Alcatel-Lucent omniaccess User Manual
Configuring Virtual Private Networks
143
C
HAPTER
12
Configuring Virtual Private Networks
The aim of this document is to help users configure VPN using
the web-interface.
the web-interface.
The combination of L2TP and IPSec, known as L2TP/IPSec, is a
highly secure technology for making remote access virtual private
network (VPN) connections across public networks such as the
Internet. In case of wireless, VPN can also be used to further
secure the wireless data from attackers. The Alcatel Mobility
Controllers can be used as a VPN concentrator terminating all
VPN connections from wire and wireless users. For Windows, a
dialer can be downloaded from the switch to auto configure the
tunnel settings on the dialer. This document primarily deals with
the configuration of VPN tunnels – L2TP and PPTP.
highly secure technology for making remote access virtual private
network (VPN) connections across public networks such as the
Internet. In case of wireless, VPN can also be used to further
secure the wireless data from attackers. The Alcatel Mobility
Controllers can be used as a VPN concentrator terminating all
VPN connections from wire and wireless users. For Windows, a
dialer can be downloaded from the switch to auto configure the
tunnel settings on the dialer. This document primarily deals with
the configuration of VPN tunnels – L2TP and PPTP.
VPN Configuration
To configure VPN on the switch, the VPN Authentication method
needs to be enabled first.
needs to be enabled first.
Enabling VPN Authentication
The following pre-requisites must be configured:
z
Role – The role that will be assigned as the default role for
the 802.1x users. (Refer to document on firewall policies
to configure roles).
the 802.1x users. (Refer to document on firewall policies
to configure roles).
z
Derivation rules if present will take precedence over this
setting.
setting.
z
Authentication Server – The authentication server the
switch would use to validate the users. (Refer to docu-
ment on authentication servers for configuration details)
switch would use to validate the users. (Refer to docu-
ment on authentication servers for configuration details)