2.
Enter a name for the L2TP tunnel, for example l2tp_tunnel
3.
Now enter:
•
Inner IP Address: lan_ip
•
Tunnel Protocol: L2TP
•
Outer Interface Filter: l2tp_ipsec
•
Server IP: wan_ip
4.
Under the PPP Parameters tab, check the Use User Authentication Rules control
5.
Select l2tp_pool in the IP Pool control
6.
Under the Add Route tab, select all-nets in the Allowed Networks control
7.
In the ProxyARP control, select the lan interface
8.
Click OK
In order to authenticate the users using the L2TP tunnel, a user authentication rule needs to be configured.
D. Next will be setting up the authentication rules:
CLI
gw-world:/> add UserAuthRule AuthSource=Local Interface=l2tp_tunnel
OriginatorIP=all-nets LocalUserDB=UserDB agent=PPP TerminatorIP=wan_ip
name=L2TP_Auth
Web Interface
1.
Go to User Authentication > User Authentication Rules > Add > UserAuthRule
2.
Enter a suitable name for the rule, for example L2TP_Auth
3.
Now enter:
•
Agent: PPP
•
Authentication Source: Local
•
Interface: l2tp_tunnel
•
Originator IP: all-nets
•
Terminator IP: wan_ip
4.
Under the Authentication Options tab enter UserDB as the Local User DB
5.
Click OK
When the other parts are done, all that is left is the rules. To let traffic through from the tunnel, two IP rules should
be added.
E. Finally, set up the rules:
CLI
First, change the current category to be the main IP rule set:
gw-world:/> cc IPRuleSet main
Now, add the IP rules:
gw-world:/main> add IPRule action=Allow Service=all_services
SourceInterface=l2tp_tunnel SourceNetwork=l2tp_pool
DestinationInterface=any DestinationNetwork=all-nets name=AllowL2TP
gw-world:/main> add IPRule action=NAT Service=all_services
SourceInterface=l2tp_tunnel SourceNetwork=l2tp_pool
9.5.2. L2TP Servers
Chapter 9. VPN
367
Содержание 800 - DFL 800 - Security Appliance
Страница 24: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 24 ...
Страница 69: ...2 6 4 Restore to Factory Defaults Chapter 2 Management and Maintenance 69 ...
Страница 121: ...3 9 DNS Chapter 3 Fundamentals 121 ...
Страница 166: ...interfaces without an overriding IGMP Setting Default 1 000 4 6 4 Advanced IGMP Settings Chapter 4 Routing 166 ...
Страница 181: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 181 ...
Страница 192: ...5 5 IP Pools Chapter 5 DHCP Services 192 ...
Страница 282: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 282 ...
Страница 300: ...mechanism 7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 300 ...
Страница 301: ...7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 301 ...
Страница 303: ... Changed on a regular basis such as every three months 8 1 Overview Chapter 8 User Authentication 303 ...
Страница 318: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 318 ...
Страница 322: ...ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 322 ...
Страница 377: ...Management Interface Failure with VPN Chapter 9 VPN 377 ...
Страница 408: ...10 4 6 SLB_SAT Rules Chapter 10 Traffic Management 408 ...
Страница 419: ...11 5 HA Advanced Settings Chapter 11 High Availability 419 ...
Страница 426: ...12 3 5 Limitations Chapter 12 ZoneDefense 426 ...
Страница 449: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 449 ...