PDN Gateway Configuration
Configuring Optional Features on the P-GW ▀
Cisco ASR 5x00 Packet Data Network Gateway Administration Guide ▄
185
The output from this command should look similar to the sample shown below. In this example P-GW service
named
PGW1
was configured in the
vpn1
context.
Service name: pgw1
Context: cn1
Associated PGW svc: None
Associated GTPU svc: None
Accounting Context Name:cn1
dns-client Context Name:cn1
Authorize: hss
Fqdn-name: xyz.abc@starent.networks.com
Bind: Not Done
Local IP Address: 0.0.0.0 Local IP Port: 2123
Self PLMN: Not defined
Retransmission Timeout: 5 (secs)
Configuring Dynamic Node-to-Node IP Security on the S5 Interface
The configuration example in this section creates an IPSec/IKEv2 dynamic node-to-node tunnel endpoint on the S5
interface.
Important:
Use of the IP Security feature requires that a valid license key be installed. Contact your local Sales
or Support representative for information on how to obtain a license.
The following configuration examples are included in this section:
Creating and Configuring an IPSec Transform Set
Creating and Configuring an IKEv2 Transform Set
Creating and Configuring a Crypto Template
Binding the S5 IP Address to the Crypto Template
Creating and Configuring an IPSec Transform Set
The following example configures an IPSec transform set, which is used to define the security association that
determines the protocols used to protect the data on the interface:
configure