Specifications

3-10
VPN 3000 Series Concentrator Getting Started
78-15733-03
Chapter 3 Using the VPN Concentrator Manager for Quick Configuration
Configuring Address Assignment
Don’t Require Encryption—PPTP connections may use Microsoft encryption to encrypt data (the
default). During connection setup, clients may or may not agree to use Microsoft encryption; they
will be connected in either case.
Step 3 Check L2TP to enable Layer 2 Tunneling Protocol. (This box is checked by default.)
Step 4 If you enable L2TP, click one of the radio buttons to select the encryption option:
Require Encryption—L2TP connections must use Microsoft encryption to encrypt data. This option
requires MS-CHAP and provides maximum security. During connection setup, clients must agree to
use encryption or they will not be connected.
Don’t Require Encryption—L2TP connections may use Microsoft encryption to encrypt data (the
default). During connection setup, clients may or may not agree to use Microsoft encryption; they
will be connected in either case.
Step 5 Check IPSec to enable remote-access user connections using Internet Protocol Security protocol. (This
box is checked by default.) This option supports only remote-access IPSec connections from the VPN
3000 Client or a similar protocol-compliant client. To configure IPSec LAN-to-LAN connections, see
Configuration | System | Tunneling Protocols | IPSec LAN-to-LAN under regular system configuration.
Step 6 Check WebVPN to enable remote-access user connections via SSL using a web browser or e-mail client.
Step 7 Click Continue to proceed.
If you enable none of the protocols, skip to the section on Changing Admin Password, page 3-21.
If you enable at least one protocol, continue to the next section.
Configuring Address Assignment
The Manager displays the Configuration | Quick | Address Assignment screen. This screen appears only
when you enable at least one tunneling protocol.
Figure 3-7 Configuration | Quick | Address Assignment Screen
Here you select the methods for assigning IP addresses to clients during tunnel establishment. The VPN
Concentrator tries these methods in the order listed.
To select a method, follow these steps.