Specifications

4-6
VPN 3000 Series Concentrator Getting Started
78-15733-03
Chapter 4 Using the Command-Line Interface for Quick Configuration
Configuring Address Assignment
Step 3 The system prompts you to enable or disable L2TP.
1) Enable L2TP
2) Disable L2TP
Quick -> [ 1 ]
At the cursor, enter 2 to disable L2TP, or press Enter to accept the default (1), which enables L2TP.
Step 4 If you enable L2TP, the system prompts you to select the encryption option.
L2TP Encryption Required—L2TP connections must use Microsoft encryption to encrypt data. This
option requires MS-CHAP (Microsoft Challenge-Handshake Authentication Protocol) and provides
maximum security. During connection setup, clients must agree to use encryption or they will not
be connected.
No Encryption Required—L2TP connections may use Microsoft encryption to encrypt data. During
connection setup, clients might or might not agree to use Microsoft encryption; they will be
connected in either case.
1) L2TP Encryption Required
2) No Encryption Required
Quick -> [ 2 ] _
At the cursor, enter 1 to require encryption, or press Enter to accept the default (2), which does not
require encryption.
Step 5 The system prompts you to enable or disable IPSec.
1) Enable IPSec
2) Disable IPSec
Quick -> [ 1 ] _
At the cursor, enter 2 to disable IPSec, or press Enter to accept the default (1), which enables IPSec.
Step 6 The system prompts you to enable or disable WebVPN. WebVPN allows remote users to access the
corporate network from any computer with an Internet connection to use e-mail, files, or internal
websites.
1) Enable WebVPN
2) Disable WebVPN
Quick -> [ 1 ] _
At the cursor, enter 2 to disable WebVPN, or press Enter to accept the default (1), which enables
WebVPN.
Configuring Address Assignment
Configuring address assignment applies, and its menus appear, only when you enable at least one
tunneling protocol. If you disabled all protocols, skip to the “Configuring Authentication” section on
page 4-8.
This section lets you configure prioritized methods for assigning IP addresses to clients as a tunnel is
established. The methods are configured, and used, in this order:
Client specified—the client specifies its own IP address.