3Com Switch 8800 Family IPsec Module Configuration and Command reference Guide
138 CHAPTER 9: CONFIGURATION OF GRE
<3Com_A> secblade slot 2 (Both the default user name and password ar
e SecBlade)
user: SecBlade
password: SecBlade
<secblade_A> system-view
# Create the sub-interface.
[secblade_A] interface g0/0.1GigabitEthernet 0/0.1
[secblade_A-GigabitEthernet0/0.1] vlan-type dot1q vid 30
[secblade_A-GigabitEthernet0/0.1] ip address 30.0.0.254 24
[secblade_A-GigabitEthernet0/0.1] quit
[secblade_A] interface GigabitEthernet 0/0.2
[secblade_A-GigabitEthernet0/0.2] vlan-type dot1q vid 50
[secblade_A-GigabitEthernet0/0.2] ip address 50.0.0.254 24
[secblade_A-GigabitEthernet0/0.2] quit
# Create the Tunnel interface.
[secblade_A] interface Tunnel 0
# Configure the Tunnel IP address.
[secblade_A-Tunnel0] ip address 100.0.0.1 24
# Configure Tunnel encapsulation mode.
[secblade_A-Tunnel0] tunnel-protocol gre
# Configure the source address of the Tunnel.
[secblade_A-Tunnel0] source 50.0.0.254
# Configure the destination address of the Tunnel.
[secblade_A-Tunnel0] destination 60.0.0.254
[secblade_A-Tunnel0] quit
# Add the virtual interface to the Trust zone (applicable to only the firewall card).
[secblade_A] firewall zone untrust
[secblade_A-zone-untrust] add interface Tunnel 0
[secblade_A-zone-untrust] quit
# Configure the static route passing by the Tunnel.
[secblade_A] ip route-static 20.0.0.0 24 Tunnel 0
[secblade_A] ip route-static 10.0.0.0 24 30.0.0.1
[secblade_A] ip route-static 0.0.0.0 0 50.0.0.1
# Quit IPsec module configuration view.
[secblade_A] quit
<secblade_A> quit
[3Com_A]
5 3Com_B(secblade_B)