375
Configuring GRE
You can configure GRE over IPv4 tunnels through the Web interface.
Overview
Generic Routing Encapsulation (GRE) is a protocol designed for encapsulating and carrying the packets
of one network layer protocol (for example, IP or IPX) over another network layer protocol (for example,
IP). GRE is a tunneling technology and serves as a Layer 3 tunneling protocol.
A GRE tunnel is a virtual point-to-point connection for transferring encapsulated packets. Packets are
encapsulated at one end of the tunnel and de-encapsulated at the other end.
depicts the
encapsulation and de-encapsulation processes.
Figure 375
X protocol networks interconnected through the GRE tunnel
For more information about GRE, see
Layer 3—IP Services Configuration Guide
in
HP MSR Router Series
Configuration Guides (V5)
.
Configuring a GRE over IPv4 tunnel
Before you configure a GRE over IPv4 tunnel, configure an IP address for the interface (such as a VLAN
interface, an Ethernet interface, or a Loopback interface) to be used as the source interface of the tunnel
interface.
Recommended configuration procedure
Task Remarks
1.
Required.
Create a tunnel interface and configure GRE tunnel related parameters.
2.
Configure a route through
the tunnel.
Optional.
Each end of the tunnel must have a route (static or dynamic) through the
tunnel to the other end, so that GRE encapsulated packets can be forwarded
correctly.
For more information about route configuration, see "Configuring routes."
Creating a GRE tunnel
1.
Select
VPN
>
GRE
from the navigation tree to enter the GRE tunnel configuration page, as shown
Содержание MSR SERIES
Страница 17: ...xv Documents 835 Websites 835 Conventions 836 Index 838 ...
Страница 20: ...3 Figure 3 Initial page of the Web interface ...
Страница 42: ...25 Figure 13 Firefox Web browser setting ...
Страница 59: ...42 Figure 27 Checking the basic service configuration ...
Страница 73: ...56 Figure 35 Sample interface statistics ...
Страница 156: ...139 Figure 139 Rebooting the 3G modem ...
Страница 168: ...151 Figure 152 Configuring Web server 2 ...
Страница 174: ...157 Figure 158 Configure the URL filtering function ...
Страница 187: ...170 Upon detecting the Land or Smurf attack on Ethernet 0 2 Router outputs an alarm log and drops the attack packet ...
Страница 242: ...225 Figure 233 Enabling the DHCP client on interface Ethernet 0 1 ...
Страница 247: ...230 Figure 236 The page for configuring an advanced IPv4 ACL ...
Страница 255: ...238 Figure 241 Advanced limit setting ...
Страница 298: ...281 e Click Apply 2 Configure Router B in the same way Router A is configured ...
Страница 354: ...337 Figure 339 Configuring a login control rule so Host B cannot access Router through the Web ...
Страница 400: ...383 Figure 387 Verifying the configuration ...
Страница 405: ...388 ...
Страница 523: ...506 Figure 530 Ping configuration page ...
Страница 538: ...521 a Click Device A on the topology diagram b Click Ethernet 0 2 on the panel diagram c Click Port Guard ...
Страница 744: ...727 Verifying the configuration In the case that the IP network is unavailable calls can be made over PSTN ...
Страница 775: ...758 Figure 785 Configuring a jump node ...
Страница 791: ...774 Figure 801 Configuring a jump node ...