IPSEC over GRE
Not something that you would want to do in production but the following configuration is to tunnel IPSEC over GRE (As apposed to GRE inside IPSEC). This is based on a lab from the excellent gns3vault.com link below for the video explanation and final configs.
http://gns3vault.com/tunneling/gre-over-ipsec/
########################
## NYC ##
########################
int fa0/0
ip addr 192.168.12.1 255.255.255.0
no shut
int lo0
ip addr 11.11.11.11 255.255.255.0
crypto isakmp policy 1
encryption aes 256
group 5
authentication pre-shar
crypto isakmp key 0 PA$$WORD address 192.168.23.3
crypto ipsec transform-set NY_TRANS_SET esp-aes esp-sha-hmac
crypto ipsec profile TUNNEL_PROTECT
set transform-set NY_TRANS_SET
int tu10
tunnel source fa0/0
tunnel destination 192.168.23.3
tunnel mode ipsec ipv4
tunnel protection ipsec profile TUNNEL_PROTECT
ip route 33.33.33.0 255.255.255.0 192.168.13.3
router eigrp 1
network 192.168.12.0
########################
## SAN FRANCISCO ##
########################
int fa0/0
ip addr 192.168.23.3 255.255.255.0
no shut
int lo0
ip addr 33.33.33.33 255.255.255.0
crypto isakmp policy 1
encryption aes 256
group 5
authentication pre-shar
crypto isakmp key 0 PA$$WORD address 192.168.12.1
crypto ipsec transform-set SF_TRANS_SET esp-aes esp-sha-hmac
crypto ipsec profile TUNNEL_PROTECT
set transform-set SF_TRANS_SET
int tu10
tunnel source fa0/0
tunnel destination 192.168.12.1
tunnel mode ipsec ipv4
tunnel protection ipsec profile TUNNEL_PROTECT
ip route 11.11.11.0 255.255.255.0 192.168.13.1
router eigrp 1
network 192.168.23.0
########################
## INTERNET ##
########################
int fa0/0
ip addr 192.168.12.2 255.255.255.0
no shut
int fa0/1
ip addr 192.168.23.2 255.255.255.0
router eigrp 1
network 192.168.12.0
network 192.168.23.0
Comments
Post a Comment