Specifications
OmniAccess Reference: AOS-W System Reference
520 Part 031652-00 May 2005
Define rules.
Return to the config prompt.
Apply a role for VPN users.
Set the position of the ACL defined above.
Configuring SecureID Token Caching Using Web
UI
Enter the config-vpdn-l2tp sub-mode.
Enter the following two commands to enable caching and set the period for
which a token will be cached.
N
OTE—When testing securID caching on a VPN with multiple laptops, be sure
the same PIN+token is used on all the laptops. If more than one PIN+token is
used, only the last one will work properly.
(Alcatel)(config-sess-vpn-dst-nat)#any host 192.68.8.1 svc-ike
dst-nat
(Alcatel)(config-sess-vpn-dst-nat)#any host 192.68.8.1 svc-esp
dst-nat
(Alcatel)(config-sess-vpn-dst-nat)#any host 192.68.8.1 svc-l2tp
dst-nat
(Alcatel) (config-sess-vpn-dst-nat)#!
(Alcatel) (config) #user-role logon
(Alcatel) (config-role) #session-acl vpn-dst-nat position 1
2
3
4
5
(Regulus) (config) #vpdn group l2tp
(Regulus) (config-vpdn-l2tp)# ppp authentication CACHE-SECURID
(Regulus) (config-vpdn-l2tp)# ppp securid cache 1440
1
2