Practical 6 Security VPN GRE
Practical 6 Security VPN GRE
Lab Session 6
(Security VPN GRE)
Definition
A VPN enables a company to securely share data and services between disparate locations at minimal cost. Users who do
not have a permanent workstation in an organization can connect to a VPN to remotely access company data from a
home computer, laptop, or other mobile device.
• It is a connection between 2 or more computers or devices that ARE NOT on the same private Network
• Data encapsulation and encryption used to ensure ONLY proper users and data
• Medium = INTERNET
Topology
Objectives
Scenario
You are the network administrator for a company which wants to set up a GRE tunnel to a remote office. Both networks
are locally configured, and need only the tunnel configured.
Addressing Table
Device Interface IP Address Subnet Mask Default Gateway
G0/0 192.168.1.1 255.255.255.0 N/A
RA S0/0/0 64.103.211.2 255.255.255.252 N/A
Tunnel 0 10.10.10.1 255.255.255.252 N/A
Configuration
Testing connectivity
Establish a route between the 192.168.X.X networks using the 10.10.10.0/30 network as the destination.
Attempt to ping the IP address of PCA from PCB. The ping should be successful.
Attempt to trace the path from PCA to PCB. Note the lack of public IP addresses in the output.
Note on GRE
(Reference : http://blog.boson.com/bid/92815/What-are-the-differences-between-an-IPSec-VPN-and-a-GRE-Tunnel)
Like IPSec VPNs, GRE tunnels are used to create point-to-point connections between two networks. Some of the benefits
and characteristics of GRE tunnels include the following:
Data encapsulation – GRE tunnels encapsulate packets that use protocols incompatible with an intermediary
network (passenger protocols) within protocols that are compatible (transport protocols). This allows data to be
sent across networks that otherwise could not be traversed. For example, you could implement a GRE tunnel to
connect two AppleTalk networks through an IP-only network or to route IPv4 packets across a network that only
uses IPv6.
Simplicity – GRE tunnels lack mechanisms related to flow-control and security by default. This lack of features can
ease the configuration process. However, you probably don’t want to transfer data in an unencrypted form across
a public network; therefore, GRE tunnels can be supplemented by the IPSec suite of protocols for security
purposes. In addition, GRE tunnels can forward data from dis-contiguous networks through a single tunnel, which
is something VPNs cannot do.
Multicast traffic forwarding – GRE tunnels can be used to forward multicast traffic, whereas a VPN cannot.
Because of this, multicast traffic such as advertisements sent by routing protocols can be easily transferred
between remote sites when using a GRE tunnel.
In summary, both VPNs and GRE tunnels can be used to transfer data between remote locations. However, their
similarities end there. If you are looking to provide a secure method of connecting remote users to resources stored
within a central location, you should probably implement a VPN. However, if you need to pass traffic over an otherwise
incompatible network, a GRE tunnel should be implemented.