Client Setup; Installing Certificates; Testing Vpn Session Setup - Symbol WS5000 Series System Reference Manual

Hide thumbs Also See for WS5000 Series:
Table of Contents

Advertisement

WS5000.(Cfg).wvpn> enable
The expected output of this command is
Enabling...
Status : Success.
WVPN Management:
WVPN available
WVPN Status
WVPN Server Address
WVPN Server Port
WVPN Unused session timeout
WVPN Debug level
WVPN DOS Support
WVPN DOS Port
WVPN Client keep alive
WVPN Maximum VPN Licenses
WVPN Currently In-Use VPN Licenses
WVPN License Type : Evaluation version,Total eval days 30,Eval days left
30

12.3.4 Client Setup

Open Mobile Companion on the client and create a new profile and enter a valid ESSID in the ESSID field.
Set the IP Config tab to DHCP and encryption to Open System to enable WEP encryption on the server side. Set
the Operating mode to infrastructure and the country code to USA.

12.3.4.1 Installing Certificates

Transfer the CA Certificate using ActiveSync (or any other program ) to a hand-held and import these
certificates in the VPN client. You can import the certificates by clicking on
AirBeam->Certificates>CA Certificates menu
Click Import and browse for the folder where the certificates were transferred during ActiveSync transfer.
Click on the Certificate to install the certificates on the hand-held. Repeat the process for all the certificates
that need to be imported.

12.3.5 Testing VPN Session Setup

Open the Mobile Companion and connect it to a switch (via the access port). This establishes a basic IP
connectivity via the WLAN and the client can obtain the outer IP address via DHCP (The range is between
10.1.1.102 to 10.1.1.110). You can now ping the public interface (In this case it is 10.1.1.101) of the switch from
the Mobile Companion in the hand-held.
To establish the VPN connection, open Air Beam and go to AirBeam->Profiles->Settings and set the VPN
server address in the Air Beam to point to the VPN Server. Change the Host to
9102
.Then establish the VPN connection using AirBeam->Connect option.
A successful authentication will create a virtual interface which will give access to the trusted network. This
provides access to the private interface/network of the switch.
Once the sessions are established use the config show sessions command to examine the established VPN
sessions. You should be able to see all VPN sessions established in the switch using following CLI command:
Configuring the WS5100 WTLS VPN
: true
: Started
: 10.1.1.101 / 10.0.1.73
: 9102
: 48h 0m (172800 secs)
: Debug Info Disabled
: no
: 9103
: 10 seconds
: 250
: 0
10.1.1.101
12-17
and Port to

Advertisement

Table of Contents
loading

Table of Contents