IPsec over a GRE tunnel

Поделиться
HTML-код
  • Опубликовано: 3 ноя 2024

Комментарии • 109

  • @GA-tl4iy
    @GA-tl4iy 4 года назад +1

    Dear Doug, thank you so much for a great video, you mentioned and configured everything we need to know for GRE, IPSEC, ISAKMP and much more. I really appreciate your time and your video. You should be here in Toronto / Canada for a great Networking Instructor we don't have. I paid a lot of money to go to the Networking College, but never ever got what I expected , (just wasting money and time to be certified in Toronto). THANKS AGAIN AND GOD BLESS, Mike

  • @carlosgaray2513
    @carlosgaray2513 3 года назад

    I am new to networking... super tech. Thank you much for putting this video together

  • @michaelwood2292
    @michaelwood2292 2 года назад

    Thanks Doug for the videos.... very clear and accurate. Easy to understand.

  • @simposymon
    @simposymon 10 лет назад +5

    best tut on the subject period. Thank-You

  • @netking23
    @netking23 12 лет назад

    Excellent video!! Easily one of the best tutorials out there. Please make more of these. They are priceless to many of us.

  • @alreid12345
    @alreid12345 10 лет назад

    Thank you so so much for your great video and explanation it really really helped me understand and get a project done.
    You are a superb teacher and I love your method of teaching and explaining as you go along on screen.
    THANK YOU!

  • @pascaldufour9275
    @pascaldufour9275 4 года назад

    Have I learnt something new? Absolutely !!!!
    Thnx

  • @ranjeetbadhe
    @ranjeetbadhe 12 лет назад

    Doug, You have simplified the subject. Excellent tutorial.

  • @justamusta
    @justamusta 12 лет назад

    Excellent video, clear and concise and great audio too. Many thanks to you!

  • @MuhammadKhan-yl7mt
    @MuhammadKhan-yl7mt 11 лет назад

    Hats off to you Doug. Thanks for a well explained demo.

  • @mikeko5232
    @mikeko5232 9 лет назад

    Perfect and excellent, some new stuff. We are very great full to you to spent time on it.
    I like the way you talk and explanation. If you put some more light on Diffe, transform sets, isakmp will be great.

  • @snasheet
    @snasheet 11 лет назад

    Super demonstration.Thanks for your time and effort to put this together.

  • @Maxsat25
    @Maxsat25 11 лет назад

    Thank YOU very much! It's truly useful demonstration!

  • @Dineshnk89
    @Dineshnk89 9 лет назад

    Gr8 work Doug...Nice tutorial.. Very helpful...

  • @Raycanfly1996
    @Raycanfly1996 8 лет назад +3

    There is a mistake in this config, The access list used for the IPsec Tunnel should be local to remote, not remote to local.
    I confirmed this with Gns3, Phase 2 won't finish unless you put the local network first and remote second.Otherwise, great video.

    • @ctkdh
      @ctkdh 8 лет назад

      @Raymond A: Can you please more specify and take an example for this case?

    • @Raycanfly1996
      @Raycanfly1996 8 лет назад +3

      Sure, The correct ACL is as follows:
      R3: permit gre host 172.168.3.2 host 172.168.2.1
      (Local network first then, remote)
      R1:: permit gre host 172.168.2.1 host 172.168.3.2

  • @danerdavis
    @danerdavis 11 лет назад

    Great tutorial. I will start using gre-ipsec instead of just an ipsec vpn to make dual-wan redundancy easier.

  • @bluerfoot
    @bluerfoot 7 лет назад

    based on this one tutorial I sure wish you were still doing cisco vids, great job.

  • @jakecle67
    @jakecle67 10 лет назад

    Awesome video, and very detailed. You the MAN!!!!

  • @alrobi87
    @alrobi87 9 лет назад

    crystal clear - great job Doug!

  • @ishmaelk100
    @ishmaelk100 8 лет назад +2

    Explicit Tutorial... Thank Doug !

  • @coverby_htetpaing7961
    @coverby_htetpaing7961 5 лет назад

    Thanks for your sharing. Really Thanks !

  • @msalimolime4528
    @msalimolime4528 12 лет назад

    I think what you missed is that both routers R1 and R2 have default routes pointing to internet and OSPF is used between R1 and R2 over the GRE tunnel emulating Intranet edge routers. On GNS3 all you need is to have "ip route 0.0.0.0 0.0.0.0 fa0/0" configured on R1 and R2 with fa0/0 interfaces on R1 and R2 connected to R3 acting as the ISP.

  • @barackuse
    @barackuse 10 лет назад

    Great lab, thanks for using a "clear" mic. Issue I'm running into is, I dont see my OSPF routes? I see the neighbors come up but when I do a sho ip route, there are NO OSPF routes . ALsho shouldn't you be able to ping your loop back interfaces form the remote route, being that they are now routed through the tunnel via ospf?

  • @julianmenezes.r7809
    @julianmenezes.r7809 9 месяцев назад

    Wonderful Video, Good Explanation, Can you please explain the ISP Part, How do you configure the Internet in this Protocol Diagram?😇

  • @binman20
    @binman20 12 лет назад

    Excellent work, this will help a lot. Many thanks

  • @RohitVerma-wh1ki
    @RohitVerma-wh1ki 9 лет назад

    Very useful video. thank you

  • @elmerjohnbc
    @elmerjohnbc 13 лет назад

    I'll keep following your other post.

  • @Bryan-it6nu
    @Bryan-it6nu 3 года назад

    super helpful. thanks!!

  • @ITsupportian
    @ITsupportian 7 лет назад +1

    Good video - I have a question though, How do you configure when you have an ASA firewall behind the router?

  • @mohammadhossain5074
    @mohammadhossain5074 12 лет назад

    Wow, Excellent..... . Thanks a lot for making this video.

  • @GregAspenson
    @GregAspenson 10 лет назад

    Great video, just what I needed

  • @elmerjohnbc
    @elmerjohnbc 13 лет назад

    Nice tutorial, very basic...good job.

  • @ctkdh
    @ctkdh 8 лет назад

    excellent tutorial, many thanks

  • @SaSemairesearch
    @SaSemairesearch 8 лет назад

    Excellent tutorial

  • @tasosptl
    @tasosptl 11 лет назад

    Well done mate, excellent video and thanks for sharing.

  • @soumyasomanath
    @soumyasomanath 13 лет назад

    very informative...Thanks for such a good video...

  • @mohamedkhan6089
    @mohamedkhan6089 9 лет назад

    Excellent Video

  • @keift8899
    @keift8899 11 лет назад

    Awesome video and tutorial

  • @2007Russdog
    @2007Russdog 12 лет назад

    You dont apply the crypto map to the tunnel. You apply it to the outbound physical interface's ip address. I have done it on Packet Tracer and you dont have to worry about the Crypto-trans mode. Just use the authentication preshare and encryption and it works just fine

  • @tamask
    @tamask 9 лет назад +2

    Why do you have to apply the crypto map to both the physical and the tunnel interface? I labbed it, and it seems it also works if I apply the crypto map only to the physical interface. On the other hand, if I apply it only to the tunnel interface, traffic still goes through, but nothing gets encrypted. As long as it's applied to the physical interface, it makes no difference whether I apply it to the tunnel interface too or not... What am I missing?

    • @rayvaladez5445
      @rayvaladez5445 6 лет назад

      In releases before Cisco IOS Release 12.2(13)T crypto maps had to be applied to both physical and logical interfaces. In later IOS versions crypto maps only need to be applied only to the physical interface, reference Cisco Point-to-Point GRE over IPsec Design Guide.

    • @nasirsahak
      @nasirsahak 6 лет назад

      hi, i know u have asked this question 2 years ago :),
      i am just playing with ipsec--gre ,
      the answer to your question is ACL, that is why when you apply it only to tunnel interfaces and test ,it doesnt match anything so nothing is encrypted,
      if you just tweak it abit and add extra Acl line to current Acl that what exactly you needs to match to be encrypted.
      Examle, you only want your 192.168.1.0 network to be encrypted when its talking to 10.1.1.0 network only so just add it to exisiting
      R1
      ip access-list extended IPSEC-TRAFFIC
      permit ip 192.168.1.0 0.0.0.255 10.1.1.0 0.0.0.255
      R2
      ip access-list extended IPSEC-TRAFFIC
      permit ip 10.1.1.0 0.0.0.255 192.168.1.0 0.0.0.255
      now remove the crypto map from your physical interfaces and just apply it onto tunnels,
      you should see traffic encrypted when packets comes from 192 to 10 network and vice-versa.
      Regards!

  • @pervinraja2696
    @pervinraja2696 10 лет назад

    Good video..thumbs up!!!

  • @chrisgast
    @chrisgast 4 года назад

    I've been having a little trouble creating a GRE tunnel, much less setting up IPSec. I've got the subnets set up and I have OSPF enabled with the networks added on the appropriate routers, but I can't get past the "ISP". I can successfully ping from each router to the "ISP", but I can't ping each of the routers to each other. I have the appropriate "public" IPs for the destinations. I'm trying to figure out what I'm forgetting/missing. Any tips?

  • @WaclawWozniak
    @WaclawWozniak 13 лет назад

    Very helpful , thanks a lot !!!

  • @ruellerz
    @ruellerz 11 лет назад

    Thanks! Works great on my lab.

  • @lmd6204
    @lmd6204 9 лет назад +1

    Great tutorial. I would have liked to know what some of the terms were like the Diffe, transform sets, isakmp, etc. I guess that would be another video to explain what these different types of crypto are.

  • @AaliMr007
    @AaliMr007 8 лет назад

    Hi i am beginner in VPN my question is before creating GRE tunnel both router should connected via VPN IPSEC ?
    or create grp tunnel along with VPN?

  • @ivanabibe160
    @ivanabibe160 8 лет назад

    Great video, thanks

  • @bronzedpete
    @bronzedpete 11 лет назад

    You only need 4 routes on the three routers for it to work:
    R1:
    R1#sh ip route static
    45.0.0.0/24 is subnetted, 1 subnets
    S 45.12.153.0 [1/0] via 162.27.193.2
    WAN:
    C 45.12.153.0 is directly connected, FastEthernet0/1
    162.27.0.0/30 is subnetted, 1 subnets
    C 162.27.193.0 is directly connected, FastEthernet0/0
    R2:
    R2#sh ip route static
    162.27.0.0/24 is subnetted, 1 subnets
    S 162.27.193.0 [1/0] via 45.12.153.2

  • @amb1s1
    @amb1s1 10 лет назад

    When you create a crypto isakmp policy 1 when do that policy is use because I don't see that you match it on the crypto map.

  • @GeetTendulkar
    @GeetTendulkar 11 лет назад

    Thank You.. great explanation.

  • @yasyas2255
    @yasyas2255 3 года назад

    Hello, I am from the future! (2020 in particular)
    Make similar lab, it didnt work, untile:
    - had to remove crypto-map from tunnels and leave only on fast-ethernets;
    - had to permit ip in the ACL instead of gre;
    What gives?

  • @Ave0ne
    @Ave0ne 11 лет назад +1

    Great video Doug! I do have a question though and excuse me if this has been asked before.. How do you simulate the ISP in Dynamips/GNS3? I'd like to give this lab a go.
    Again, great tutorial!

  • @hassandoghan9866
    @hassandoghan9866 3 года назад

    really u good explainier

  • @cookmeister2020
    @cookmeister2020 12 лет назад

    Great video, really helpful! thanks!

  • @jumapope5943
    @jumapope5943 9 лет назад

    Great Video!!

  • @leonardfreid1348
    @leonardfreid1348 10 лет назад

    Do the OSPF process ID # 's have to be identical to become neighbors or to function? I thought the process ID was locally significant to the router database. Great video! Loved it.

    • @amb1s1
      @amb1s1 10 лет назад +1

      Process ID does not matter on OSPF.

    • @irfannaseef
      @irfannaseef 10 лет назад

      Process ID may not be the same,.Neighbours should be in same Area, same network, Timers to be identical.

  • @minhtruong6935
    @minhtruong6935 11 лет назад

    Love it..great job

  • @samuelquirk9915
    @samuelquirk9915 8 лет назад

    Thanks for the video

  • @michaelmonarca6720
    @michaelmonarca6720 2 месяца назад

    the best!!!

  • @ezekwise4610
    @ezekwise4610 11 лет назад

    Thanks for the video. Can you please make a video on site to site vpn over adsl? One site is the corporate network using ASA5500 router and the remote site has cisco router sitting behind the adsl modem and has static public IP.

  • @shr1362
    @shr1362 2 года назад

    This is not IPsec over gre. This is gre over IPsec. In IPsec over gre case, all packet first encrypted and then passing through gre tunnel. Since IPsec can not encapsulate multicast, broadcast packet, this lead to routing protocol problems. By means of gre over IPsec, multicast and broadcast can be encapsulated using gre and then encrypted using IPsec.

  • @deepapannu8111
    @deepapannu8111 10 лет назад

    Good Lab , although it don't tell what is have to match on both sides and what is locally significant only

  • @cptechno
    @cptechno 8 лет назад +1

    Not a network professiona but I have one question: Are both routers the same or from the same company? Could you have done the same if the routers were from different brands?

    • @Raycanfly1996
      @Raycanfly1996 8 лет назад

      Yes, IPsec is universal. Cisco to Juniper, Cisco to Fortigate.. ext. No issues

    • @NETWizzJbirk
      @NETWizzJbirk 8 лет назад

      Yes as Raymond said, but you have to match ALL of the Crypto parameters, agreed upon keys, etc.

  • @dvijendravarma2270
    @dvijendravarma2270 9 лет назад

    thank you sir. helpful

  • @chellacool86
    @chellacool86 12 лет назад

    Thanks a lot for this video!! It really helped me a lot! :)

  • @gaad45
    @gaad45 6 лет назад

    superb :) thanks

  • @veganath
    @veganath 13 лет назад

    Thx great tutorial, really appreciated!!

  • @tubeyouser77
    @tubeyouser77 12 лет назад +1

    Great vid, thanks.
    Has anyone tried this in packet tracer? when I create my trans-set it doesn't go into (cfg-crypto-trans) mode for me, also, I can't apply my crypto map to the tunnel interface.

  • @hassandoghan9866
    @hassandoghan9866 3 года назад

    have to apply the map to the serial interface ?

  • @stvnkelemen
    @stvnkelemen 11 лет назад

    You have to apply static route on the 3rd router:
    (i'm using serial interfaces instead of FA)
    R3(config)#ip route 192.168.1.0 255.255.255.0 serial 0/0
    R3(config)#ip route 162.27.193.130 255.255.255.255 serial 0/0
    R3(config)#ip route 45.12.153.202 255.255.255.255 serial 0/1
    R3(config)#ip route 10.1.1.0 255.255.255.0 serial 0/1

  • @willowklan
    @willowklan 9 лет назад

    don`t you need to use an "permit ip any any" after the ACL you configured on the GRE? otherwise the only traffic that will be allowed to flow through these physical interfaces would be GRE traffic and only to a specific destination on the other side... you DO need to use those interfaces for regular internet traffic too, don`t you?

    • @willowklan
      @willowklan 9 лет назад

      +Keith Buckley thanks a-lot bro. got it now.

  • @gcampania
    @gcampania 9 лет назад

    Thank you so much!!

  • @AlexeyTsapaev
    @AlexeyTsapaev 8 лет назад

    why do we have to apply the crypto-map twice?

  • @TheZ0909
    @TheZ0909 13 лет назад

    a real good work

  • @akojib
    @akojib 12 лет назад

    This is a great tutorial thanks doing it. Would you have the configs for the internet router? I would like to duplicate this setup in my GNS3. Thanks!

  • @javiercespedes4799
    @javiercespedes4799 9 лет назад

    Great Tutorial!
    BTW is not GRE over IPSEC tunnel?

    • @romanhoax9014
      @romanhoax9014 9 лет назад +1

      Javier Cespedes You probably already know the answer, but yes its a GRE tunnel over IPsec tunnel. IPsec doesn't handle multicast or broadcast traffic.
      One of the benefits of GRE over IPsec as opposed to just using an IPsec tunnel by itself. is we can encapsulate a wider range of traffic into a GRE tunnel and then send it securely within an IPsec tunnel.
      Hope this was useful

    • @willowklan
      @willowklan 9 лет назад

      +Roman Hoax sorry mate, but you are wrong. it is IPSEC over GRE. the gre tunnel comes first and than the ipsec tunnel comes "on top" of it to allow the security. the only reason we don`t use only ipsec is because it can`t forward broadcast. so we build a gre tunnel that encapsulates the broadcast with a unicast and THEN put on it an ipsec tunnel to secure that unicast traffic.

    • @romanhoax9014
      @romanhoax9014 9 лет назад

      willow klan
      Semantics. my explanation is the exact same as yours. My wording is such that the GRE tunnel is sent over IPsec. Hence GRE over IPsec. I already explained the GRE tunnel comes first, it is then sent over IPsec.
      Semantics.

  • @ragupathyg
    @ragupathyg 9 лет назад +1

    Guys.. Help me to understand it is IPsec over a GRE Tunnel or GRE over IPsec tunnel ??

    • @victormelothemaster
      @victormelothemaster 9 лет назад +2

      +Ragu G It's GRE over IPSec Tunnel. For more information visit ccnp300-101.blogspot.com

  • @reddypraveen8230
    @reddypraveen8230 9 лет назад +4

    ospf process id is only locally significant , only the area,hello,dead need to match.

    • @kencheng2929
      @kencheng2929 7 лет назад

      reddypraveen the network too, unless you're using ip6

  • @deepaks1400
    @deepaks1400 6 лет назад

    where that 4.2.2.2(ping) network is?

  • @ricardovelazquez144
    @ricardovelazquez144 12 лет назад

    There is not enough characters to really complain about this video!

  • @ahmedelkhalkhali4534
    @ahmedelkhalkhali4534 3 года назад

    what you configured called GRE over IPSEC and not IPSEC over GRE !

  • @celald
    @celald 11 лет назад

    Hi Ezek,
    I have the same challenge. Did you found a solution?
    We fighting since 2 weeks to solve :((
    Regards,
    Celal

  • @m0rphe0-8
    @m0rphe0-8 5 лет назад +2

    This is NOT IPSEC over GRE , Is GRE over IPSEC !!!! False video

  • @sss-pj4jh
    @sss-pj4jh 4 года назад

    Hi. This is not IPsec over GRE, this is GRE over IPsec

  • @dennis.teevee
    @dennis.teevee 8 месяцев назад

    2024 👍💯

  • @satishpuri4599
    @satishpuri4599 11 лет назад

    Can any body help to find out, that where he has configure the IP add 4.2.2.2.

    • @mindspring05
      @mindspring05 11 лет назад

      4.2.2.2 is the public DNS servers on the internet, he tested internet connectivity by pinging it.. its not configured on the router. would use the default route on the router.

    • @satishpuri4599
      @satishpuri4599 11 лет назад

      Thank u so much YOGESH for guiding me..

  • @AjeyShetty
    @AjeyShetty 13 лет назад

    too good

  • @seruwagiashie4145
    @seruwagiashie4145 11 лет назад

    need a cert big up cisco

  • @imnoob1505
    @imnoob1505 9 лет назад

    can you help me bro? Doug Suida

  • @ricardovelazquez144
    @ricardovelazquez144 12 лет назад

    This guy will miss you up if you try his technique with in a lab / home environment (GNS3 or lab equipment) what he DOES NOT EXPLAIN and you can WASTE hours trying to figure it out is that in a lab / home environment (GNS3 / home equipment) and not connected to an “Internet” connection, is that there has to be stable routing between the two networks before you crate the tunnel and set up the OSPF (processes 123). I spent hours with a flapping tunnel and trying to figure out why!

  • @ViVo-hv2zq
    @ViVo-hv2zq 11 лет назад

    very useful. Thank a lot!!