3Com Switch 8800 Family IPsec Module Configuration and Command reference Guide

DVPN Configuration Example 225
[secblade_Srv] interface tunnel 0
[secblade_Srv-Tunnel0] tunnel-protocol udp dvpn
[secblade_Srv-Tunnel0] dvpn interface-type server
[secblade_Srv-Tunnel0] ip address 192.168.0.254 255.255.255.0
[secblade_Srv-Tunnel0] source GigabitEthernet0/0.2
[secblade_Srv-Tunnel0] dvpn dvpn-id 1
[secblade_Srv-Tunnel0] dvpn policy 1
[secblade_Srv-Tunnel0] quit
# Configure route information.
[secblade_Srv] ip route-static 10.0.0.0 255.255.255.0 192.168.0.1
[secblade_Srv] ip route-static 20.0.0.0 255.255.255.0 192.168.0.2
2 Configure client 1
Switch 8800 Family switches
# Divide VLANs.
<SW8800> system-view
[SW8800] vlan 10
[3Com-vlan10] quit
[SW8800] vlan 30
[3Com-vlan30] quit
[SW8800] vlan 50
[3Com-vlan50] quit
# Configure the IP address.
[SW8800] interface vlan-interface 10
[3Com-Vlan-interface10] ip address 10.0.0.254 24
[3Com-Vlan-interface10] quit
[SW8800] interface vlan-interface 30
[3Com-Vlan-interface30] ip address 30.0.0.1 24
[3Com-Vlan-interface30] quit
# Configure the static route.
[SW8800] ip route-static 0.0.0.0 0 30.0.0.254
# Configure aggregation of two GigabitEthernet interfaces of the IPsec module
(the IPsec module slot number is 2).
[SW8800] secblade aggregation slot 2
# Create the SecBlade test.
[SW8800] secblade test
# Specify the SecBlade interface VLAN.
[3Com-secblade-test] secblade-interface vlan-interface 30
# Set the protected VLAN.
[3Com-secblade-test] security-vlan 50