0% found this document useful (0 votes)
44 views5 pages

Configuring GRE Tunnel - PKT

A GRE tunnel was configured between Router1 and Router2 to encapsulate traffic between their networks without the ISP's knowledge. OSPF routing was also configured over the GRE tunnel so that the routers could exchange routing information and traffic could flow between the networks through the tunnel. This allowed a PC on Router1's network to successfully ping and tracert a PC on Router2's network by routing traffic through the encrypted GRE tunnel.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views5 pages

Configuring GRE Tunnel - PKT

A GRE tunnel was configured between Router1 and Router2 to encapsulate traffic between their networks without the ISP's knowledge. OSPF routing was also configured over the GRE tunnel so that the routers could exchange routing information and traffic could flow between the networks through the tunnel. This allowed a PC on Router1's network to successfully ping and tracert a PC on Router2's network by routing traffic through the encrypted GRE tunnel.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

GRE: Generic Routing Encapsulation.

Is a tunneling protocol developed by Cisco systems that can


encapsulate a wide variety of network layer protocols inside virtual
point-to-point links or point-to-multipoint links over an internet
protocol network.
A GRE tunnel is used when IP packets need to be sent from one
network to another, without being parsed or treated like IP packets by
any intervening routers.
Here in today’s lab, we will configure unencrypted point-to-point GRE
tunnel and verify that network traffic is using the tunnel, we will also
configure the OSPF routing protocol inside the GRE VPN tunnel, the GRE
tunnel is between Router1 and Router2 routers in OSPF area 0, the ISP
has no knowledge of the GRE tunnel, communication between the
Router1 and Router2 routers and the ISP is accomplished using default
static routes.
Now configuring the interfaces IP addresses on the routers.
On Router1
# conf t
# hostname Router1
# interface G0/1
# ip address 192.168.1.1 255.255.255.0
# no shut
# interface s0/0/0
# ip address 10.1.1.1 255.255.255.252
# no shut
On the ISP router:
# conf t
# hostname ISP
# int s0/0/0
# ip address 10.1.1.2 255.255.255.252
# no shutdown
# int s0/0/1
# ip address 10.2.2.2 255.255.255.252
# no shutdown
On Router2
# conf t
# hostname Router2
# int s0/0/1
# ip address 10.2.2.1 255.255.255.252
# no shutdown
# int g0/1
# ip address 192.168.2.1 255.255.255.0
# no shutdown
Now, configure the PCs IP address configurations and default gateways.
On Router1 and Router2 to configure default routes to the ISP routers:
On Router1:
# ip route 0.0.0.0 0.0.0.0 10.1.1.2
On Router2
# ip route 0.0.0.0 0.0.0.0 10.2.2.2
To this point, the PCs can only ping their own default gateway and the
serial interfaces but not each other.
Run pings from PC-A
# ping 192.168.1.1
# ping 10.1.1.1
Run pings on PC-E
# ping 192.168.2.1
# ping 10.2.2.1
Now, it is time to configure GRE tunnel between Router1 and Router2
We will use the tunnel interface on Router1 s0/0/0 as the tunnel source
interface and IP address 10.2.2.1 as the tunnel destination on Router2.
On Router1:
# interface tunnel 0
# ip address 192.168.10.1 255.255.255.252
# tunnel source s0/0/0
# tunnel destination 10.2.2.1
Configuring the tunnel interface on Router2, I will use s0/0/1 as the
tunnel source interface and the IP address of 10.1.1.1 as the tunnel
destination interface on Router1
On Router2
# interface tunnel 0
# ip address 192.168.10.2 255.255.255.252
# tunnel source s0/0/1
# tunnel destination 10.1.1.1
As for the tunnel source interface, we can use either the name of the
interface or the IP address on the interface, but packet tracer doesn’t
support using the IP address as the source, that’s why we will use the
name of the interfaces.
Now on Router1 and Router2 run this command:
# show ip interface brief
Also run this command on Router1 and Router2 to verify the tunnel
protocol, the tunnel source and destination used for this tunnel.
# show interface tunnel 0
Run the ping from Router1 to Router2
# ping 192.168.10.2
Now use traceroute
# traceroute 192.168.10.2
Now we will configure OSPF routing over the tunnel
On Router1:
# router ospf 1
# network 192.168.10.0 0.0.0.255 area 0
# network 192.168.1.0 0.0.0.255 area 0
On Router2:
# router ospf 1
# network 192.168.10.0 0.0.0.255 area 0
# network 192.168.2.0 0.0.0.255 area 0
Now I will verify the OSPF routing
On Router1
# show ip route
Here we see the exit interface and IP address to reach 192.168.2.0/24
network is the tunnel 0
Ping from PC-A to PC-E
# ping 192.168.2.5
And from PC-E to PC-A
# ping 192.168.1.5
Run tracert from PC-A to PC-E and notice the path.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy