Configuring an L2TPv3 VPN Tunnel
The Layer 2 Tunneling Protocol version 3 (L2TPv3) feature allows Instant Access Point (IAP) to act as L2TPLayer-2 Tunneling Protocol. L2TP is a networking protocol used by the ISPs to enable VPN operations. Access Concentrator (LAC) and tunnel all wireless clients L2 traffic from AP to LNSL2TP Network Server. LNS is an equipment that connects to a carrier and handles the sessions from broadband lines. It is also used for dial-up and mobile links. LNS handles authentication and routing of the IP addresses. It also handles the negotiation of the link with the equipment and establishes a session.. In a centralized L2 model, the VLANVirtual Local Area Network. In computer networking, a single Layer 2 network may be partitioned to create multiple distinct broadcast domains, which are mutually isolated so that packets can only pass between them through one or more routers; such a domain is referred to as a Virtual Local Area Network, Virtual LAN, or VLAN. on the corporate side are extended to remote branch sites. Wireless clients associated with IAP gets the IP address from the DHCPDynamic Host Configuration Protocol. A network protocol that enables a server to automatically assign an IP address to an IP-enabled device from a defined range of numbers configured for a given network. server running on LNS. For this, AP has to transparently allow DHCP transactions through the L2TPv3 tunnel.
To configure an L2TPv3 tunnel by using Aruba Central (on-premises), complete the following steps:
- In the
The dashboard context for the group is displayed.
app, set the filter to a group containing at least one AP. - Under
A list of APs is displayed in the
view.
, click > . - Click the
The tabs to configure the APs are displayed.
icon. - Click .
- Click the tab.
- Click the accordion.
- In the Protocol drop-down list, select .
- To configure a tunnel profile, complete the following steps:
- Turn on the toggle switch.
- Enter the profile name in the text-box.
- Enter the primary server IP address in the text-box.
- Enter the remote end backup tunnel IP address in the text-box. This is an optional field and is required only when backup server is configured.
- Enter the peer UDPUser Datagram Protocol. UDP is a part of the TCP/IP family of protocols used for data transfer. UDP is typically used for streaming media. UDP is a stateless protocol, which means it does not acknowledge that the packets being sent have been received. port numbers in the text-box. The default value is 1701.
- Enter the local UDP port numbers in the text-box. The default value is 1701.
- Enter the interval in the text-box at which the hello packets are sent through the tunnel. The default value is 60 seconds.
- Select the message digest as MD5Message Digest 5. The MD5 algorithm is a widely used hash function producing a 128-bit hash value from the data input. or SHASecure Hash Algorithm. SHA is a family of cryptographic hash functions. The SHA algorithm includes the SHA, SHA-1, SHA-2 and SHA-3 variants. from the drop-down list for message authentication.
- Enter a shared key in the text-box for the message digest. This key should match with the tunnel end point shared key.
- Ensure that check-box is enabled.
- Specify a tunnel MTUMaximum Transmission Unit. MTU is the largest size packet or frame specified in octets (eight-bit bytes) that can be sent in networks such as the Internet. value in the MTU check-box. The default value is 1460.
- To configure a session profile, complete the following steps:
- Turn on the toggle switch.
- Enter the session profile name.
- Enter the tunnel profile name where the session will be associated.
- Configure the tunnel IP address with the corresponding network mask and VLAN ID. This is required to reach an AP from a corporate network. For example, SNMPSimple Network Management Protocol. SNMP is a TCP/IP standard protocol for managing devices on IP networks. Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks, and more. It is used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention. polling.
- Select the cookie length and enter a cookie value corresponding to the length. By default, the cookie length is not set.
- From the drop-down list, select the branch name.
- Click .