Hello to all fellow engineers,
I'd like to share with everyone our article that covers configuration of Point-to-Point GRE Tunnels. This article explains how GRE tunnels work, their routing process from a router's prespective, plus why its a best security practice to always protect them using IPSecurity.
Always, full configuration commands are provided, along with our popular network diagrams, ensuing a successful deployment.
Firewall.cx - Configuring Point-to-Point GRE VPN Tunnels - Unprotected GRE & Protected GRE over IPSec Tunnels
Topics covered include:
- GRE Routing Process
- Creating and Configuring a Tunnel Interface
- Routing Networks through the GRE Tunnel
- Securing the GRE tunnel with IPSec
- Configuring ISAKMP - Phase 1
- Creating IPSec Transforms - ISAKMP Phase 2
- Verifying the GRE Tunnel
Feedback is always welcome.
Many thanks,
Chris.