cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2724
Views
0
Helpful
1
Replies

Firewall.cx How-To: Configuring Point-to-Point GRE VPN Tunnels - Unprotected GRE & Protected GRE over IPSec Tunnels

cpartsenidis
Level 1
Level 1

Hello to all fellow engineers,

I'd like to share with everyone our article that covers configuration of Point-to-Point GRE Tunnels.  This article explains how GRE tunnels work, their routing process from a router's prespective, plus why its a best security practice to always protect them using IPSecurity.

Always, full configuration commands are provided, along with our popular network diagrams, ensuing a successful deployment.

Firewall.cxConfiguring Point-to-Point GRE VPN Tunnels - Unprotected GRE & Protected GRE over IPSec Tunnels

Topics covered include:

- GRE Routing Process

- Creating and Configuring a Tunnel Interface

- Routing Networks through the GRE Tunnel

- Securing the GRE tunnel with IPSec

- Configuring ISAKMP - Phase 1

- Creating IPSec Transforms - ISAKMP Phase 2

- Verifying the GRE Tunnel

Feedback is always welcome.

Many thanks,

Chris.

1 Reply 1

Jennifer Halim
Cisco Employee
Cisco Employee

Excellent stuff, Chris...

Keep them coming... Thanks for sharing all the articles.