PDN Gateway Configuration
The output from this command should look similar to the sample shown below. In this example P-GW service
named
Configuring Dynamic Node-to-Node IP Security on the S5 Interface
The configuration example in this section creates an IPSec/IKEv2 dynamic node-to-node tunnel endpoint on the S5
interface.
Important:
or Support representative for information on how to obtain a license.
The following configuration examples are included in this section:
Creating and Configuring an IPSec Transform Set
Creating and Configuring an IKEv2 Transform Set
Creating and Configuring a Crypto Template
Binding the S5 IP Address to the Crypto Template
Creating and Configuring an IPSec Transform Set
The following example configures an IPSec transform set, which is used to define the security association that
determines the protocols used to protect the data on the interface:
configure
was configured in the
PGW1
Service name:
Context:
Associated PGW svc:
Associated GTPU svc:
Accounting Context Name:cn1
dns-client Context Name:cn1
Authorize:
Fqdn-name:
Bind:
Local IP Address:
Self PLMN:
Retransmission Timeout: 5 (secs)
Use of the IP Security feature requires that a valid license key be installed. Contact your local Sales
context.
vpn1
pgw1
cn1
None
None
hss
xyz.abc@starent.networks.com
Not Done
0.0.0.0
Not defined
Cisco ASR 5x00 Packet Data Network Gateway Administration Guide ▄
Configuring Optional Features on the P-GW ▀
Local IP Port:
2123
185