Web: Example for Configuring L2TP over IPSec to Allow Mobile Users to Access the Headquarters Using Mac OS X Terminals
L2TP over IPSec VPN allows mobile employees to dial up to the headquarters (HQ) server using the Mac OS X L2TP client.
Networking Requirements
The LAC client directly initiates a connection request to the LNS. The LAC client and LNS negotiate an IPSec tunnel, and perform L2TP negotiation to authenticate the user's identity and establish an L2TP over IPSec tunnel. The data between the LAC client and the LNS is transmitted through the tunnel. Layer-2 data is encapsulated using L2TP and then the data is encrypted using IPSec.
Data Planning
Item |
Data |
---|---|
LNS |
Interface: GigabitEthernet 1/0/1 IP address: 1.1.1.2/24 |
Interface: GigabitEthernet 1/0/3 IP address: 192.168.1.1/24 |
|
IP address and user for L2TP IP pool 1 Address pool: 10.1.1.2-10.1.1.100 User name: macpc User authentication password: Hello123 |
|
IPSec configuration Security protocol: ESP IKE authentication algorithm: sha1 IKE encryption algorithm: 3des ESP authentication algorithm: sha1 ESP encryption algorithm: 3des Pre-Shared Key: Admin@123 Local ID: IP Address Peer ID: Any Type |
|
LAC |
Server Address: 1.1.1.2 Account Name: macpc User Authentication Password: Hello123 Shared Secret: Admin@123 |
Configuration Roadmap
- Complete basic configurations, including the configurations of interfaces, security policies, and routes.
- Complete the L2TP over IPSec configuration on FW.
- On mobile employee's PC, complete the configurations. The parameters on the PC must match those on the FW.
Procedure
- Configure the LNS.
- Configure a route on the HQ server.
To communicate with mobile employees, the HQ server must have a route to the L2TP address pool, with the next hop pointing to the LAN interface address of the FW.
- Configure the mobile employee's PC.
Configuration Verification
Click Connect to set up a VPN tunnel.
After the VPN tunnel is set up, the connection status changes, as shown in the following figure. The displayed information shows that the VPN connection is Connected, the connection duration is 00:00:39, and the IP address assigned to the LAC client is 10.1.1.2. To terminate the VPN connection, click Disconnect.
After the dial-up succeeds, check the L2TP tunnel setup status on the LNS.
Check the IPSec tunnel establishment on the LNS. If the following information is displayed, the IPSec tunnel is established.
Configuration Scripts
# l2tp enable l2tp domain suffix-separator @ # acl number 3001 rule 5 permit udp source-port eq 1701 # ike proposal pro91165721597 encryption-algorithm 3des authentication-algorithm sha1 dh group2 # ike peer ike91165721597 local-id-type ip pre-shared-key %$%$Z1}*8w'rH;MD;%$%$ ike-proposal pro91165721597 # ipsec proposal prop91165721597 esp authentication-algorithm sha1 esp encryption-algorithm 3des # ipsec policy-template tpl91165721597 1 security acl 3001 ike-peer ike91165721597 alias policy_ipsec scenario point-to-multipoint l2tp-user-access proposal prop91165721597 # ipsec policy ipsec9116572166 10000 isakmp template tpl91165721597 # interface GigabitEthernet1/0/1 ip address 1.1.1.2 255.255.255.0 ipsec policy ipsec9116572166 # interface GigabitEthernet1/0/3 ip address 192.168.1.1 255.255.255.0 # interface Virtual-Template1 ppp authentication-mode chap pap remote service-scheme l2tpSScheme_1445251722019 ip address 10.1.1.2 255.255.255.0 alias L2TP_LNS_0 # firewall zone trust set priority 85 add interface GigabitEthernet1/0/3 add interface Virtual-Template1 # firewall zone untrust set priority 5 add interface GigabitEthernet1/0/1 # l2tp-group 1 allow l2tp virtual-template 1 undo tunnel authentication # ip pool pool1 section 1 10.1.1.2 10.1.1.100 # aaa authentication-scheme default authentication-mode local # domain default authentication-schem default service-scheme l2tp # security-policy rule name policy_ipsec_1 source-zone untrust destination-zone trust source-address range 10.1.1.2 10.1.1.100 destination-address 192.168.1.0 24 action permit rule name policy_ipsec_2 source-zone trust destination-zone untrust source-address range 192.168.1.0 24 destination-address 10.1.1.2 10.1.1.100 action permit rule name policy_ipsec_3 source-zone untrust destination-zone local destination-address 1.1.1.2 32 action permit # The following user/group creation configuration is stored in the database, but not in the configuration profile. user-manage user vpdnuser domain default password *********