IPSEC over GRE 


Not something that you would want to do in production but the following configuration is to tunnel IPSEC over GRE (As apposed to GRE inside IPSEC). This is based on a lab from the excellent gns3vault.com link below for the video explanation and final configs.

http://gns3vault.com/tunneling/gre-over-ipsec/




########################
## NYC ##
########################


int fa0/0
 ip addr 192.168.12.1 255.255.255.0
 no shut

int lo0
 ip addr 11.11.11.11 255.255.255.0


crypto isakmp policy 1
encryption aes 256
group 5
authentication pre-shar

crypto isakmp key 0 PA$$WORD address 192.168.23.3

crypto ipsec  transform-set NY_TRANS_SET esp-aes esp-sha-hmac

crypto ipsec profile TUNNEL_PROTECT
 set transform-set NY_TRANS_SET

int tu10
 tunnel source fa0/0
 tunnel destination 192.168.23.3
 tunnel mode ipsec ipv4
 tunnel protection ipsec profile TUNNEL_PROTECT


ip route 33.33.33.0 255.255.255.0 192.168.13.3

router eigrp 1
network 192.168.12.0


########################
## SAN FRANCISCO ##
########################

int fa0/0
 ip addr 192.168.23.3 255.255.255.0
 no shut

int lo0
 ip addr 33.33.33.33 255.255.255.0


crypto isakmp policy 1
encryption aes 256
group 5
authentication pre-shar

crypto isakmp key 0 PA$$WORD address 192.168.12.1

crypto ipsec  transform-set SF_TRANS_SET esp-aes esp-sha-hmac

crypto ipsec profile TUNNEL_PROTECT
 set transform-set SF_TRANS_SET

int tu10
 tunnel source fa0/0
 tunnel destination 192.168.12.1
 tunnel mode ipsec ipv4
 tunnel protection ipsec profile TUNNEL_PROTECT



ip route 11.11.11.0 255.255.255.0 192.168.13.1

router eigrp 1
network 192.168.23.0


########################
## INTERNET ##
########################

int fa0/0
 ip addr 192.168.12.2 255.255.255.0
 no shut

int fa0/1
 ip addr 192.168.23.2 255.255.255.0

router eigrp 1
 network 192.168.12.0
 network 192.168.23.0

Comments

Popular posts from this blog

Configure OSPF Juniper SRX

Upgrading JUNOS via USB