400 
[Hub2-vam-client-Hub2] server secondary ipv6-address 1::12 
# Enable the VAM client. 
[Hub2-vam-client-Hub2] client enable 
[Hub2-vam-client-Hub2] quit 
3.  Configure an IPsec profile: 
# Configure IKE. 
[Hub2] ike keychain abc 
[Hub2-ike-keychain-abc] pre-shared-key address ipv6 :: 0 key simple 123456 
[Hub2-ike-keychain-abc] quit 
[Hub2] ike profile abc 
[Hub2-ike-profile-abc] keychain abc 
[Hub2-ike-profile-abc] quit 
# Configure the IPsec profile. 
[Hub2] ipsec transform-set abc 
[Hub2-ipsec-transform-set-abc] encapsulation-mode transport 
[Hub2-ipsec-transform-set-abc] esp encryption-algorithm des-cbc 
[Hub2-ipsec-transform-set-abc] esp authentication-algorithm sha1 
[Hub2-ipsec-transform-set-abc] quit 
[Hub2] ipsec profile abc isakmp 
[Hub2-ipsec-profile-isakmp-abc] transform-set abc 
[Hub2-ipsec-profile-isakmp-abc] ike-profile abc 
[Hub2-ipsec-profile-isakmp-abc] quit 
4.  Configure OSPFv3. 
[Hub2] ospfv3 1 
[Hub2-ospfv3-1] router-id 0.0.0.2 
[Hub2-ospfv3-1] area 0 
[Hub2-ospfv3-1-area-0.0.0.0] quit 
[Hub2-ospfv3-1] quit 
5.  Configure GRE-mode IPv6 ADVPN tunnel interface tunnel1. 
[Hub2] interface tunnel1 mode advpn gre ipv6 
[Hub2-Tunnel1] ipv6 address 192:168::2 64 
[Hub2-Tunnel1] ipv6 address fe80::2 link-local 
[Hub2-Tunnel1] vam ipv6 client Hub2 
[Hub2-Tunnel1] ospfv3 1 area 0 
[Hub2-Tunnel1] ospfv3 network-type p2mp 
[Hub2-Tunnel1] source gigabitethernet 2/0/1 
[Hub2-Tunnel1] tunnel protection ipsec profile abc 
[Hub2-Tunnel1] quit 
Configuring Spoke 1 
1.  Configure IP addresses for the interfaces. (Details not shown.) 
2.  Configure the VAM client: 
# Create VAM client Spoke1. 
<Spoke1> system-view 
[Spoke1] vam client name Spoke1 
# Specify ADVPN domain abc for the VAM client. 
[Spoke1-vam-client-Spoke1] advpn-domain abc 
# Set the pre-shared key to 123456.