hit counter script

Configuring Dynamic Node-To-Node Ip Security On The S5 Interface; Creating And Configuring An Ipsec Transform Set - Cisco ASR 5x00 Administration Manual

Packet data network gateway
Hide thumbs Also See for ASR 5x00:
Table of Contents

Advertisement

PDN Gateway Configuration
The output from this command should look similar to the sample shown below. In this example P-GW service
named

Configuring Dynamic Node-to-Node IP Security on the S5 Interface

The configuration example in this section creates an IPSec/IKEv2 dynamic node-to-node tunnel endpoint on the S5
interface.
Important:
or Support representative for information on how to obtain a license.
The following configuration examples are included in this section:

Creating and Configuring an IPSec Transform Set

Creating and Configuring an IKEv2 Transform Set
Creating and Configuring a Crypto Template
Binding the S5 IP Address to the Crypto Template
Creating and Configuring an IPSec Transform Set
The following example configures an IPSec transform set, which is used to define the security association that
determines the protocols used to protect the data on the interface:
configure
was configured in the
PGW1
Service name:
Context:
Associated PGW svc:
Associated GTPU svc:
Accounting Context Name:cn1
dns-client Context Name:cn1
Authorize:
Fqdn-name:
Bind:
Local IP Address:
Self PLMN:
Retransmission Timeout: 5 (secs)
Use of the IP Security feature requires that a valid license key be installed. Contact your local Sales
context.
vpn1
pgw1
cn1
None
None
hss
xyz.abc@starent.networks.com
Not Done
0.0.0.0
Not defined
Cisco ASR 5x00 Packet Data Network Gateway Administration Guide ▄
Configuring Optional Features on the P-GW ▀
Local IP Port:
2123
185

Advertisement

Table of Contents
loading

Table of Contents