To configure an IPSec transport profile that will be used to secure DVMRP, GRE, or L2TP tunnels:
- host1(config)#ipsec transport profile secureGre
virtual-router default ip address 5.5.5.5
- host1(config-ipsec-transport-profile)#
- host1(config-ipsec-transport-profile)#application
gre dvmrp l2tp
You can then set any of the following parameters for the profile:
- host1(config-ipsec-transport-profile)#lifetime
seconds 3600 28800 kilobytes 102400 4294967295
- host1(config-ipsec-transport-profile)#pfs
group 5
- host1(config-ipsec-transport-profile)#transform-set
esp-3des-hmac-sha esp-3des-hmac-md5
To display the available transform sets, issue the transform-set ? command.
- host1(config-ipsec-transport-profile)#local
ip address 10.10.1.1
- host1(config-ipsec-transport-profile-local)#
Enter the unencrypted key. The router encrypts the key and stores it in encrypted form. You can no longer retrieve the unencrypted key.
- host1(config-ipsec-transport-profile-local)#pre-share secretforGre
application
- host1(config-ipsec-transport-profile)#application
gre dvmrp l2tp
ipsec transport profile
For L2TP/IPSec connections, you can enter a fixed IP address or the wildcard address, 0.0.0.0. If you use the wildcard address, the profile accepts any remote client connection, which is a typical scenario for secure remote access.
For GRE/IPSec and DVMRP/IPSec connections, you must enter a fixed address; the 0.0.0.0 wildcard address is not accepted and will return an error.
- host1(config)#ipsec transport profile secureL2tp
virtual-router default ip address 5.5.5.5
- host1(config-ipsec-transport-profile)#
lifetime
- host1(config-ipsec-transport-profile)#lifetime
seconds 900 86400 kilobytes 100000 4294967295
local ip address
![]() |
Caution: We recommend that you do not use address 0.0.0.0, because it allows any address to accept IKE calls, and it creates a group preshared key, which is not fully secure. |
- host1(config-ipsec-transport-profile)#local
ip address 192.168.1.2
- host1(config-ipsec-transport-profile-local)#
pfs group
- host1(config-ipsec-transport-profile)#pfs
group 5
pre-share
![]() |
Caution: Group preshared keys are not fully secure, and we do not recommend using them. They are provided for trials and testing purposes where the missed security does not pose a risk to the provider. |
- host1(config-ipsec-transport-profile-local)#pre-share secretforL2tp
![]() |
Note: After you enter a preshared key, the original (unencrypted) key cannot be retrieved. If you need to reenter the original key (for example, the system goes to factory default and you have only the show config output) you can:
|
pre-share-masked
![]() |
Caution: Group preshared keys are not fully secure, and we do not recommend using them. They are provided for trials and testing purposes, where the missed security does not pose a risk to the provider. |
- host1(config-ipsec-transport-profile-local)#pre-share-masked AAAAGAAAAAcAAAACZquq4ABieTUBuNBELSY8b/L3CX/RcPX7
transform-set
- host1(config-ipsec-transport-profile)#transform-set
esp-3des-hmac-sha