Example 9.11. Setting up an L2TP server
This example shows how to setup a L2TP Network Server. The example assumes that you have created some IP
address objects. You will have to specify the IP address of the L2TP server interface, an outer IP address (that
the L2TP server should listen to) and an IP pool that the L2TP server will use to give out IP addresses to the
clients from.
Command-Line Interface
gw-world:/> add Interface L2TPServer MyL2TPServer ServerIP=ip_l2tp
Interface=any IP=wan_ip
IPPool=L2TP_Pool TunnelProtocol=L2TP
AllowedRoutes=all-nets
Web Interface
1.
Go to Interfaces > L2TP Servers > Add > L2TPServer
2.
Enter a suitable name for the L2TP Server, for example MyL2TPServer
3.
Now enter:
•
Inner IP Address: ip_l2tp
•
Tunnel Protocol: L2TP
•
Outer Interface Filter: any
•
Outer Server IP: wan_ip
4.
Under the PPP Parameters tab, select L2TP_Pool in the IP Pool control.
5.
Under the Add Route tab, select all_nets in the Allowed Networks control.
6.
Click OK
Use User Authentication Rules is enabled as default. To be able to authenticate users using the PPTP tunnel, it
is necessary to configure NetDefendOS Authentication Rules but that is not covered in this example.
Example 9.12. Setting up an L2TP Tunnel Over IPsec
This example shows how to setup a fully working L2TP Tunnel based on IPsec encryption and will cover many
parts of basic VPN configuration.
Before starting, it is necessary to configure some address objects, for example the network that is going to be
assigned to the L2TP clients. Proposal lists and PSK are needed as well. Here we will use the objects created in
previous examples.
To be able to authenticate the users using the L2TP tunnel a local user database will be used.
A. Start by preparing a new Local User Database:
Command-Line Interface
gw-world:/> add LocalUserDatabase UserDB
gw-world:/> cc LocalUserDatabase UserDB
gw-world:/UserDB> add User testuser Password=mypassword
Web Interface
9.5.2. L2TP Servers
Chapter 9. VPN
433
Summary of Contents for DFL-1600 - Security Appliance
Page 27: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 27 ...
Page 79: ...2 7 3 Restore to Factory Defaults Chapter 2 Management and Maintenance 79 ...
Page 146: ...3 9 DNS Chapter 3 Fundamentals 146 ...
Page 227: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 227 ...
Page 241: ...5 4 IP Pools Chapter 5 DHCP Services 241 ...
Page 339: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 339 ...
Page 360: ...7 4 7 SAT and FwdFast Rules Chapter 7 Address Translation 360 ...
Page 382: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 382 ...
Page 386: ... The TLS ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 386 ...
Page 439: ...Figure 9 3 PPTP Client Usage 9 5 4 PPTP L2TP Clients Chapter 9 VPN 439 ...
Page 450: ...9 7 6 Specific Symptoms Chapter 9 VPN 450 ...
Page 488: ...10 4 6 Setting Up SLB_SAT Rules Chapter 10 Traffic Management 488 ...
Page 503: ...11 6 HA Advanced Settings Chapter 11 High Availability 503 ...
Page 510: ...12 3 5 Limitations Chapter 12 ZoneDefense 510 ...
Page 533: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 533 ...