<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic EIGRP over IPSEC in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/eigrp-over-ipsec/m-p/105685#M1062105</link>
    <description>&lt;P&gt;Is it true that in order to run EIGRP between site-to-site VPN, One must need to run GRE because what I read that IPSEC doesn't support multiprotocol?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But then, my headqurter has PIX Firewall, where I was thinking of terminating 8 IPSEC tunnels from the remote offices.  What I read that PIX Firewall and VPN Concentrators don't support GRE.  Is there any alternatives.&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 06:23:18 GMT</pubDate>
    <dc:creator>abbas.ali</dc:creator>
    <dc:date>2020-02-21T06:23:18Z</dc:date>
    <item>
      <title>EIGRP over IPSEC</title>
      <link>https://community.cisco.com/t5/network-security/eigrp-over-ipsec/m-p/105685#M1062105</link>
      <description>&lt;P&gt;Is it true that in order to run EIGRP between site-to-site VPN, One must need to run GRE because what I read that IPSEC doesn't support multiprotocol?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But then, my headqurter has PIX Firewall, where I was thinking of terminating 8 IPSEC tunnels from the remote offices.  What I read that PIX Firewall and VPN Concentrators don't support GRE.  Is there any alternatives.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:23:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/eigrp-over-ipsec/m-p/105685#M1062105</guid>
      <dc:creator>abbas.ali</dc:creator>
      <dc:date>2020-02-21T06:23:18Z</dc:date>
    </item>
    <item>
      <title>Re: EIGRP over IPSEC</title>
      <link>https://community.cisco.com/t5/network-security/eigrp-over-ipsec/m-p/105686#M1062106</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can terminate the ipsec tunnel on the pix but you still need to have a router behind the pix to terminate the GRE tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;something similar to the sample configuration below:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/warp/public/707/gre_ipsec_ospf.html" target="_blank"&gt;http://www.cisco.com/warp/public/707/gre_ipsec_ospf.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope this helps,&lt;/P&gt;&lt;P&gt;-Nairi&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Nov 2002 23:57:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/eigrp-over-ipsec/m-p/105686#M1062106</guid>
      <dc:creator>Nairi Adamian</dc:creator>
      <dc:date>2002-11-19T23:57:03Z</dc:date>
    </item>
    <item>
      <title>Re: EIGRP over IPSEC</title>
      <link>https://community.cisco.com/t5/network-security/eigrp-over-ipsec/m-p/105687#M1062107</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We build the GRE to the MSFC's on the 6500 inside the firewall. It works quite well as the previous post mentioned.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Jan 2003 19:11:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/eigrp-over-ipsec/m-p/105687#M1062107</guid>
      <dc:creator>lnthompson</dc:creator>
      <dc:date>2003-01-14T19:11:53Z</dc:date>
    </item>
    <item>
      <title>Re: EIGRP over IPSEC</title>
      <link>https://community.cisco.com/t5/network-security/eigrp-over-ipsec/m-p/105688#M1062108</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;GRE is needed as IPSec does not support multicast needed for dynamic routing protocols such as EIGRP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Depending on your remotes and routing plan, Reverse Route Injection (RRI)may be an option if you don't need to run "full" dynamic routing on both endpoints. RRI is available on IOS VPN Routers and VPN3000 Concentrator. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, PIX Firewall is OK as a site-to-site VPN head-end, however IOS VPN Router at head-end more readily supports hub-and-spoke/site-to-site VPN topologies, especially when spoke-to-spoke traffic is required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Jan 2003 23:37:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/eigrp-over-ipsec/m-p/105688#M1062108</guid>
      <dc:creator>Neil Anderson</dc:creator>
      <dc:date>2003-01-20T23:37:28Z</dc:date>
    </item>
  </channel>
</rss>

