Step 1 |
enable
|
Enables privileged EXEC mode.
|
Step 2 |
configure
terminal
Router# configure terminal
|
Enters global configuration mode.
|
Step 3 |
ipv6 multicast-routing
Router(config)# ipv6 multicast-routing
|
Enables multicast routing using Protocol Independent Multicast (PIM) and Multicast Listener Discovery (MLD) on all IPv6-enabled
interfaces of the router and enables multicast forwarding.
|
Step 4 |
ipv6 unicast-routing
Router(config)# ipv6 unicast-routing
|
Enables the forwarding of IPv6 unicast datagrams.
|
Step 5 |
interface
type number
Router(config)# interface tunnel 10
|
Specifies a tunnel interface and number, and enters interface configuration mode.
|
Step 6 |
ipv6 address {ipv6-address/prefix-length |
prefix-name
sub-bits/prefix-length}
Router(config-if)# ipv6 address 0:0:0:7272::72/64
|
Configures an IPv6 address based on an IPv6 general prefix and enables IPv6 processing on an interface.
|
Step 7 |
tunnel mode {aurp |
cayman |
dvmrp |
eon |
gre |
gre multipoint |
gre ip |
gre ipv6 |
ipip [decapsulate-any] |
ipsec ipv4 |
iptalk |
ipv6 |
ipsec ipv6 |
mpls |
nos |
rbscp}
Router(config-if)# tunnel mode gre ip
|
Sets the encapsulation mode for the tunnel interface.
|
Step 8 |
tunnel source {ip-address |
ipv6-address |
interface-typeinterface-number}
Router(config-if)# tunnel source ethernet0
|
Sets the source address for a tunnel interface.
|
Step 9 |
tunnel destination {hostname |
ip-address |
ipv6-address}
Router(config-if)# tunnel destination 172.16.0.12
|
Specifies the destination for a tunnel interface.
|
Step 10 |
exit
|
Exits interface configuration mode and returns to global configuration mode.
|
Step 11 |
crypto isakmp policy
priority
Router(config)# crypto isakmp policy 15
|
Defines an Internet Key Exchange (IKE) policy, and enters ISAKMP policy configuration mode.
|
Step 12 |
authentication {rsa-sig |
rsa-encr |
pre-share}
Router(config-isakmp-policy)# authentication pre-share
|
Specifies the authentication method within an IKE policy.
|
Step 13 |
hash {sha |
md5}
Router(config-isakmp-policy)# hash md5
|
Specifies the hash algorithm within an IKE policy.
|
Step 14 |
group {1 |
2 |
5}
Router(config-isakmp-policy)# group 2
|
Specifies the Diffie-Hellman group identifier within an IKE policy.
|
Step 15 |
encryption {des |
3des |
aes 192 |
aes 256}
Router(config-isakmp-policy)# encryption 3des
|
Specifies the encryption algorithm within an IKE policy.
|
Step 16 |
exit
Router(config-isakmp-policy)# exit
|
Exits ISAKMP policy configuration mode and enters global configuration mode.
|
Step 17 |
crypto
isakmp
key
enc-type-digit
keystring {address
peer-address [mask] |
ipv6 {ipv6-address/ipv6-prefix} |
hostname
hostname} [no-xauth]
Router(config)# crypto isakmp key cisco-10 address 172.16.0.12 255.240.0.0
|
Configures a preshared authentication key.
|
Step 18 |
crypto
ipsec
transform-set
transform-set-name
transform1 [transform2] [transform3] [transform4]
Router(config)# crypto ipsec transform-set myset0 ah-sha-hmac esp-3des
|
|
Step 19 |
access-list
access-list-number [dynamic
dynamic-name [timeout
minutes]] {deny |
permit}
protocol
source
source-wildcard
destination
destination-wildcard [precedence
precedence] [tos
tos] [time-range
time-range-name] [fragments] [log [word] |
log-input [word]]
Router(config)# access-list 110 permit gre host 192.168.0.16 host 172.16.0.12
|
Defines an extended IP access list.
|
Step 20 |
crypto map [ipv6]
map-name
seq-num [ipsec-isakmp [dynamic
dynamic-map-name |
discover |
profile
profile-name]]
Router(config)# crypto map mymap 10 ipsec-isakmp
|
Creates a new crypto map entry or profile and enters crypto map configuration mode.
|
Step 21 |
set peer {hostname [dynamic] [default] |
ip-address [default]}
Router(config-crypto-map)# set peer 10.0.0.1
|
Specifies an IP Security (IPsec) peer in a crypto map entry.
|
Step 22 |
set transform-set
transform-set-name [transform-set-name2...transform-set-name6]
Router(config-crypto-map)# set transform-set myset0
|
Specifies the transform set that can be used with the crypto map entry.
|
Step 23 |
match address [access-list-id |
name]
Router(config-crypto-map)# match address 102
|
Specifies an extended access list for a crypto map entry.
|
Step 24 |
exit
Router(config-crypto-map)# exit
|
Exits crypto map configuration mode and returns to global configuration mode.
|
Step 25 |
interface
type number
Router(config)# interface ethernet 1
|
Specifies an interface and number and enters interface configuration mode.
|
Step 26 |
crypto map
map-name [redundancy
standby-group-name [stateful]]
Router(config-if)# crypto map mymap
|
Applies a previously defined crypto map set to an outbound interface.
|
Step 27 |
end
|
Exits interface configuration mode and returns to privileged EXEC mode.
|