Specifications
3-10
VPN 3000 Series Concentrator Getting Started
78-15733-03
Chapter 3 Using the VPN Concentrator Manager for Quick Configuration
Configuring Address Assignment
• Don’t Require Encryption—PPTP connections may use Microsoft encryption to encrypt data (the
default). During connection setup, clients may or may not agree to use Microsoft encryption; they
will be connected in either case.
Step 3 Check L2TP to enable Layer 2 Tunneling Protocol. (This box is checked by default.)
Step 4 If you enable L2TP, click one of the radio buttons to select the encryption option:
• Require Encryption—L2TP connections must use Microsoft encryption to encrypt data. This option
requires MS-CHAP and provides maximum security. During connection setup, clients must agree to
use encryption or they will not be connected.
• Don’t Require Encryption—L2TP connections may use Microsoft encryption to encrypt data (the
default). During connection setup, clients may or may not agree to use Microsoft encryption; they
will be connected in either case.
Step 5 Check IPSec to enable remote-access user connections using Internet Protocol Security protocol. (This
box is checked by default.) This option supports only remote-access IPSec connections from the VPN
3000 Client or a similar protocol-compliant client. To configure IPSec LAN-to-LAN connections, see
Configuration | System | Tunneling Protocols | IPSec LAN-to-LAN under regular system configuration.
Step 6 Check WebVPN to enable remote-access user connections via SSL using a web browser or e-mail client.
Step 7 Click Continue to proceed.
If you enable none of the protocols, skip to the section on Changing Admin Password, page 3-21.
If you enable at least one protocol, continue to the next section.
Configuring Address Assignment
The Manager displays the Configuration | Quick | Address Assignment screen. This screen appears only
when you enable at least one tunneling protocol.
Figure 3-7 Configuration | Quick | Address Assignment Screen
Here you select the methods for assigning IP addresses to clients during tunnel establishment. The VPN
Concentrator tries these methods in the order listed.
To select a method, follow these steps.