
DellPowerConnect W- Series ArubaOS 6.2 | UserGuide VirtualPrivate Networks | 287