How to configure IPSEC GRE Tunnel

Поделиться
HTML-код
  • Опубликовано: 26 янв 2025

Комментарии • 32

  • @johnlj_ciscocertified
    @johnlj_ciscocertified 2 года назад +1

    thanks for sharing, information on GRE & IPsec. i love this!

    • @aminsedighfar
      @aminsedighfar  2 года назад

      Thanks for your kind comment 🤓🙏🏻

  • @muratemredemircioglu2897
    @muratemredemircioglu2897 7 месяцев назад

    Hey Amin, great video. I would like to ask that at 10:20 , the specified key is clear-text when I do show run. Also service password-encryption command does not hide the key. Is there a way to hash that key similar to enable secret?

  • @gauravdesai1826
    @gauravdesai1826 3 года назад

    Very precise and accurate. Thank you for your effort. Only one thing to say @13:07 I believe network need to be advertised otherwise from where the interesting traffic will come. Please correct me if my understanding is wrong

    • @aminsedighfar
      @aminsedighfar  3 года назад

      Thanks for your comment. But which network do you mean? Here they are connected via either static route or EIGRP.

  • @afshin9
    @afshin9 2 года назад +1

    very informative, thank you for sharing, hope to see more from you buddy

  • @saleemnaseer1279
    @saleemnaseer1279 Год назад +1

    Very informative and easy to understand.

  • @sandipanaec23
    @sandipanaec23 Год назад

    Hello Amin...Thanks ...it's a brief and informative

  • @idwphoto707
    @idwphoto707 3 года назад +1

    Thanks for this demonstration! Some questions: would this config change when there are two ISP NAT routers in between the VPN routers? Does the ISP only has to forward ports 500 and 4500? Or do they also have to forward 47?

    • @aminsedighfar
      @aminsedighfar  3 года назад

      Hi, thanks for your comment. For the first question I would say as long as you can ping the other side, everything is ok there’s no need to change anything.

    • @aminsedighfar
      @aminsedighfar  3 года назад

      For the next question, to be honest I don’t know, I think those ports are already forwarded on the ISPs side (by default).

  • @supunniwarthanarathnayake6503
    @supunniwarthanarathnayake6503 2 года назад +1

    great video. very informative

  • @mohammadabdi447
    @mohammadabdi447 2 года назад +1

    Hello and thanks to you Mr. Sedighfar . I have question for you... Did you ever try to connect two different device same as cisco router and a mikrotik with GRE over IPsec tunnel?

    • @aminsedighfar
      @aminsedighfar  2 года назад +1

      Hi, unfortunately I didn’t! However, I know it’s doable.

  • @aakashgautam2200
    @aakashgautam2200 2 года назад +1

    Hello can we do tunnel protection in gre mode multipoint ?

    • @aminsedighfar
      @aminsedighfar  2 года назад

      I guess the same as what we did here. GRE Tunnel is already protected, you set authentication, encryption, isakmp, etc.
      Sorry, I’m not sure if I addressed your question.

  • @anahitarahimi3596
    @anahitarahimi3596 3 года назад +1

    Well done Amin!

  • @daryllg
    @daryllg Год назад

    Hi @Amin, I see you didnt attached the ISAKMP Key to IPSEC Profile, does this required?

    • @aminsedighfar
      @aminsedighfar  Год назад +1

      You don’t attach! It’s the encryption that must be the same on the both sides.

    • @daryllg
      @daryllg Год назад

      Thanks

  • @workstation6606
    @workstation6606 2 месяца назад +1

    What routers use?

    • @aminsedighfar
      @aminsedighfar  2 месяца назад

      @@workstation6606 you need to have the iOS first, then upload it to your router. I used C7200

  • @thomasleong9700
    @thomasleong9700 3 года назад +1

    hi sir, why you no need to enable the gre ip mode ?

    • @aminsedighfar
      @aminsedighfar  3 года назад +1

      To have an encrypted communication channel. In case someone captures your packets, he or she will not be able to understand it.

  • @asrolandass
    @asrolandass 2 года назад +1

    Hello, I did research and I found out, that gre over ipsec better to use ipsec profile instead crypto map, because, this is newer method, crypto map is legacy, ipsec profile is shorter to write and due to the duplication of commands with crypto map.

    • @aminsedighfar
      @aminsedighfar  2 года назад

      I also used the profile, thanks for your feedback.

    • @aminsedighfar
      @aminsedighfar  2 года назад +1

      Furthermore, I have another video about IPSEC and VPN ruclips.net/video/RE3T66KaSAc/видео.html