- Configure ISAKMP SA (P1)
- Configure IPSEC SA (P2)
- Define interesting traffic via extended ACL
- Configure Crypto map
- Bind crypto map to interface
- (Configure NAT ACL as necessary)
int tunnel [number]
ip address [ip] [netmask]
tunnel source [int type][num]
tunnel destination [ip]
tunnel mode [type][type] //default is gre ip
So GRE is great in that it can transport routing protocols, which IPSEC cannot do. However it is inherently insecure, and so IPSEC over GRE is a great option. GRE adds about 24 bytes to the header, and has an additional 12 bytes it can add as well as optional attributes. Some of the newer IOS versions do allow the passing of multicast traffic through an IPSEC tunnel. I will be configuring a IPSEC/GRE tunnel via cli later, but tonight was over the SDM config of the tunnel. Good stuff, can wait to dive into the labs for these sections.
No comments:
Post a Comment