
255 | IAP-VPN Configuration AOS-W Instant 6.3.1.1-4.0 | User Guide
VPN Configuration
The following VPN configuration steps on the switch, enable OAW-IAPs to terminate their VPN connection on the
switch:
Whitelist Database Configuration
The whitelist database is a list of the MAC addresses of the OAW-IAPs that are allowed to establish VPN
connections with the Mobility Switch. This list can be either stored in the Mobility Switch or on an external server.
Switch Whitelist Database
You can use the following CLI command to configure the whitelist database entry if the switch is acting as the
whitelist database:
(host) #whitelist-db rap add mac-address 00:11:22:33:44:55 ap-group test
The ap-group parameter is not used for any configuration, but needs to be configured. The parameter can be any
valid string.
External Whitelist Database
If an external server is used as the location for the whitelist database, add the MAC addresses of the valid OAW-
IAPs in the external database or external directory server and then configure a RADIUS server to authenticate the
OAW-IAPs using the entries in the external database or external directory server.
If you are using Windows 2003 server, perform the following steps to configure the external whitelist database on it.
There are equivalent steps available for Windows Server 2008 and other RADIUS servers.
1. Add the MAC addresses for all the OAW-IAPs in the Active Directory of the RADIUS server:
a. Open the Active Directory and Computers window, add a new user and specify the MAC address (without
the colon delimiter) of the OAW-IAP for the user name and password.
b. Right-click the user that you have just created and click Properties.
c. In the Dial-in tab, select Allow access in the Remote Access Permission section and click OK.
d. Repeat Step a through Step b for all OAW-IAPs.
2. Define the remote access policy in the Internet Authentication Service:
a. In the Internet Authentication Service window, select Remote Access Policies.
b. Launch the wizard to configure a new remote access policy.
c. Define filters and select grant remote access permission in the Permissions window.
d. Right-click the policy that you have just created and select Properties.
e. In the Settings tab, select the policy condition, and Edit Profile....
f. In the Advanced tab, select Vendor Specific, and click Add to add new vendor specific attributes.
g. Add new vendor specific attributes and click OK.
h. In the IP tab, provide the IP address of the OAW-IAP and click OK.
VPN Local Pool Configuration
The VPN local pool is used to assign an IP Address to the OAW-IAP after successful XAUTH VPN.
(host) # ip local pool "rapngpool" <startip> <endip>
Role Assignment for the Authenticated OAW-IAPs
Define a role that includes a src-nat rule to allow connections to the RADIUS server and for the Dynamic Radius
Proxy in the OAW-IAP to work. This role is assigned to OAW-IAPs after successful authentication.
(host) (config) #ip access-list session iaprole
Kommentare zu diesen Handbüchern