Hi,
Here is a basic IOS configuration for encrypting a GRE tunnel.
crypto isakmp policy 1
encr 3des
hash md5
authentication pre-share
group 2
crypto isakmp key secret-key address x.x.x.x
!
crypto ipsec transform-set VPNSet esp-3des esp-md5-hmac
mode transport
!
crypto map CryptoMap 1 ipsec-isakmp
set peer 1.2.3.4
set transform-set VPNsSet
match address 101
!
interface Serial0
crypto map CryptoMap
!
!
access-list 101 permit gre any any
int t0
ip mtu 1416
ip addr 10.1.1.1 255.255.255.0
tunnel source ! These addresses need to be globally
tunnel dest ! routable
Router ospf 1
network 10.1.1.0 0.0.0.255 area 0
The way this works is that the OSFP process provides routing across the GRE tunnel. So packets that need to get to the remote network have the next hop set to that of the remote tunnel endpoint. They get encapsulated by GRE, then the crypto ACL 101 matches the GRE packets and they get encrypted.
Hope this helps,
Andy