Labccpn
Labccpn
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Addressing Table
Device Interface IPv4 Address Default Gateway
R1
G0/0/1 [Link]/29 N/A
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
R1
Tunnel 1 [Link]/30 N/A
R2
G0/0/1 [Link]/30 N/A
R2
Lo0 [Link] N/A
R3
G0/0/1 [Link]/30 N/A
R3
Tunnel 1 [Link]/30 N/A
D1
G1/0/23 [Link]/24 N/A
D1
Lo2 [Link]/24 N/A
D1
Lo3 [Link]/24 N/A
D3
G1/0/23 [Link]/24 N/A
D3
Lo16 [Link]/24 N/A
D3
Lo17 [Link]/24 N/A
D3
Lo18 [Link]/24 N/A
D3
Lo19 [Link]/24 N/A
D3
Lo20 [Link]/24 N/A
D3
Lo21 [Link]/24 N/A
D3
Lo22 [Link]/24 N/A
D3
Lo23 [Link]/24 N/A
Objectives
Part 1: Build the Network, Configure Basic Device Settings and Static Routing
Part 2: Configure Static IPsec VTI on R1 and R3
Part 3: Verify Static IPsec VTI on R1 and R3
Background / Scenario
IPsec can only send unicast IP traffic. Therefore, it does not support protocols that require multicast or
broadcast communication such as routing protocols. Although GRE over IPsec can be configured to provide
security and support for routing protocols, there is a newer more efficient method that can be used.
IPsec Virtual Tunnel Interface (VTI) greatly simplifies the VPN configuration process and provides a simpler
alternative to using GRE tunnels for encapsulation and crypto maps with IPsec. Like GRE over IPsec, IPsec
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
VTI allows for the flexibility of sending and receiving both IP unicast and multicast encrypted traffic. Traffic is
encrypted or decrypted when it is forwarded from or to the tunnel interface and is managed by the IP routing
table. Using the IP routing table simplifies the IPsec VPN configuration compared to the more complex
process of using access control lists (ACLs) with the crypto map in native IPsec configurations. VTI over
IPsec also encapsulates IPv4 or IPv6 traffic without the need for an additional GRE header. GRE adds a 4-
byte header to every packet.
In this lab, you will build and configure a static VTI over IPsec with pre-shared key to enable a site-to-site VPN
capable of supporting the OSPF routing protocol.
Note: This lab is an exercise in developing, deploying, and verifying how VNPs operate and does not reflect
networking best practices.
Note: The routers used with this CCNP hands-on lab are Cisco 4221routers and the two Layer 3 switches are
Catalyst 3650 switches. Other routers and Layer 3 switches and Cisco IOS versions can be used. Depending
on the model and Cisco IOS version, the commands available and the output produced might vary from what
is shown in the labs.
Note: Ensure that the routers and switches have been erased and have no startup configurations. If you are
unsure contact your instructor.
Instructor Note: Refer to the Instructor Lab Manual for the procedures to initialize and reload devices.
Required Resources
3 Routers (Cisco 4221 with Cisco IOS XE Release 16.9.4 universal image or comparable)
2 Switches (Cisco 3650 with Cisco IOS XE Release 16.9.4 universal image or comparable)
2 PCs (Choice of operating system with a terminal emulation program installed)
Console cables to configure the Cisco IOS devices via the console ports
Ethernet cables as shown in the topology
Instructions
Part 1: Build the Network, Configure Basic Device Settings and Static Routing
In Part 1, you will set up the network topology, configure basic settings, interface addressing, and single-area
OSPFv2 on the routers.
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
Router R1
Open configuration window
hostname R1
no ip domain lookup
line con 0
logging sync
exec-time 0 0
exit
banner motd # This is R1, Implement IPsec VTI Site-to-Site VPNs #
interface g0/0/0
description Connection to R2
ip add [Link] [Link]
no shut
exit
interface GigabitEthernet0/0/1
description Connection to D1
ip address [Link] [Link]
no shut
exit
router ospf 123
router-id [Link]
auto-cost reference-bandwidth 1000
network [Link] [Link] area 0
default-information originate
exit
ip route [Link] [Link] [Link]
Router R2
hostname R2
no ip domain lookup
line con 0
logging sync
exec-time 0 0
exit
banner motd # This is R2, Implement IPsec VTI Site-to-Site VPNs #
interface g0/0/0
description Connection to R1
ip add [Link] [Link]
no shut
exit
interface GigabitEthernet0/0/1
description Connection to R3
ip address [Link] [Link]
no shut
exit
int lo0
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 4 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 5 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
no shut
exit
interface G1/0/23
description Connection to PC1
no switchport
ip address [Link] [Link]
no shut
exit
int Lo2
description Loopback to simulate an OSPF network
ip add [Link] [Link]
ip ospf network point-to-point
exit
int Lo3
description Loopback to simulate an OSPF network
ip add [Link] [Link]
ip ospf network point-to-point
exit
ip routing
router ospf 123
router-id [Link]
auto-cost reference-bandwidth 1000
network [Link] [Link] area 0
exit
int range G1/0/1 - 10, G1/0/12 - 22, G1/0/24
shut
exit
Switch D3
hostname D3
no ip domain lookup
line con 0
logging sync
exec-time 0 0
exit
banner motd # This is D3, Implement IPsec VTI Site-to-Site VPNs #
interface G1/0/11
description Connection to R3
no switchport
ip address [Link] [Link]
no shut
exit
interface G1/0/23
description Connection to PC3
no switchport
ip address [Link] [Link]
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 6 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
no shut
exit
int Lo16
description Loopback to simulate an OSPF network
ip add [Link] [Link]
ip ospf network point-to-point
exit
int Lo17
description Loopback to simulate an OSPF network
ip add [Link] [Link]
ip ospf network point-to-point
exit
int Lo18
description Loopback to simulate an OSPF network
ip add [Link] [Link]
ip ospf network point-to-point
exit
int Lo19
description Loopback to simulate an OSPF network
ip add [Link] [Link]
ip ospf network point-to-point
exit
int Lo20
description Loopback to simulate an OSPF network
ip add [Link] [Link]
ip ospf network point-to-point
exit
int Lo21
description Loopback to simulate an OSPF network
ip add [Link] [Link]
ip ospf network point-to-point
exit
int Lo22
description Loopback to simulate an OSPF network
ip add [Link] [Link]
ip ospf network point-to-point
exit
int Lo23
description Loopback to simulate an OSPF network
ip add [Link] [Link]
ip ospf network point-to-point
exit
ip routing
router ospf 123
router-id [Link]
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 7 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 8 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 9 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
GRE over IPsec VPN could be configured to support routing protocol traffic over the IPsec VPN. However, IP
VTI is simpler and more efficient than GRE over IPsec.
IPsec VTI can be configured using:
Static VTIs (SVTIs) - SVTI configurations can be used for site-to-site connectivity in which a tunnel
provides always-on access between two sites. The advantage of using SVTIs as opposed to crypto
map configurations is that users can enable dynamic routing protocols on the tunnel interface without
the extra 4 bytes required for GRE headers, therefore reducing the bandwidth for sending encrypted
data.
Dynamic VTIs (DVTIs) - DVTIs can provide highly secure and scalable connectivity for remote-
access VPNs. The DVTI technology replaces dynamic crypto maps and the dynamic hub-and-spoke
method for establishing tunnels.
The steps to enable IPsec VTI are very similar to GRE over IPsec except:
Step 1. The tunnel interface is configured with the tunnel mode ipsec {ipv4 | ipv6} command.
Step 2. The transform set is configured with the mode tunnel command. An ACL is not required.
Like site-to-site VPNs using crypto maps and GRE over IPsec using crypto maps, IPsec VTI also requires the
following:
ISAKMP policy configuration and pre-shared key configured
Transform set configured
IPsec profile configured
In this part, you will configure a static IPsec SVTI to provide an always on site-to-site VPN as shown in the
topology diagram.
Step 1: On R1 and R3, configure the ISAKMP policy and pre-shared key.
In this lab, we will use the following parameters for the ISAKMP policy 10 on R1 and R3:
o Encryption: aes 256
o Hash: sha256
o Authentication method: pre-share key
o Diffie-Hellman group: 14
o Lifetime: 3600 seconds (60 minutes / 1 hour)
a. Configure ISAKMP policy 10 on R1 and R3.
Open configuration window
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 10 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
Step 2: On R1 and R3, configure the transform set and tunnel mode.
Create a new transform set called VTI-VPN using ESP AES 256 for encryption and ESP SHA256 HMAC for
authentication and set the mode to tunnel.
Note: The transform set would default to tunnel mode automatically but is configured in the example for
open configuration window
emphasis.
R1(config)# crypto ipsec transform-set VTI-VPN esp-aes 256 esp-sha256-hmac
R1(cfg-crypto-trans)# mode tunnel
R1(cfg-crypto-trans)# exit
close configuration window
open configuration window
Step 3: On R1 and R3, configure VTI over IPsec using IPsec profiles.
Configure an IPsec profile called VTI-PROFILE using the crypto ipsec profile ipsec-profile-name global
configuration command and set the transform set to VTI-VPN.
open configuration window
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 11 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 12 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 13 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
b. On R3, use the show interfaces tunnel 1 command to verify the interface settings.
open configuration window
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 14 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
Interface: Tunnel1
Session status: UP-ACTIVE
Peer: [Link] port 500
Session ID: 0
IKEv1 SA: local [Link]/500 remote [Link]/500 Active
Session ID: 0
IKEv1 SA: local [Link]/500 remote [Link]/500 Active
IPSEC FLOW: permit ip [Link]/[Link] [Link]/[Link]
Active SAs: 4, origin: crypto map
The output confirms that Tunnel 1 is up and active with R3 ([Link]). The port 500 refers to ISAKMP
using UDP port 500.
close configuration window
b. On R3, use the show crypto session command to verify the operation of the VPN tunnel.
open configuration window
Interface: Tunnel1
Session status: UP-ACTIVE
Peer: [Link] port 500
Session ID: 0
IKEv1 SA: local [Link]/500 remote [Link]/500 Active
Session ID: 0
IKEv1 SA: local [Link]/500 remote [Link]/500 Active
IPSEC FLOW: permit ip [Link]/[Link] [Link]/[Link]
Active SAs: 4, origin: crypto map
close configuration window
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 15 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
c.
open configuration window
From D1, trace the path taken to the R3 [Link] interface.
D1# trace [Link]
Type escape sequence to abort.
Tracing the route to [Link]
VRF info: (vrf in name/id, vrf out name/id)
1 [Link] 2 msec 2 msec 2 msec
2 [Link] 3 msec 2 msec 3 msec
3 [Link] 3 msec * 4 msec
Notice how the path taken is through the VPN tunnel interface.
close configuration window
e. Verify that there is an operational logical point-to-point link between R1 and R3 using the VTI tunnel
interface.
open configuration window
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 16 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 17 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
End of document
Router R1
R1# show run
Building configuration...
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 18 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
!
crypto ipsec profile VTI-PROFILE
set transform-set VTI-VPN
!
interface Tunnel1
bandwidth 4000
ip address [Link] [Link]
ip mtu 1400
tunnel source [Link]
tunnel mode ipsec ipv4
tunnel destination [Link]
tunnel protection ipsec profile VTI-PROFILE
!
interface GigabitEthernet0/0/0
description Connection to R2
ip address [Link] [Link]
negotiation auto
!
interface GigabitEthernet0/0/1
description Connection to D1
ip address [Link] [Link]
negotiation auto
!
interface Serial0/1/0
no ip address
!
interface Serial0/1/1
no ip address
!
router ospf 123
router-id [Link]
auto-cost reference-bandwidth 1000
network [Link] [Link] area 0
network [Link] [Link] area 0
default-information originate
!
ip forward-protocol nd
no ip http server
ip http secure-server
ip route [Link] [Link] [Link]
!
control-plane
!
banner motd ^C This is R1, Implement IPsec VTI Site-to-Site VPNs ^C
!
line con 0
exec-timeout 0 0
logging synchronous
transport input none
stopbits 1
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 19 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
line aux 0
stopbits 1
line vty 0 4
login
!
end
Router R2
R2# show run
Building configuration...
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 20 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
Router R3
R3# show run
Building configuration...
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 21 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
no aaa new-model
!
no ip domain lookup
!
login on-success log
!
subscriber templating
!
multilink bundle-name authenticated
!
license udi pid ISR4221/K9 sn FGL23313186
no license smart enable
diagnostic bootup level minimal
!
spanning-tree extend system-id
!
redundancy
mode none
!
crypto isakmp policy 10
encr aes 256
hash sha256
authentication pre-share
group 14
lifetime 3600
crypto isakmp key cisco123 address [Link]
!
crypto ipsec transform-set VTI-VPN esp-aes 256 esp-sha256-hmac
mode tunnel
!
crypto ipsec profile VTI-PROFILE
set transform-set VTI-VPN
!
interface Tunnel1
bandwidth 4000
ip address [Link] [Link]
ip mtu 1400
tunnel source [Link]
tunnel mode ipsec ipv4
tunnel destination [Link]
tunnel protection ipsec profile VTI-PROFILE
!
interface GigabitEthernet0/0/0
description Connection to R2
ip address [Link] [Link]
negotiation auto
!
interface GigabitEthernet0/0/1
description Connection to D3
ip address [Link] [Link]
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 22 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
negotiation auto
!
interface Serial0/1/0
no ip address
!
interface Serial0/1/1
no ip address
!
router ospf 123
router-id [Link]
auto-cost reference-bandwidth 1000
network [Link] [Link] area 0
network [Link] [Link] area 0
default-information originate
!
ip forward-protocol nd
no ip http server
ip http secure-server
ip route [Link] [Link] [Link]
!
control-plane
!
banner motd ^C This is R3, Implement IPsec VTI Site-to-Site VPNs ^C
!
line con 0
exec-timeout 0 0
logging synchronous
transport input none
stopbits 1
line aux 0
stopbits 1
line vty 0 4
login
!
end
Switch D1
D1# show run
Building configuration...
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 23 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
!
hostname D1
!
vrf definition Mgmt-vrf
!
address-family ipv4
exit-address-family
!
address-family ipv6
exit-address-family
!
no aaa new-model
switch 1 provision ws-c3650-24ps
!
call-home
! If contact email address in call-home is configured as sch-smart-
licensing@[Link]
! the email address configured in Cisco Smart License Portal will be used as
contact email address to send SCH notifications.
contact-email-addr sch-smart-licensing@[Link]
profile "CiscoTAC-1"
active
destination transport-method http
no destination transport-method email
ip routing
!
no ip domain lookup
!
login on-success log
!
crypto pki trustpoint SLA-TrustPoint
enrollment pkcs12
revocation-check crl
!
crypto pki certificate chain SLA-TrustPoint
certificate ca 01
30820321 30820209 A0030201 02020101 300D0609 2A864886 F70D0101 0B050030
32310E30 0C060355 040A1305 43697363 6F312030 1E060355 04031317 43697363
6F204C69 63656E73 696E6720 526F6F74 20434130 1E170D31 33303533 30313934
3834375A 170D3338 30353330 31393438 34375A30 32310E30 0C060355 040A1305
43697363 6F312030 1E060355 04031317 43697363 6F204C69 63656E73 696E6720
526F6F74 20434130 82012230 0D06092A 864886F7 0D010101 05000382 010F0030
82010A02 82010100 A6BCBD96 131E05F7 145EA72C 2CD686E6 17222EA1 F1EFF64D
CBB4C798 212AA147 C655D8D7 9471380D 8711441E 1AAF071A 9CAE6388 8A38E520
1C394D78 462EF239 C659F715 B98C0A59 5BBB5CBD 0CFEBEA3 700A8BF7 D8F256EE
4AA4E80D DB6FD1C9 60B1FD18 FFC69C96 6FA68957 A2617DE7 104FDC5F EA2956AC
7390A3EB 2B5436AD C847A2C5 DAB553EB 69A9A535 58E9F3E3 C0BD23CF 58BD7188
68E69491 20F320E7 948E71D7 AE3BCC84 F10684C7 4BC8E00F 539BA42B 42C68BB7
C7479096 B4CB2D62 EA2F505D C7B062A4 6811D95B E8250FC4 5D5D5FB8 8F27D191
C55F0D76 61F9A4CD 3D992327 A8BB03BD 4E6D7069 7CBADF8B DF5F4368 95135E44
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 24 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 25 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 26 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
shutdown
!
interface GigabitEthernet1/0/8
shutdown
!
interface GigabitEthernet1/0/9
shutdown
!
interface GigabitEthernet1/0/10
shutdown
!
interface GigabitEthernet1/0/11
description Connection to R1
no switchport
ip address [Link] [Link]
!
interface GigabitEthernet1/0/12
shutdown
!
interface GigabitEthernet1/0/13
shutdown
!
interface GigabitEthernet1/0/14
shutdown
!
interface GigabitEthernet1/0/15
shutdown
!
interface GigabitEthernet1/0/16
shutdown
!
interface GigabitEthernet1/0/17
shutdown
!
interface GigabitEthernet1/0/18
shutdown
!
interface GigabitEthernet1/0/19
shutdown
!
interface GigabitEthernet1/0/20
shutdown
!
interface GigabitEthernet1/0/21
shutdown
!
interface GigabitEthernet1/0/22
shutdown
!
interface GigabitEthernet1/0/23
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 27 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
Switch D3
D3# show run
Building configuration...
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 28 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 29 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 30 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 31 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 32 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
description Connection to R3
no switchport
ip address [Link] [Link]
!
interface GigabitEthernet1/0/12
shutdown
!
interface GigabitEthernet1/0/13
shutdown
!
interface GigabitEthernet1/0/14
shutdown
!
interface GigabitEthernet1/0/15
shutdown
!
interface GigabitEthernet1/0/16
shutdown
!
interface GigabitEthernet1/0/17
shutdown
!
interface GigabitEthernet1/0/18
shutdown
!
interface GigabitEthernet1/0/19
shutdown
!
interface GigabitEthernet1/0/20
shutdown
!
interface GigabitEthernet1/0/21
shutdown
!
interface GigabitEthernet1/0/22
shutdown
!
interface GigabitEthernet1/0/23
description Connection to PC3
no switchport
ip address [Link] [Link]
!
interface GigabitEthernet1/0/24
shutdown
!
interface GigabitEthernet1/1/1
!
interface GigabitEthernet1/1/2
!
interface GigabitEthernet1/1/3
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 33 of 34 [Link]
Lab - Implement IPsec VTI Site-to-Site VPNs
!
interface GigabitEthernet1/1/4
!
interface Vlan1
no ip address
!
router ospf 123
router-id [Link]
auto-cost reference-bandwidth 1000
network [Link] [Link] area 0
network [Link] [Link] area 0
!
ip forward-protocol nd
ip http server
ip http secure-server
!
control-plane
service-policy input system-cpp-policy
!
banner motd ^C This is D3, Implement IPsec VTI Site-to-Site VPNs ^C
!
line con 0
exec-timeout 0 0
logging synchronous
stopbits 1
line aux 0
stopbits 1
line vty 0 4
login
line vty 5 15
login
!
end
2020 - 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 34 of 34 [Link]