Chapter 18 GRE Configuration
Confidential and Proprietary Information of ZTE CORPORATION 269
TABLE 315 TUNNEL SOURCE COMMAND
Command
Format
Command
Mode
Command Function
tunnel
source
<ip-
address>
tunnel
configuration
This configures a source
address for the tunnel
Result: This configures a source address for the tunnel.
3. To configure a destination address for the tunnel, use tunnel
destination <ip-address> command in tunnel configuration
mode as shown in
Table 316.
TABLE 316 TUNNEL DESTINATION COMMAND
Command
Format
Command
Mode
Command Function
tunnel
destination
<ip-address>
Interface
configuration
This configures a destination
address for the tunnel
Result: This configures a destination address for the tunnel.
4. To configure the GRE tunnel to enable the key option and
configure a key, use tunnel key <key> command in tunnel
configuration mode as shown in
Table 317.
TABLE 317 TUNNEL KEY COMMAND
Command
Format
Command
Mode
Command Function
tunnel key
<key>
Interface
configuration
This configures the GRE tunnel
and enable the key option and
configure a key
Result: This configures the GRE tunnel and enables the key
option and configures a key.
Note: The key strings at both ends of the tunnel must be the
same.
5. To configure the GRE tunnel and to enable the tunnel
sequence option, use tunnel sequencing command in
tunnel configuration mode as shown in
Table 318.
TABLE 318 TUNNEL SEQUENCING COMMAND
Command
Format
Command
Mode
Command Function
tunnel key
<key>
Interface
configuration
This configures the GRE tunnel
and to enable the tunnel
sequence option
Result: This configures the GRE tunnel and to enable the
tunnel sequence option.