391 
[PrimaryServer-vam-server-domain-abc] authentication-method chap 
# Enable the VAM server for the ADVPN domain. 
[PrimaryServer-vam-server-domain-abc] server enable 
[PrimaryServer-vam-server-domain-abc] quit 
Configuring the secondary VAM server 
# Configure the secondary VAM server in the same way that the primary server is configured. 
(Details not shown.) 
Configuring Hub 1 
1.  Configure IP addresses for the interfaces. (Details not shown.) 
2.  Configure the VAM client: 
# Create VAM client Hub1. 
<Hub1> system-view 
[Hub1] vam client name Hub1 
# Specify ADVPN domain abc for the VAM client. 
[Hub1-vam-client-Hub1] advpn-domain abc 
# Set the pre-shared key to 123456. 
[Hub1-vam-client-Hub1] pre-shared-key simple 123456 
# Set both the username and password to hub1. 
[Hub1-vam-client-Hub1] user hub1 password simple hub1 
# Specify the primary and secondary VAM servers. 
[Hub1-vam-client-Hub1] server primary ip-address 1.0.0.11 
[Hub1-vam-client-Hub1] server secondary ip-address 1.0.0.12 
# Enable the VAM client. 
[Hub1-vam-client-Hub1] client enable 
[Hub1-vam-client-Hub1] quit 
3.  Configure an IPsec profile: 
# Configure IKE. 
[Hub1] ike keychain abc 
[Hub1-ike-keychain-abc] pre-shared-key address 0.0.0.0 0.0.0.0 key simple 123456 
[Hub1-ike-keychain-abc] quit 
[Hub1] ike profile abc 
[Hub1-ike-profile-abc] keychain abc 
[Hub1-ike-profile-abc] quit 
# Configure the IPsec profile. 
[Hub1] ipsec transform-set abc 
[Hub1-ipsec-transform-set-abc] encapsulation-mode transport 
[Hub1-ipsec-transform-set-abc] esp encryption-algorithm des-cbc 
[Hub1-ipsec-transform-set-abc] esp authentication-algorithm sha1 
[Hub1-ipsec-transform-set-abc] quit 
[Hub1] ipsec profile abc isakmp 
[Hub1-ipsec-profile-isakmp-abc] transform-set abc 
[Hub1-ipsec-profile-isakmp-abc] ike-profile abc 
[Hub1-ipsec-profile-isakmp-abc] quit 
4.  Configure OSPF to advertise the private network. 
[Hub1] ospf 1 
[Hub1-ospf-1] area 0