Users Guide

Dell Networking W-Series Instant 6.4.0.2-4.1 | User Guide VPN Configuration | 210
Chapter 14
VPN Configuration
This chapter describes the following VPN configuration procedures:
l Understanding VPN Features on page 210
l Configuring a Tunnel from a W-IAP to Dell Networking W-Series Mobility Controller on page 210
l Configuring Routing Profiles on page 221
Understanding VPN Features
As W-IAPs use a Virtual Controller architecture, the W-IAP network does not require a physical controller to provide
the configured WLAN services. However, a physical controller is required for terminating Virtual Private Networks
(VPN) tunnels from the W-IAP networks at branch locations to datacenters, where the Dell controller acts as a VPN
concentrator.
When the VPNis configured, the W-IAP acting as the Virtual Controller creates a VPN tunnel to a Dell Networking
W-Series mobility controller in your corporate office. The controller acts as a VPN end-point and does not supply the
W-IAP with any configuration.
The VPNfeatures are recommended for:
l Enterprises with many branches that do not have a dedicated VPN connection to the corporate office.
l Branch offices that require multiple APs.
l Individuals working from home, connecting to the VPN.
The survivability feature of W-IAPs with the VPN connectivity of W-IAPs allows you to provide corporate
connectivity on non-corporate networks.
Configuring a Tunnel from a W-IAP to Dell Networking W-Series
Mobility Controller
W-IAP supports the configuration of tunneling protocols such as Generic Routing Encapsulation (GRE), IPsec, and
L2TPv3. This section describes the procedure for configuring VPN host settings on a W-IAP to enable
communication with a controller in a remote location:
l Configuring an IPSec Tunnel on page 210
l Enabling Automatic Configuration of GRETunnel on page 212
l Manually Configuring a GRETunnel on page 214
l Configuring an L2TPv3 Tunnel on page 215
Configuring an IPSec Tunnel
An IPsec tunnel is configured to ensure that the data flow between the networks is encrypted. When configured, the
IPSec tunnel to the controller secures corporate data.
You can configure an IPSec tunnel from Virtual Controller using the Instant UI or CLI.
In the Instant UI
To configure a tunnel using the IPSec protocol:
1. Click the More > VPN link at the top right corner of the Instant UI. The Tunneling window is displayed.