ArubaOS 8.6.0.0Help Center
You are here: Home > Managed Devices > Hub and Spoke VPN Configuration > Configuring VPN Tunnels for Branch Gateways

Configuring VPN Tunnels onManaged Devices

You can configure themanaged devicesto establish aVPNVirtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two.tunnel with theVPNVirtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two.Concentrator using one of the following methods:

By configuring Auto-VPNVirtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two.to automatically establish aVPNVirtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two.隧道的VPNVirtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two.Concentrator by advertising the branch devices.

By configuring aVPNVirtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two.endpoint for themanaged devicesto establish aVPNVirtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two.tunnel.

Configuring Auto-VPN onManaged Devices

The following procedure describes how to configure Auto-VPNVirtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two.using branch advertisement:

1.In theManaged Networknode hierarchy, navigate toConfiguration> Services > VPN.

2.ClickHub and Spoke.

3.Enable the toggle switchHub and Spoke settings.

4.SelectHub (VPNC)inDeployment mode.

5.SelectAutomaticinConnection mode.

6.Enter the same passphrase that is configured on theVPNVirtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two.Concentrator for automatic whitelisting in thePassphrasefield.

7.Re-enter the passphrase inConfirm Passphrasefield.

8.ClickSubmit.

9.ClickPending Changes.

10.In thePending Changeswindow, select the check box and clickDeploy changes.

Configuring VPN Endpoint forManaged Devices

The following procedure describes how to configure a specificVPNVirtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two.endpoint for themanaged devices:

1.In theManaged Networknode hierarchy, navigate toConfiguration> Services > VPN.

2.ClickHub and Spoke.

3.Enable the toggle switchHub and Spoke settings.

4.SelectSpoke (Branch Gateway)inDeployment mode.

5.Select手册inConnection mode.

6.Click+from theHubstable to add the followingVPNVirtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two.Concentrator hub information:

Primary VPNC—Enter theMACMedia Access Control. A MAC address is a unique identifier assigned to network interfaces for communications on a network.address of the primaryVPNVirtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two.Concentrator.

Backup VPNC—(Optional) Enter theMACMedia Access Control. A MAC address is a unique identifier assigned to network interfaces for communications on a network.address of the backupVPNVirtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two.Concentrator.

IP Address—Enter the IP address of theVPNVirtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two.Concentrator.

Source VLAN—Specify the sourceVLAN虚拟瞧cal Area Network. In computer networking, a single Layer 2 network may be partitioned to create multiple distinct broadcast domains, which are mutually isolated so that packets can only pass between them through one or more routers; such a domain is referred to as a Virtual Local Area Network, Virtual LAN, or VLAN.of themanaged deviceif more than one IP address is configured for the sameVPNVirtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two.Concentrator.

加密—Specify the encryption method. It can beFactory CertorCustom Cert.

7.ClickSubmit.

8.ClickPending Changes.

9.In thePending Changeswindow, select the check box and clickDeploy changes.

/*]]>*/
Baidu