392 
[Hub1-ospf-1-area-0.0.0.0] network 192.168.0.0 0.0.0.255 
[Hub1-ospf-1-area-0.0.0.0] quit 
[Hub1-ospf-1] quit 
5.  Configure GRE-mode IPv4 ADVPN tunnel interface tunnel1. 
[Hub1] interface tunnel1 mode advpn gre 
[Hub1-Tunnel1] ip address 192.168.0.1 255.255.255.0 
[Hub1-Tunnel1] vam client Hub1 
[Hub1-Tunnel1] ospf network-type p2mp 
[Hub1-Tunnel1] source gigabitethernet 2/0/1 
[Hub1-Tunnel1] tunnel protection ipsec profile abc 
[Hub1-Tunnel1] quit 
Configuring Hub 2 
1.  Configure IP addresses for the interfaces. (Details not shown.) 
2.  Configure the VAM client: 
# Create VAM client Hub2. 
<Hub2> system-view 
[Hub2] vam client name Hub2 
# Specify ADVPN domain abc for the VAM client. 
[Hub2-vam-client-Hub2] advpn-domain abc 
# Set the pre-shared key to 123456. 
[Hub2-vam-client-Hub2] pre-shared-key simple 123456 
# Set both the username and password to hub2. 
[Hub2-vam-client-Hub2] user hub2 password simple hub2 
# Specify the primary and secondary VAM servers. 
[Hub2-vam-client-Hub2] server primary ip-address 1.0.0.11 
[Hub2-vam-client-Hub2] server secondary ip-address 1.0.0.12 
# Enable the VAM client. 
[Hub2-vam-client-Hub2] client enable 
[Hub2-vam-client-Hub2] quit 
3.  Configure an IPsec profile: 
# Configure IKE. 
[Hub2] ike keychain abc 
[Hub2-ike-keychain-abc] pre-shared-key address 0.0.0.0 0.0.0.0 key simple 123456 
[Hub2-ike-keychain-abc] quit 
[Hub2] ike profile abc 
[Hub2-ike-profile-abc] keychain abc 
[Hub2-ike-profile-abc] quit 
# Configure the IPsec profile. 
[Hub2] ipsec transform-set abc 
[Hub2-ipsec-transform-set-abc] encapsulation-mode transport 
[Hub2-ipsec-transform-set-abc] esp encryption-algorithm des-cbc 
[Hub2-ipsec-transform-set-abc] esp authentication-algorithm sha1 
[Hub2-ipsec-transform-set-abc] quit 
[Hub2] ipsec profile abc isakmp 
[Hub2-ipsec-profile-isakmp-abc] transform-set abc 
[Hub2-ipsec-profile-isakmp-abc] ike-profile abc 
[Hub2-ipsec-profile-isakmp-abc] quit